Powered by Deep Web Technologies
Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

2

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

3

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

4

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

5

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

6

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

7

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

8

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

9

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

10

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

11

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

12

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

13

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to...

14

U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

15

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

16

JC3 Low Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

low-impact-assessment-bulletins low-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-207: Wireshark Multiple Denial of Service Vulnerabilities http://energy.gov/cio/articles/v-207-wireshark-multiple-denial-service-vulnerabilities wireshark-multiple-denial-service-vulnerabilities" class="title-link">V-207: Wireshark Multiple Denial of Service Vulnerabilities

17

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

401 - 15410 of 28,905 results. 401 - 15410 of 28,905 results. Download REQUEST FOR RECORDS DISPOSITION AUTHORITY http://energy.gov/cio/downloads/request-records-disposition-authority-23 Article T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. http://energy.gov/cio/articles/t-581-novell-access-manager-java-double-literal-denial-service-vulnerability Article V-160: Wireshark Multiple Bugs Let Remote Users Deny Service Multiple vulnerabilities have been reported in Wireshark http://energy.gov/cio/articles/v-160-wireshark-multiple-bugs-let-remote-users-deny-service Download Before the House Science and Technology Subcommittee on Energy and Environment Subject: Marine and Hydrokinetic Energy Technology: Finding the Path to

18

T-710: Apache HTTP Server Overlapping Ranges Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am...

19

E-Print Network 3.0 - access denial systems Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

denial systems Search Powered by Explorit Topic List Advanced Search Sample search results for: access denial systems Page: << < 1 2 3 4 5 > >> 1 Wireless Denial of ServiceWireless...

20

T-616: PHP Stream Component Remote Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: PHP Stream Component Remote Denial of Service Vulnerability 6: PHP Stream Component Remote Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability May 5, 2011 - 12:59am Addthis PROBLEM: PHP Stream Component Remote Denial of Service Vulnerability PLATFORM: Ubuntu Linux PHP MandrakeSoft Corporate Server MandrakeSoft Enterprise Server MandrakeSoft Linux Mandrake ABSTRACT: PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. reference LINKS: SecurityFocus IMPACT ASSESSMENT: Medium Discussion: PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-550: Apache Denial of Service Vulnerability | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

550: Apache Denial of Service Vulnerability 550: Apache Denial of Service Vulnerability T-550: Apache Denial of Service Vulnerability February 4, 2011 - 3:03am Addthis PROBLEM: Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. PLATFORM: Versions prior to 'APR-util' 1.3.10 are vulnerable. ABSTRACT: Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption). reference LINKS: Securityfocus

22

V-062: Asterisk Two Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Asterisk Two Denial of Service Vulnerabilities 2: Asterisk Two Denial of Service Vulnerabilities V-062: Asterisk Two Denial of Service Vulnerabilities January 4, 2013 - 6:00am Addthis PROBLEM: Asterisk Two Denial of Service Vulnerabilities PLATFORM: The vulnerabilities are reported in versions 1.8.x, 10.x, and 11.x. ABSTRACT: Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA51689 Asterisk Project Security Advisories CVE-2012-5976 CVE-2012-5977 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to consume excessive resources on the target system. Systems configured to allow anonymous calls are affected. A remote authenticated user can also exploit this via

23

T-710: Apache HTTP Server Overlapping Ranges Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Apache HTTP Server Overlapping Ranges Denial of Service 10: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am Addthis PROBLEM: Apache HTTP Server contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. PLATFORM: Apache HTTP Server versions 2.2.19 and prior ABSTRACT: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. reference LINKS: FreeBSD VuXML Document Advisory ID: cisco-sa-20110830-apache IBM Alert: swg21512087 Red Hat Advisory: RHSA-2011:1245-1 CVE-2011-3192 CVE-2011-3192 (Update2) IMPACT ASSESSMENT: High Discussion: The vulnerability is due to improper processing of certain user-supplied requests by the affected software. An unauthenticated, remote attacker

24

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

25

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

26

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network (OSTI)

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

27

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-176: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system. May 22, 2012 U-174: Serendipity Unspecified SQL Injection Vulnerability A vulnerability was reported in Serendipity. A remote user can inject SQL commands. May 21, 2012 U-173: Symantec Web Gateway Multiple Vulnerabilities Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote

28

T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

77: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability July 27, 2011 -...

29

U-016: Cisco IOS Software HTTP Service Loading Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am...

30

V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat Security Bypass and Denial of Service 7: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities November 6, 2012 - 6:00am Addthis PROBLEM: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities PLATFORM: Apache Tomcat 5.x Apache Tomcat 6.x Apache Tomcat 7.x ABSTRACT: Two vulnerabilities were reported in Apache Tomcat REFERENCE LINKS: Apache.org Apache Tomcat Denial of Service Apache Tomcat DIGEST authentication weaknesses Secunia Advisory SA51138 CVE-2012-2733 CVE-2012-3439 IMPACT ASSESSMENT: Medium DISCUSSION: A weakness and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). 1) An error within the "parseHeaders()" function

31

U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel SFC Driver TCP MSS Option Handling Denial of 6: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability August 2, 2012 - 7:00am Addthis PROBLEM: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability PLATFORM: Linux Kernel 3.2.x ABSTRACT: The Linux kernel is prone to a remote denial-of-service vulnerability. reference LINKS: Secunia Advisory SA50081 Bugtraq ID: 54763 Vulnerability Report: Linux Kernel 3.2.x The Linux Kernel Archives Original Advisory CVE-2012-3412 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the Solarflare network

32

Safety Functions and Other Features of Lethal Activated Denial Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

STD-1193-2010 STD-1193-2010 April 2010 DOE STANDARD Safety Functions and Other Features of Lethal Activated Denial Systems U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE DOE-STD-1193-2010 i TABLE OF CONTENTS FOREWORD ...................................................................................................................... ii 1. SCOPE AND PURPOSE .........................................................................................1 2. APPLICABILITY ....................................................................................................1 3. NORMATIVE REFERENCES ................................................................................2

33

T-726:Linux-2.6 privilege escalation/denial of service/information leak  

Energy.gov (U.S. Department of Energy (DOE))

Vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak.

34

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

35

Deception and Denial in Iraq--The Limits of Secret Intelligence  

E-Print Network (OSTI)

Deception and Denial in Iraq-- The Limits of Secret Intelligence and the Intelligent Adversary Corollary Running title: Deception and Denial in Iraq Jonathan I. Katz Department of Physics CB1105 1 #12;Abstract Prior to the Second Gulf War Iraq accomplished the remarkable feat of convincing

Katz, Jonathan I.

36

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 T-636: Wireshark Multiple Flaws Let Remote Users Deny Service Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. June 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges

37

U-016: Cisco IOS Software HTTP Service Loading Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service 16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am Addthis PROBLEM: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability . PLATFORM: Cisco IOS Software ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition. reference LINKS: CISCO Security Intelligence Operations IntelliShield ID: 24436 CVE-2011-2586 IMPACT ASSESSMENT: Medium Discussion: Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The vulnerability is due to improper

38

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of 686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a network without the need for a username and password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061 Secunia Advisory: SA45556 CVE-2010-4476 IMPACT ASSESSMENT: Medium Discussion: IBM has acknowledged a vulnerability in IBM Tivoli Integrated Portal, which can be exploited by malicious people to cause a DoS (Denial of Service).

39

T-572: VMware ESX/ESXi SLPD denial of service vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: VMware ESX/ESXi SLPD denial of service vulnerability 72: VMware ESX/ESXi SLPD denial of service vulnerability T-572: VMware ESX/ESXi SLPD denial of service vulnerability March 8, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware ESX. A remote user can cause denial of service conditions. PLATFORM: ESX/ESXi 4.0, 4.1 ABSTRACT: VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. reference LINKS: VMware Security Advisory: VMSA-2011-0004 VMware vSphere 4 VMware ESXi 4.1 Update CVE-2010-3609 IMPACT ASSESSMENT: Moderate Discussion: A remote user can send specially crafted data to cause the target Service Location Protocol daemon (SLPD) to enter an infinite loop and consume excessive CPU resources.A remote user can consume excessive CPU resources.

40

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Fixed denial system for access control of nuclear weapons  

SciTech Connect

The Fixed Denial System (FDS) is a simple, low cost, vertical, underground silo used to store individual nuclear weapons within secured areas of present storage sites. The normal storage position of each weapon is at or near the top of the shaft, allowing rapid operational weapon access and removal. In response to a threat, the weapon within a storage canister can be dropped to the bottom of the shaft where it is automatically locked in place. Once the alert condition is resolved and control of the site reestablished, the weapon canister is unlocked with a coded signal and retrieved. This system offers a high degree of hardening and access denial that is characteristic of Vertical Underground Storage (VUGS) systems. An aboveground test apparatus was constructed to demonstrate the feasibility of using a pneumatic air cushion, which is generated by the free-fall of the weapon container, to control impact velocity and descent time. Stockpile weapons that might be stored in the FDS include the W33, W48, W79, and the W54 ADM.

Willan, V.O.; Gustafson, E.C.

1981-12-01T23:59:59.000Z

42

U-253: Citrix XenServer Denial of Service and Privilege Escalation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

253: Citrix XenServer Denial of Service and Privilege Escalation 253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities U-253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities September 7, 2012 - 6:00am Addthis PROBLEM: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities PLATFORM: Citrix XenServer 5.0 Citrix XenServer 5.5 Citrix XenServer 5.6 Citrix XenServer 6.0 ABSTRACT: Citrix XenServer is prone to a local privilege-escalation vulnerability. reference LINKS: Citrix Document ID: CTX134708 Secunia Advisory SA50530 Bugtraq ID: 55432 CVE-2012-3432 CVE-2012-3433 CVE-2012-3494 CVE-2012-3495 CVE-2012-3496 CVE-2012-3498 CVE-2012-3515 CVE-2012-3516 CVE-2012-4606 IMPACT ASSESSMENT: High Discussion: A number of security vulnerabilities have been identified in Citrix

43

V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of 7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability August 14, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in the Windows NAT Driver PLATFORM: Windows Server 2012 ABSTRACT: This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows REFERENCE LINKS: Secunia Advisory SA54420 Security Tracker ID 1028909 Microsoft Security Bulletin MS13-064 CVE-2013-3182 IMPACT ASSESSMENT: Medium DI SCUSSION: The vulnerability is caused due to an error within the Windows NAT Driver when handling ICMP packets and can be exploited to cause the system to stop responding IMPACT: Denial of Service SOLUTION: Vendor has released a security update

44

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

45

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

2: Cisco ASA Software TFTP Protocol Inspection Denial of 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X Series Adaptive Security Appliances ABSTRACT: The vulnerability is reported in versions 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), and 9.1(2.1). Other versions may also be affected. REFERENCE LINKS: Secunia Advisory SA54699 CVE-2013-3463 Cisco (CSCuh13899) IMPACT ASSESSMENT: Low DISCUSSION: A vulnerability has been reported in Cisco ASA Software, which can be

46

External Review of Health Plan Denials of Mental Health Services: Lessons from Minnesota  

Science Journals Connector (OSTI)

There has been concern that health plans unfairly deny claims for mental health services. ... from a legal settlement. An independent panel reviews all mental health service denials in the state’s three largest h...

Susan Bartlett Foote; Beth A. Virnig…

2007-01-01T23:59:59.000Z

47

U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service 1: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability July 26, 2012 - 7:00am Addthis PROBLEM: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability PLATFORM: BIND 9.6-ESV-R1 through versions 9.6-ESV-R7-P1 BIND 9.7.1 through versions 9.7.6-P1 BIND 9.8.0 through versions 9.8.3-P1 BIND 9.9.0 through versions 9.9.1-P1 ABSTRACT: ISC BIND is prone to a denial-of-service vulnerability. reference LINKS: The Vendor's Advisory CVE-2012-3817 Bugtraq ID: 54658 SecurityTracker Alert ID: 1027296 IMPACT ASSESSMENT: High Discussion: When DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of

48

U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service 1: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability July 26, 2012 - 7:00am Addthis PROBLEM: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability PLATFORM: BIND 9.6-ESV-R1 through versions 9.6-ESV-R7-P1 BIND 9.7.1 through versions 9.7.6-P1 BIND 9.8.0 through versions 9.8.3-P1 BIND 9.9.0 through versions 9.9.1-P1 ABSTRACT: ISC BIND is prone to a denial-of-service vulnerability. reference LINKS: The Vendor's Advisory CVE-2012-3817 Bugtraq ID: 54658 SecurityTracker Alert ID: 1027296 IMPACT ASSESSMENT: High Discussion: When DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of

49

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities...

50

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

51

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

52

V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP StoreOnce D2D Backup Systems Denial of Service 6: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability August 24, 2013 - 3:45am Addthis PROBLEM: A vulnerability has been reported in HP StoreOnce D2D Backup Systems, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: HP StoreOnce D2D Backup Systems 1.x, HP StoreOnce D2D Backup Systems 2.x ABSTRACT: The vulnerability is reported in versions 2.2.18 and prior and 1.2.18 and prior. REFERENCE LINKS: Secunia Advisory SA54598 CVE-2013-2353 IMPACT ASSESSMENT: Moderate DISCUSSION: A vulnerability has been reported in HP StoreOnce D2D Backup Systems, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error. No further

53

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol 2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability December 15, 2011 - 8:00am Addthis PROBLEM: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability. PLATFORM: Versions Prior to Pidgin 2.10.1 RedHat Enterprise Linux WS 4 RedHat Enterprise Linux Optional Productivity Application 5 server RedHat Enterprise Linux ES 4 RedHat Enterprise Linux Desktop Workstation 5 client RedHat Enterprise Linux Desktop version 4 Red Hat Enterprise Linux Desktop 5 client Red Hat Enterprise Linux AS 4 ABSTRACT: An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

54

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

55

T-552: Cisco Nexus 1000V VEM updates address denial of service in VMware  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Cisco Nexus 1000V VEM updates address denial of service in 52: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi T-552: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi February 8, 2011 - 7:49am Addthis PROBLEM: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi. PLATFORM: ESXi 4.1, ESXi 4.0, ESX 4.1, ESX 4.0 The following Cisco products have the vulnerability: - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3b) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3a) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(2) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(1) ABSTRACT: The Cisco Nexus 1000V Virtual Ethernet Module (VEM) is a virtual switch for

56

V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: GnuTLS TLS Record Decoding Denial of Service Vulnerability 7: GnuTLS TLS Record Decoding Denial of Service Vulnerability V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability May 30, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in GnuTLS PLATFORM: GnuTLS 2.x ABSTRACT: A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service) REFERENCE LINKS: Secunia Advisory SA53600 GnuTLS Library GNUTLS-SA-2013-2 CVE-2013-2116 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an out-of-bounds read error within the "_gnutls_ciphertext2compressed()" function in lib/gnutls_cipher.c and can be exploited to cause a crash of the application using the library. IMPACT: Possible DoS SOLUTION: Vendor recommends applying Patch or upgrading to Version 3.x

57

T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of 7: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability July 27, 2011 - 3:58pm Addthis PROBLEM: F5 has acknowledged a vulnerability in BIG-IP, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: The vulnerability is reported in the following products and versions: BIG-IP LTM versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2 BIG-IP GTM versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2 BIG-IP ASM versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2 BIG-IP Link Controller versions 9.0.0 through 9.4.8, 10.0.0 through 10.1.0, and 10.2.0 through 10.2.2

58

U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco IOS IPSec IKE Unspecified Denial of Service 8: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x ABSTRACT: The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. REFERENCE LINKS: Vendor Advisory Secunia Advisory SA48607 CVE-2012-0381 iMPACT ASSESSMENT: High discussion: The March 28, 2012, Cisco IOS Software Security Advisory bundled

59

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network (OSTI)

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

60

WRAPS: Denial-of-Service Defense through Web Referrals XiaoFeng Wang  

E-Print Network (OSTI)

WRAPS: Denial-of-Service Defense through Web Referrals XiaoFeng Wang Michael K. Reiter Abstract referral architecture for privileged service ("WRAPS"). WRAPS allows a legitimate client to obtain a privilege URL through a click on a referral hypher- link, from a website trusted by the target website

Wang, XiaoFeng

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

UNIVERSITY HEALTH SERVICES UC BERKELEY 2011/2012 OFFICE APPEAL OF WAIVER DENIAL  

E-Print Network (OSTI)

INSURANCE PLAN (SHIP) APPEAL OF WAIVER DENIAL INSTRUCTIONS: Please read this material below before filing term. 4. Evaluation of your appeal will be based on comparability guidelines in effect at the time Berkeley, CA 94720-4300 FAX: (510) 642-9119 Email: ship@uhs.berkeley.edu Dear Insurance Coordinator: I

Doudna, Jennifer A.

62

Global health and climate change: moving from denial and catastrophic fatalism to positive action  

Science Journals Connector (OSTI)

...Howard and Martyn Chamberlain Global health and climate change: moving from denial...ucl.ac.uk ). 1 Institute for Global Health, University College London, , Gower...London WC1E 6BT, UK 3 Institute for Human Health and Performance, University College London...

2011-01-01T23:59:59.000Z

63

A Denial of Service Attack against Fair Computations using Bitcoin Deposits  

E-Print Network (OSTI)

A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman July 2014 Abstract Bitcoin supports complex transactions where the recipient of a transaction can") and Bentov and Kumaresan [3] (Protocol "BK") describe multi-party computation schemes in which Bitcoin

64

V-129: Apache Subversion mod_dav_svn Multiple Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

setting or deleting large number of properties of the node can be exploited to cause a memory exhaustion. 2) A NULL pointer dereference error in the moddavsvn module when...

65

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Intrusion Prevention System SSP Fragmented Traffic 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE LINKS: Secunia Advisory SA54246 SecurityTracker ID: 1028806 Cisco Advisory ID: cisco-sa-20130717-ips CVE-2013-1218

66

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion 61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability February 21, 2011 - 7:00am Addthis PROBLEM: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability. PLATFORM: The following Java products are affected: Java SE: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK 5.0 Update 27 and prior for Solaris 9 Oracle SDK 1.4.2_29 and prior for Solaris 8 IBM JDK 6 Update SR9 and prior IBM JDK 5 Update SR12-FP3 and prior IBM JDK 1.4.2 Update SR13-FP8 and prior Java for Business: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK and JRE 5.0 Update 27 and prior for Windows, Solaris, and Linux

67

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

68

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. July 27, 2013 V-204: A specially crafted query can cause BIND to terminate abnormally A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). July 26, 2013 V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and

69

JC3 Low Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Low Impact Low Impact Assessment Bulletins JC3 Low Impact Assessment Bulletins RSS July 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. November 30, 2011 U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code A remote user can upgrade the printer's firmware with arbitrary code

70

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

71

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

72

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

73

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

74

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

75

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

76

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

77

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

78

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01 - 19710 of 28,905 results. 01 - 19710 of 28,905 results. Page Benefits for SES Positions Leave http://energy.gov/hc/benefits-ses-positions Article DOE-Funded Project Shows Promise for Tapping Vast U.S. Oil Shale Resources A technology as simple as an advanced heater cable may hold the secret for tapping into the nation's largest source of oil, which is contained in vast amounts of shale in the American West. http://energy.gov/fe/articles/doe-funded-project-shows-promise-tapping-vast-us-oil-shale Article NETL Technologies Garner R&D 100 Awards Two technologies developed by the Office of Fossil Energy's National Energy Technology Laboratory (NETL) have won R&D 100 Awards for 2010. http://energy.gov/fe/articles/netl-technologies-garner-rd-100-awards Article V-107: Wireshark Multiple Denial of Service Vulnerabilities

79

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2012 8, 2012 U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. October 5, 2012 U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. October 4, 2012 U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. October 3, 2012 U-273: Multiple vulnerabilities have been reported in Wireshark

80

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

82

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

83

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: OpenSC Smart Card Serial Number Multiple Buffer Overflow 7: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities January 4, 2011 - 5:52pm Addthis PROBLEM: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities PLATFORM: Vulnerable Platform: OpenSC 0.11.13 ABSTRACT: OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. reference LINKS: SecurityFocus - OpenSC Smart Card Serial CVE-2010-4523 OpenSC: Three stack-based buffer overflows CVE-2010-4523 - Three stack-based buffer overflows

84

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

85

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

86

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

87

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

88

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

89

U-171: DeltaV Products Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71: DeltaV Products Multiple Vulnerabilities 71: DeltaV Products Multiple Vulnerabilities U-171: DeltaV Products Multiple Vulnerabilities May 17, 2012 - 7:00am Addthis PROBLEM: DeltaV Products Multiple Vulnerabilities PLATFORM: DeltaV and DeltaV Workstations versions 9.3.1, 10.3.1, 11.3, and 11.3.1 DeltaV ProEssentials Scientific Graph version 5.0.0.6 ABSTRACT: Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference LINKS: Secunia Advisory SA49210 CVE-2012-1814 CVE-2012-1815 CVE-2012-1816 CVE-2012-1817 CVE-2012-1818 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and

90

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 11070 of 28,905 results. 61 - 11070 of 28,905 results. Download DOE Guidance-Category Rating This memorandum is to establish the Department of Energy's (DOE's) policy for the use of Category Rating. http://energy.gov/hc/downloads/doe-guidance-category-rating Article V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. http://energy.gov/cio/articles/v-037-wireshark-multiple-bugs-let-remote-users-deny-service Article Celebrating The Next Generation of Energy Entrepreneurs Recognizing innovative, bold-thinking student entrepreneurs who are working to advance clean energy technologies. http://energy.gov/articles/celebrating-next-generation-energy-entrepreneurs Article Join Us: 2013 National Clean Energy Business Plan Competition

91

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

92

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

93

Pyrochemical multiplicity counter development  

SciTech Connect

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

94

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

95

Multiple Rankine topping cycles  

SciTech Connect

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

96

Multiple gap photovoltaic device  

DOE Patents (OSTI)

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

97

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

98

Multiple System Rate Process  

NLE Websites -- All DOE Office Websites (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

99

Multiple sclerosis and interferon  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

100

Multiple layer insulation cover  

DOE Patents (OSTI)

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Traits and Multiple Genes  

NLE Websites -- All DOE Office Websites (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

102

AM with Multiple Merlins  

E-Print Network (OSTI)

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

103

Hadron multiplicities at the LHC  

E-Print Network (OSTI)

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

104

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

105

Multiple Motivations Institutional Change Principle  

Energy.gov (U.S. Department of Energy (DOE))

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

106

Multiple hypothesis evaluation in auditing  

E-Print Network (OSTI)

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

107

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 71–80] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schäffer

1994-01-01T23:59:59.000Z

108

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2011 14, 2011 T-717: Microsoft Security Bulletin Summary for September 2011 Microsoft Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 13, 2011 T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. September 12, 2011 T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 8, 2011

109

The INEL beryllium multiplication experiment  

SciTech Connect

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

110

Fair capacity sharing of multiple aperiodic servers  

E-Print Network (OSTI)

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

111

Federal Energy Management Program: Multiple Motivations Institutional  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

112

Modularization to Support Multiple Brand Platforms  

E-Print Network (OSTI)

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

113

Multiple smart weapons employment mechanism  

SciTech Connect

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

114

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the system’s elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

115

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network (OSTI)

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

116

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

117

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schäffer

1996-01-01T23:59:59.000Z

118

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network (OSTI)

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

119

The proliferation of functions: multiple systems playing multiple roles in multiple super systems  

E-Print Network (OSTI)

 played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

120

Stuttering as Simultaneous Admission and Denial  

Science Journals Connector (OSTI)

Since the following chapter concludes with a summary, there is no need to provide one in this introduction. Nor do I find anything in the text itself which calls for special comment — so will make none.

O. Hobart Mowrer

1980-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Nevada 2010: Dependency, Denial and Disaster  

E-Print Network (OSTI)

and Glen Atkinson, editors, Beal, M. Kimberly, LindsayNevada leaned Republican (Beal et al. , Whether Republicanconservative on social issues (Beal et al. , 1997). At the

Morin, Robert P

2011-01-01T23:59:59.000Z

122

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Löddesöl

1932-07-22T23:59:59.000Z

123

Recirculation in multiple wave conversions  

SciTech Connect

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

124

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

125

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by malicious users to compromise a vulnerable system. SOLUTION: Users to apply the patch. Addthis Related Articles V-129: Apache Subversion moddavsvn Multiple Denial of...

126

Multiple protocol fluorometer and method  

DOE Patents (OSTI)

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

127

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

128

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

129

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

130

Multiple acousto-optic q-switch  

DOE Patents (OSTI)

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

131

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network (OSTI)

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

132

Systems analysis of multiple regulator perturbations allows discoveryo...  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

133

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

134

Code design for multiple-input multiple-output broadcast channels  

E-Print Network (OSTI)

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

135

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network (OSTI)

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

136

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network (OSTI)

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

137

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

138

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5×106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.71±0.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.36±0.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.82±0.05-0.19+0.21 charged particles per BB¯ decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.62±0.04-0.18+0.24 per BB¯ pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

139

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

140

PJM Interconnection (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

142

The MARVEL assembly for neutron multiplication  

SciTech Connect

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

143

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network (OSTI)

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

144

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network (OSTI)

Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

145

Nonparametric estimation of multiple structures with outliers  

E-Print Network (OSTI)

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

146

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network (OSTI)

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

147

Friction and the Multiplicity of Equilibria  

E-Print Network (OSTI)

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity” (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

148

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

149

An analysis of multiple component mooring lines  

E-Print Network (OSTI)

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

150

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

151

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers (EERE)

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

152

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

153

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

NLE Websites -- All DOE Office Websites (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

154

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

155

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers (EERE)

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

156

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

NLE Websites -- All DOE Office Websites (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

157

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

NLE Websites -- All DOE Office Websites (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

158

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network (OSTI)

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

159

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

None

2011-10-06T23:59:59.000Z

160

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled “Formation Control of Multiple Mobile Robots Systems” by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

162

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

163

Quasi Multiplication and K-groups  

E-Print Network (OSTI)

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

164

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network (OSTI)

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

165

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network (OSTI)

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

166

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

167

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

168

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

169

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

170

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

171

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

172

The multiple vortex nature of tropical cyclogenesis  

E-Print Network (OSTI)

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

173

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Plötzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

174

Jet multiplicities as the QGP thermometer  

E-Print Network (OSTI)

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

175

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network (OSTI)

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

176

A material's multiple personalities | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

177

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

178

Weak multiplicativity for random quantum channels  

E-Print Network (OSTI)

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

179

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network (OSTI)

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

180

Experience with pipelined multiple instruction streams  

SciTech Connect

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

182

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

183

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network (OSTI)

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

184

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

185

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

186

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

187

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

188

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

189

Design of globally optimal multiple description scalar quantizers  

E-Print Network (OSTI)

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

190

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network (OSTI)

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

191

New multiplicativity results for qubit maps  

E-Print Network (OSTI)

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

192

Multiple volume compressor for hot gas engine  

DOE Patents (OSTI)

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

193

Multiple frequency method for operating electrochemical sensors  

DOE Patents (OSTI)

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

194

Experience with pipelined multiple instruction streams  

SciTech Connect

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

195

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

196

Multiple gamma lines from semi-annihilation  

SciTech Connect

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

197

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2012 3, 2012 U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service). August 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 25, 2012 U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache A remote user can poison the DNS cache. July 23, 2012 U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability System access from local network

198

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

199

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

200

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

202

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

203

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

204

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

205

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

206

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

207

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

208

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

209

Organic light emitting device having multiple separate emissive layers  

DOE Patents (OSTI)

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

210

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

211

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

212

Building multiple adsorption sites in porous polymer networks...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

213

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

214

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network (OSTI)

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

215

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

216

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network (OSTI)

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

217

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

218

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

219

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network (OSTI)

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the… (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

220

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Denial-of-Service Attacks on Dynamic Spectrum Access Networks  

E-Print Network (OSTI)

radios was opportunistic utilization of licensed spec- trum bands. Traditionally, the spectrum has been Abstract-- Cognitive radio technologies have emerged as a platform to solve the problem of spectrum scarcity for wire- less applications since cognitive radios have the potential to utilize the idle licensed

Subbalakshmi , K.P. "Suba"

222

Denial of ‘Fair Trial’ Safeguards and United States Forces  

Science Journals Connector (OSTI)

The purpose of this chapter is to consider what redress a United States serviceman may have under international law and United States domestic law if he is denied a “fair trial” safeguard by a NATO country. Its t...

Robert B. Ellert

1963-01-01T23:59:59.000Z

223

Dealing in Doubt: The Climate Denial Industry and Climate Science  

E-Print Network (OSTI)

with disease] that exists in the mind of the general public. It is also the means of establishing a controversy challenges to climate science have made him the darling of the industry-funded, US based conservative think. There are many more like him who repeat the denier message for no other reason than because they believe it

Fairchild, Mark D.

224

Multiple phase estimation in quantum cloning machines  

E-Print Network (OSTI)

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

225

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network (OSTI)

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

226

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network (OSTI)

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

227

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

228

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network (OSTI)

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

229

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network (OSTI)

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

230

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network (OSTI)

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

231

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Saraç; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

232

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network (OSTI)

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

233

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network (OSTI)

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

234

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network (OSTI)

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

235

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network (OSTI)

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

236

Cooperative target convergence using multiple agents  

SciTech Connect

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

237

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

238

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

239

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

240

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

242

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

243

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

244

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

245

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

246

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

247

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

248

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

249

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

250

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

251

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

252

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

253

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

254

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

255

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

256

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

257

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

258

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents (OSTI)

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

259

Midwest Independent System Operator (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

260

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Southern States Energy Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

262

Delaware River Basin Commission (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

263

Exceeding the Limit in Solar Energy Conversion with Multiple Excitons  

Science Journals Connector (OSTI)

The former comes from the transparence of the semiconductor material to solar radiation with photon energies below the bandgap (Eg), while the latter results from the cooling of hot carriers, initially generated by photon energies above Eg, to the band edges before they are extracted to do work. ... Carrier multiplication or singlet fission can be used to decrease the thermalization loss by converting part of the excess photon energy to multiple electron–hole pairs, thus increasing photocurrent. ... (9) However, such enhancement has little effect on the power conversion efficiency because significant carrier multiplication only occurs at photon energies as high as 4Eg. ...

Xiaoyang Zhu

2013-06-18T23:59:59.000Z

264

Interstate Commission on the Potomac River Basin (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

265

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

266

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

267

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

268

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

269

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

270

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

271

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

272

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

273

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

274

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

275

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

276

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

277

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

278

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

279

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

280

Multiple time scale based reduction scheme for nonlinear chemical dynamics  

Science Journals Connector (OSTI)

A chemical reaction is often characterized by multiple time scales governing the kinetics of reactants, products and intermediates. We eliminate the fast relaxing intermediates in autocatalytic reaction by tra...

D. Das; D. S. Ray

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Probabilistic Multiple-Linear Regression Modeling for Tropical Cyclone Intensity  

Science Journals Connector (OSTI)

The authors describe the development and verification of a statistical model relating tropical cyclone intensity to the local large-scale environment. A multiple linear regression framework is used to estimate the expected intensity of a tropical ...

Chia-Ying Lee; Michael K. Tippett; Suzana J. Camargo; Adam H. Sobel

282

The Effects of Multiple Green Factors on Condominium Prices  

Science Journals Connector (OSTI)

This paper analyzes the transaction prices of green buildings assessed on the basis of multiple green factors. Our theoretical model demonstrates that the initial green premium can be negative but becomes positiv...

Jiro Yoshida; Ayako Sugiura

2014-04-01T23:59:59.000Z

283

Development of neutron multiplicity counters for safeguards assay  

SciTech Connect

This paper reports on the development of a new generation of neutron multiplicity counters for assaying impure plutonium. The new counters will be able to obtain three measured parameters from the neutron multiplicity distribution and will be able to determine sample mass, multiplication, and (..cap alpha..,n) reaction rate, making it possible to obtain a more matrix-independent assay of moist or impure materials. This paper describes the existing prototype multiplicity counters and evaluates their performance using assay variance as a figure of merit. The best performance to date is obtained with a high-efficiency, low die-away-time thermal neutron counter with shift-register electronics. 10 refs., 2 figs., 4 tabs.

Ensslin, N.

1989-01-01T23:59:59.000Z

284

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network (OSTI)

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

285

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network (OSTI)

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

Lestone, J P

2014-01-01T23:59:59.000Z

286

Identification of critical locations across multiple infrastructures for terrorist actions  

E-Print Network (OSTI)

This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their ...

Patterson, Sean A. (Sean Albert), 1981-

2005-01-01T23:59:59.000Z

287

Robust Optimization with Multiple Ranges: Theory and Application ...  

E-Print Network (OSTI)

While Metan and Thiele [25] introduces multiple ranges for product demand in a simple two-stage robust ..... the market response to the new product. ...... certainty sets. Technical report, Massachusetts Institute of Technology, Cambridge, MA,.

2010-09-23T23:59:59.000Z

288

Competitive behavior of airlines at multiple airport systems  

E-Print Network (OSTI)

The way passenger traffic is distributed at multiple airport systems continues to intrigue air transportation planners, urban planners, and policy-makers as researchers attempt to unravel how airlines, air travelers and ...

Chen, Edmund

1995-01-01T23:59:59.000Z

289

A simulation environment for multiple project resource optimization  

E-Print Network (OSTI)

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

290

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network (OSTI)

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

291

A Bayesian hierarchical method for multiple-event seismic location  

Science Journals Connector (OSTI)

......demonstrate BAYHLoc using the set of Nevada Test Site nuclear explosions, for which...location|multiple-event|Nevada Test Site|seismic|stochastic| INTRODUCTION...The Walter (2004) data set of Nevada Test Site (NTS) explosions (Fig. 2a......

Stephen C. Myers; Gardar Johannesson; William Hanley

2007-12-01T23:59:59.000Z

292

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network (OSTI)

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

J. P. Lestone

2014-09-17T23:59:59.000Z

293

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network (OSTI)

Objective: To explore how a single master alarm system affects drivers’ responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

294

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

295

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network (OSTI)

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

296

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

297

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network (OSTI)

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

298

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

299

Multiple Motivations Institutional Change Principle | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

300

Lenalidomide plus Dexamethasone for High-Risk Smoldering Multiple Myeloma  

Science Journals Connector (OSTI)

...with lenalidomide, in patients with high-risk smoldering multiple myeloma significantly delayed the time to progression to symptomatic disease and resulted in an overall survival benefit. The orally administered treatment regimen was associated with an acceptable toxicity profile. Certain clinical features predict progression from smoldering to overt multiple myeloma. Patients with high-risk features who were treated with lenalidomide and dexamethasone were less likely to have disease progression and had a higher rate of survival than untreated patients.

Mateos M.-V.; Hernández M.-T.; Giraldo P.

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Jaloro': A New Multiple Virus Resistant Hot Yellow Jalapeno Pepper.  

E-Print Network (OSTI)

, with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas..., with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas...

Villalon, Benigno

1992-01-01T23:59:59.000Z

302

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network (OSTI)

Analysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time Scales

Coughlin, Katie

2011-01-01T23:59:59.000Z

303

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network (OSTI)

2007. Analysis of Wind Power and Load Data at Multiple Timesd- Analysis of Wind Power and Load Data at Multiple Time35   v Analysis of Wind Power and Load Data at Multiple Time

Coughlin, Katie

2011-01-01T23:59:59.000Z

304

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities January 5,...

305

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network (OSTI)

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains · Neural coding · Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

306

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

307

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

308

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

309

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

310

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

311

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

312

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

313

New England Power Pool (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

314

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

315

North American Renewables Registry (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

316

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which

317

Midwest Renewable Energy Tracking System (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable Energy Tracking System (Multiple States) Renewable Energy Tracking System (Multiple States) Midwest Renewable Energy Tracking System (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Illinois Program Type Green Power Purchasing Provider MidWest ISO The Midwest Renewable Energy Tracking System (M-RETS®) tracks renewable energy generation in participating States and Provinces and assists in verifying compliance with individual state/provincial or voluntary Renewable Portfolio Standards (RPS) and objectives. M-RETS® is a tool to keep track of all relevant information about renewable energy produced and delivered in the region. Currently, several States and Provinces participate in M-RETS®: Illinois,

318

Sabine River Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

319

Tunable Multiple Layered Dirac Cones in Optical Lattices  

SciTech Connect

We show that multiple layered Dirac cones can emerge in the band structure of properly addressed multicomponent cold fermionic gases in optical lattices. The layered Dirac cones contain multiple copies of massless spin-1/2 Dirac fermions at the same location in momentum space, whose different Fermi velocity can be tuned at will. On-site microwave Raman transitions can further be used to mix the different Dirac species, resulting in either splitting of or preserving the Dirac point (depending on the symmetry of the on-site term). The tunability of the multiple layered Dirac cones allows us to simulate a number of fundamental phenomena in modern physics, such as neutrino oscillations and exotic particle dispersions with E{approx}p{sup N} for arbitrary integer N.

Lan, Z.; Lu, W.; Oehberg, P. [SUPA, Department of Physics, Heriot-Watt University, EH14 4AS, Edinburgh (United Kingdom); Celi, A. [ICFO - Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); Lewenstein, M. [ICFO - The Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); ICREA-Institucio Catalana de Recerca i Estudis Avancats, 08010 Barcelona (Spain)

2011-12-16T23:59:59.000Z

320

Multiple X-ray reflection from ionized slabs  

E-Print Network (OSTI)

Multiple reflection of X-rays may be important when an accretion disc and its hot corona have a complicated geometry, or if returning radiation due to gravitational light bending is important, or in emission from a funnel such as proposed in some gamma-ray burst models. We simulate the effects of multiple reflection by modifying the boundary condition for an X-ray illuminated slab. Multiple reflection makes the soft X-ray spectrum steeper (softer) and strengthens broad emission and absorption features, especially the K-shell features of iron. This may be important in explaining the spectra of sources such as the Narrow-Line Seyfert 1 galaxy 1H0707-495.

R. R. Ross; A. C. Fabian; D. R. Ballantyne

2002-06-11T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Multiple mobile robots system with network-based subsumption architecture  

Science Journals Connector (OSTI)

In this paper, a unique multiple mobile robots system is proposed to enable engineering students and engineers in the field to efficiently learn subsumption architecture and develop swarm intelligence. The subsumption architecture is known as one of the behaviour-based artificial intelligence. Each of multiple mobile robots within the system has three wheels driven by DC motors and six position sensitive detector (PSD) sensors. Network-based subsumption architecture is considered to realise a schooling behaviour by using only information from the PSD sensors. Further, a server supervisory control is introduced for poor hardware platforms with limitations of software development, i.e., the mobile robots can only behave based on the most simply subdivided reaction behaviours, i.e., reflex actions, generated from agents. Experimental results show interesting behaviour among the multiple mobile robots, such as following, avoidance and schooling.

Fusaomi Nagata; Akimasa Otsuka; Keigo Watanabe; Maki K. Habib

2013-01-01T23:59:59.000Z

322

Effect of multiple scattering on Cerenkov radiation from energetic electrons  

SciTech Connect

Cerenkov radiation can be used as a diagnostic tool to study energetic electrons generated in ultra-intense laser matter interactions. However, electrons suffer scattering with nuclei as they move in a medium. In this article, we theoretically study the effect of multiple scattering on Cerenkov radiation, and obtain analytical formulas under some circumstances. The results show that when the speed of an energetic electron is not close to the light speed in the medium, Cerenkov radiation is just slightly decreased due to multiple scattering. In the case that the electron speed is very close to the light speed in the medium, the effect of multiple scattering becomes significant, and the radiation is dominated by bremsstrahlung.

Zheng Jian [CAS Key Laboratory of Basic Plasma Physics and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2013-01-15T23:59:59.000Z

323

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain

324

Dynamic force spectroscopy on multiple bonds: experiments and model  

E-Print Network (OSTI)

We probe the dynamic strength of multiple biotin-streptavidin adhesion bonds under linear loading using the biomembrane force probe setup for dynamic force spectroscopy. Measured rupture force histograms are compared to results from a master equation model for the stochastic dynamics of bond rupture under load. This allows us to extract the distribution of the number of initially closed bonds. We also extract the molecular parameters of the adhesion bonds, in good agreement with earlier results from single bond experiments. Our analysis shows that the peaks in the measured histograms are not simple multiples of the single bond values, but follow from a superposition procedure which generates different peak positions.

T. Erdmann; S. Pierrat; P. Nassoy; U. S. Schwarz

2007-12-18T23:59:59.000Z

325

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Multiple Title: Third Party Services for SPR Workovers Description: Subcontractor shall furnish all labor, supervision, tools, materials, equipment, supplies, transportation and facilities required to perform remediation workovers of SPR cavern wellbores and brine disposal wells. Typical remediation workovers include cementing a steel liner inside existing cased wellbore, and permanently plugging and abandoning wells. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment ( categorical exclusions).

326

Influence of Multiple Scattering on High-energy Deuteron Quasi-optical Birefringence Effect  

E-Print Network (OSTI)

Influence of multiple scattering on high-energy deuteron quasi-optical birefringence effect is discussed.

V. G. Baryshevsky; A. R. Shyrvel

2011-01-12T23:59:59.000Z

327

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

328

Acceleration of the matrix multiplication of Radiance three phase  

NLE Websites -- All DOE Office Websites (Extended Search)

Acceleration of the matrix multiplication of Radiance three phase Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Title Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Publication Type Journal Article LBNL Report Number LBNL-6461E Year of Publication 2013 Authors Zuo, Wangda, Andrew McNeil, Michael Wetter, and Eleanor S. Lee Journal Journal of Building Performance Simulation Keywords daylighting simulation, graphics processing unit, multicore central processing unit, OpenCL, parallel computing Abstract Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach was evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.

329

SIC (MUltiple SIgnal Classification) CSP (Cross-power Spectrum Phase)  

E-Print Network (OSTI)

2ch CSP ( ) 1 MU- SIC (MUltiple SIgnal Classification) CSP (Cross- power Spectrum Phase) [1, 2, 3, 4] [5, 6] [7, 8, 9, 10] [7] CSP CSP [8] [9] CSP [10] Estimation of talker's head orientation based (Kobe univ.) [11] 2ch CSP CSP CSP CSP 2 CSP GCC-PHAT (Generalized Cross- Correlation PHAse Transform

Takiguchi, Tetsuya

330

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and  

E-Print Network (OSTI)

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and developmental processes China Received 26 January 2006; Accepted 20 April 2006 Abstract The scaffold protein RACK1 (Receptor. The Arabidopsis ge- nome contains three RACK1 orthologues, however, little is known about their functions

Jones, Alan M.

331

MULTIPLE CLASSIFIERS FOR ELECTRONIC NOSE DATA M. Pardo, G. Sberveglieri  

E-Print Network (OSTI)

of two groups of coffees (blends and monovarieties). The main idea of boosting is to produce a sequence for combining the predictions of multiple classifiers (briefly called ensembles) to produce a single classifier Certified Espresso (ICE)) and of 6 single varieties (SV) plus the ICE. The food manufacturing sector is one

Masulli, Francesco

332

Multiple Non-Thermal Reaction Steps for the Photooxidation CO...  

NLE Websites -- All DOE Office Websites (Extended Search)

Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110). Multiple Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110)....

333

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network (OSTI)

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict- ing the occupancy of a building using networks of people-counting sensors-sensor probabilistic model for building occupancy. Inference for the oc- cupancy model follows in Section 4

Smyth, Padhraic

334

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network (OSTI)

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict­ ing the occupancy of a building using networks of people­counting sensors­sensor probabilistic model for building occupancy. Inference for the oc­ cupancy model follows in Section 4

Ihler, Alexander

335

Instability of single-phase natural circulation under multiple loops  

SciTech Connect

Natural circulation loop passively conveys heat from heat sources to heat sinks without mechanical pump. Various plants have natural circulation systems, e.g., solar heaters, Light Water Reactor (LWR) and Liquid Metal Fast Breeder Reactor (LMFBR). The core of LMFBR is cooled by forced convection of single-phase liquid sodium in normal operation. After the accident, the decay heat of the core is designed to be cooled by the natural circulation of the liquid sodium. The natural circulation cooling is very important from a viewpoint of passive safety concept. Here, the natural circulation in single loop system had been studied by many researchers. In a multiple loop system, the instability of natural circulation was more complicated because of the interaction between the loops. In this study, the effects of the multiple loop on the natural circulation instability were investigated numerically. The multiple loops system with one heating tube and two cooling tubes were evaluated. The one-dimensional energy and momentum equations were solved using Finite Difference Method. The flow regimes of the instability were evaluated with varying the heat flux. In multiple loop system, the observed flow was classified into five regimes including chaotic regime. The flow regimes were qualitatively explained by the stability of the attractor in the phase space.

Satoh, A.; Okamoto, K.; Madarame, H. [Univ. of Tokyo, Tokai, Ibaraki (Japan). Nuclear Engineering Research Lab.

1996-08-01T23:59:59.000Z

336

Distributed event notification in VANET with multiple service providers  

Science Journals Connector (OSTI)

Many future applications in vehicular networks will be event-driven and will require events generated at different parts of a city to be delivered to moving vehicles in time. We propose a distributed framework for efficient event dissemination with multiple ... Keywords: VANET, distributed event notification, publish-subscribe

Joy Chandra Mukherjee, Saurabh Agarwal, Arobinda Gupta

2014-05-01T23:59:59.000Z

337

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs  

E-Print Network (OSTI)

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

Prasanna, Viktor K.

338

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Officers' Training Corps experience...unmanned vehicle operating environments...multiple personnel responsible...impact of training on boredom...domains, personnel selection is of practical...personnel selection considerations...stimulate personnel, such as...on-the-job training or possibly......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

339

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents (OSTI)

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

Olson, J.M.; Kurtz, S.R.

1992-11-24T23:59:59.000Z

340

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences  

E-Print Network (OSTI)

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences Roman R. Stocsits1 , Ivo L Fe Institute, 1399 Hyde Park Rd., Santa Fe NM 87501, USA Email: Roman R. Stocsits - roman of the available sequence data was pre- sented very recently [12]. SARGLSSTVSLGQFEHWSPR NARNLSDTVS

Stadler, Peter F.

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Fast Machine Code for Modular Multiplication Michael Scott  

E-Print Network (OSTI)

Fast Machine Code for Modular Multiplication Michael Scott School of Computer Applications Dublin, that is the calculation of a = b e mod n where for acceptable levels of security a, b, e, and n are large multiprecision will be not much larger than the number of bits in the binary representation of e. Therefore fast modular

Bernstein, Daniel

342

Predicting Operator Capacity for Supervisory Control of Multiple UAVs  

E-Print Network (OSTI)

Predicting Operator Capacity for Supervisory Control of Multiple UAVs M.L. Cummings, C. E. Nehme, J, uninhabited (also known as unmanned) ae- rial vehicles (UAVs) have become indispensable assets to militarized forces. UAVs require human guidance to varying degrees and often through several operators. However

Cummings, Mary "Missy"

343

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network (OSTI)

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

344

Multiple Field of View MR Fluoroscopy Pelin Aksit,1  

E-Print Network (OSTI)

Multiple Field of View MR Fluoroscopy Pelin Aksit,1 J. Andrew Derbyshire,2 Jean-Michel Serfaty,1 by several investigators (1� 8). Intravascular MR compares favorably with other clini- cal diagnostic methods and Ergin Atalar1* This work describes a real-time imaging and visualization tech- nique that allows

Atalar, Ergin

345

Coordination of multiple appendages in drag-based swimming  

Science Journals Connector (OSTI)

...appendages for multi-oared propulsion. The typical Reynolds number...another example of drag-based propulsion with multiple appendages...of Bill Peterson, Hatfield Marine Center, Newport, OR...of a body with drag-based propulsion. The model provides a quantitative...

2010-01-01T23:59:59.000Z

346

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network (OSTI)

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

347

Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer  

E-Print Network (OSTI)

to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Sinha, Prasun

348

Method and system of integrating information from multiple sources  

DOE Patents (OSTI)

A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

Alford, Francine A. (Livermore, CA); Brinkerhoff, David L. (Antioch, CA)

2006-08-15T23:59:59.000Z

349

Multiple copy distillation and purification of phase diffused squeezed states  

E-Print Network (OSTI)

We provide a detailed theoretical analysis of multiple copy purification and distillation protocols for phase diffused squeezed states of light. The standard iterative distillation protocol is generalized to a collective purification of an arbitrary number of N copies. We also derive a semi-analytical expression for the asymptotic limit of the iterative distillation and purification protocol and discuss its properties.

Petr Marek; Jaromir Fiurasek; Boris Hage; Alexander Franzen; James DiGugliemo; Roman Schnabel

2007-08-10T23:59:59.000Z

350

Quantitative crystal structure descriptors from multiplicative congruential generators  

Science Journals Connector (OSTI)

Certain number-theoretic relations, known as multiplicative congruential generators, are developed into quantitative crystal structure descriptors, facilitating a linearization procedure that eventually allows for a concise, fully reconstructable representation of structural information. Potential applications are related to the computational storage, retrieval and analysis of crystal structures, their algorithmic generation in the first place, and their combinatorial enumeration and classification.

Hornfeck, W.

2012-01-12T23:59:59.000Z

351

Multiple Whole Genome Alignments Without a Reference Organism  

SciTech Connect

Multiple sequence alignments have become one of the most commonly used resources in genomics research. Most algorithms for multiple alignment of whole genomes rely either on a reference genome, against which all of the other sequences are laid out, or require a one-to-one mapping between the nucleotides of the genomes, preventing the alignment of recently duplicated regions. Both approaches have drawbacks for whole-genome comparisons. In this paper we present a novel symmetric alignment algorithm. The resulting alignments not only represent all of the genomes equally well, but also include all relevant duplications that occurred since the divergence from the last common ancestor. Our algorithm, implemented as a part of the VISTA Genome Pipeline (VGP), was used to align seven vertebrate and sixDrosophila genomes. The resulting whole-genome alignments demonstrate a higher sensitivity and specificity than the pairwise alignments previously available through the VGP and have higher exon alignment accuracy than comparable public whole-genome alignments. Of the multiple alignment methods tested, ours performed the best at aligning genes from multigene families?perhaps the most challenging test for whole-genome alignments. Our whole-genome multiple alignments are available through the VISTA Browser at http://genome.lbl.gov/vista/index.shtml.

Dubchak, Inna; Poliakov, Alexander; Kislyuk, Andrey; Brudno, Michael

2009-01-16T23:59:59.000Z

352

Robust Retrospective Multiple Change-point for Multivariate Data  

E-Print Network (OSTI)

on a test statistic that generalizes the well- known Kruskal-Wallis procedure to the multivariate setting noise levels and/or high-dimensional data. Keywords: Change-point estimation, multivariate data, Kruskal-Wallis as to deal with multiple change-points (in analogy with the way the classical Kruskal-Wallis test generalizes

Paris-Sud XI, Université de

353

Anatomy of High-Performance Many-Threaded Matrix Multiplication  

Science Journals Connector (OSTI)

BLIS is a new framework for rapid instantiation of the BLAS. We describe how BLIS extends the "GotoBLAS approach" to implementing matrix multiplication (GEMM). While GEMM was previously implemented as three loops around an inner kernel, BLIS exposes ... Keywords: linear algebra, libraries, high-performance, matrix, BLAS, multicore

Tyler M. Smith, Robert van de Geijn, Mikhail Smelyanskiy, Jeff R. Hammond, Field G. Van Zee

2014-05-01T23:59:59.000Z

354

A simple model of multiple climate regimes Kerry Emanuel  

E-Print Network (OSTI)

, and Climate, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA Received 28 June 2001 to a roughly 30% increase in solar insolation over the life of the planet. To this enigma may be added to produce multiple equilibrium states for the same solar forcing. Here we present a simple model

Emanuel, Kerry A.

355

Climate determinism revisited: multiple equilibria in a complex climate model  

E-Print Network (OSTI)

Marshall and Brian Rose Department of Earth, Atmospheric and Planetary Science, Massachusetts Institute of Technology, Cambridge, Massachusetts June 17th, 2010 Submitted to Journal of Climate Corresponding author by incoming solar radiation at the top of the atmosphere. We demonstrate that the multiple equilibria owe

Marshall, John

356

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network (OSTI)

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

357

Extending wordnets by learning from multiple resources Benot Sagot+  

E-Print Network (OSTI)

Extending wordnets by learning from multiple resources Benoît Sagot+ , Darja Fiser* + Alpage, INRIA In this paper we present an automatic, language-independent approach to extend an existing wordnet by recycling existing freely available bilingual resources, such as machine-readable dictionaries and on

Paris-Sud XI, Université de

358

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE  

E-Print Network (OSTI)

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE Peter Cariani Eaton Peabody Laboratory@epl.meei.harvard.edu; www.cariani.com ABSTRACT One aspect of tonal consonance relevant to the pitch stability of chords and harmonic tension concerns the degree to which a collection of notes produces a unified, strong low pitch

Cariani, Peter

359

Social Choice Theory Decision Models with Multiple Criteria  

E-Print Network (OSTI)

Social Choice Theory Decision Models with Multiple Criteria Elise Bonzon 2013-2014 LIPADE / 39 Social Choice Theory #12;Social choice theory Social choice theory Research of a mechanism Choice Theory #12;Social choice theory Social choice theory Research of a mechanism (electoral system

Bonzon, Elise

360

Gary Feldman 1 Fermilab Workshop Multiple Measurements and  

E-Print Network (OSTI)

Gary Feldman 1 Fermilab Workshop Multiple Measurements and Parameters in the Unified Approach Gary Feldman Workshop on Confidence Limits Fermilab March 28, 2000 #12;Gary Feldman 2 Fermilab Workshop Origins Feldman 3 Fermilab Workshop Lack of Uniformly Most Powerful Test · Error of the first kind: Rejecting

Feldman, Gary

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci  

E-Print Network (OSTI)

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci Lee Altenberg altenber of the reduction principle is found: reduction results at individual loci combine topologically to produce to the reduction principle, and under fine tuning of mutation rates would be expected to have higher mutation rates

Altenberg, Lee

362

Development of a Public Key Infrastructure across Multiple Enterprises  

Science Journals Connector (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infra-structure among multiple ...

B. J. Desind; T. M. Sharick; J. P. Long; B. J. Wood

1997-06-01T23:59:59.000Z

363

Nonlinear voltages in multiple-lead coherent conductors  

Science Journals Connector (OSTI)

We use the generalized S-matrix approach to study multiple-lead coherent conductors in the case of finite applied voltages. In this framework we discuss the transverse voltage arising in a four-lead conductor with two symmetric biased leads.

Gordey B. Lesovik and Carlo Presilla

1993-01-15T23:59:59.000Z

364

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Impact in Multiple Unmanned Vehicle Supervisory Control. IEEE...Inverting the Operator/Vehicle Ratio: Approaches to Next...the Association for Unmanned Vehicle Systems International and Flight...592-600. Gibson J.J. The Ecological Approach to Visual Perception......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

365

Environmental Boundary Tracking and Estimation Using Multiple Autonomous Vehicles  

E-Print Network (OSTI)

and Andrea L. Bertozzi Abstract-- In this paper, we develop a framework for envi- ronmental boundary tracking from multiple sensing vehicles. For each vehicle, a tracking algorithm is developed based on Page, harmful algae blooms, wild fire spreading, temperature and salinity distribution in the ocean

Soatto, Stefano

366

RECENT FIELD EXPERIENCE WITH MULTIPLE COOPERATING SOLAR-POWERED AUVS  

E-Print Network (OSTI)

, the operator would typically observe which SAUV had the most energy reserve based on its acoustic status packets and decide to employ the one with the most energy reserve. The operator would then go through a set of enabling tools and technologies which allow us to test and evaluate multiple cooperating AUVs

367

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd  

E-Print Network (OSTI)

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd Dept. of Computer Science University of Calgary Calgary AB T2N 1N4 boyd@cpsc.ucalgary.ca Jean Meloche Department of StatisticsDonald and Owen [8] and Hall and Tit­ terington [6]. Similarly, Meloche and Zamar [9] and Boyd and Meloche [3

Boyd, Jeffrey E.

368

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom  

E-Print Network (OSTI)

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom President Spectral Applied Research (905 with CRESTech and the University of Waterloo, has developed a low-cost digital sun sensor for satellite attitude each field-of-view. The Sun is a nearly collimated source and produces a spot on the array via

Hornsey, Richard

369

Optimal sequencing of a cooling tower with multiple cells  

E-Print Network (OSTI)

This paper evaluates the energy savings potential of multi-cell cooling tower optimal sequencing control methods. Annual tower fan energy usage is calculated for a counter-flow tower with multiple variable-speed fans. Effectiveness-NTU tower model...

Zhang, Z.; Liu, J.

2012-01-01T23:59:59.000Z

370

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE  

E-Print Network (OSTI)

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE David K McGookin Department://www.dcs.gla.ac.uk/~mcgookdk ABSTRACT In this paper work to improve upon the design of structured audio messages called Earcons for use in a concurrent spatialised audio environment is described. Issues involving the limitations of current Earcon

McGookin, David

371

ARM - Publications: Science Team Meeting Documents: Single and Multiple  

NLE Websites -- All DOE Office Websites (Extended Search)

Single and Multiple scattering in optically thick multifractal clouds Single and Multiple scattering in optically thick multifractal clouds Grosdidier, Yves McGill University Lovejoy, Shaun McGill University Watson, Brian St. Lawrence University, Physics Department Schertzer, Daniel Ecole Nationale des Ponts et Chauss'es Satellite studies have shown that cloud radiances (at both visible and infra red wavelengths) are scale invariant over scales spanning much of the meteorologically significant range, and airborne lidar data have shown that vertical cross sections of passive scalar clouds are also scaling but with quite different exponents in the horizontal and vertical directions (quantified by an "elliptical dimension" = Del-23/9 close to the empirical value 2.55±0.02). This multifractality is the result of huge

372

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams  

NLE Websites -- All DOE Office Websites (Extended Search)

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Richard Parker,. Parker Geoscience Consulting, LLC, Arvada, Colorado, USA; Zhiyue Xu and Claude Reed, Argonne National Laboratory, Argonne, Illinois, USA; Ramona Graves, Department of Petroleum Engineering, Colorado School of Mines, Golden, Colorado, USA; Brian Gahan and Samih Batarseh, Gas Technology Institute, Des Plaines, Illinois, USA ABSTRACT Studies on drilling petroleum reservoir rocks with lasers show that modern infrared lasers have the capability to spall (thermally fragment), melt and vaporize natural earth materials with the thermal spallation being the most efficient rock removal mechanism. Although laser irradiance as low as 1000 W/cm 2 is sufficient to spall rock, firing the

373

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Multiple Title: ADAS System Life Cycle Support, 2012-2015 Description: Subcontractor shall provide annual telephone support and hardware/software update support for the ARINC AIM alarm display and annunciation system (ADAS) security systems used at the SPR from 2012-2015. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment (categorical exclusions). (b) To find that a proposal is categorically excluded, DOE shall determine the following: (1) The proposed action fits within a class of actions that is listed in Appendix A or B of Subpart D;

374

Benefits of the Multiple Echo Technique for Ultrasonic Thickness Testing  

SciTech Connect

Much effort has been put into determining methods to make accurate thickness measurements, especially at elevated temperatures. An accuracy of +/- 0.001 inches is typically noted for commercial ultrasonic thickness gauges and ultrasonic thickness techniques. Codes and standards put limitations on many inspection factors including equipment, calibration tolerance and temperature variations. These factors are important and should be controlled, but unfortunately do not guarantee accurate and repeatable measurements in the field. Most technicians long for a single technique that is best for every situation, unfortunately, there are no 'silver bullets' when it comes to nondestructive testing. This paper will describe and discuss some of the major contributors to measurement error as well as some advantages and limitations of multiple echo techniques and why multiple echo techniques should be more widely utilized for ultrasonic thickness measurements.

Elder, J.; Vandekamp, R.

2011-02-10T23:59:59.000Z

375

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network (OSTI)

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative ...

Bacchetta, Alessandro; Radici, Marco; Signori, Andrea

2014-01-01T23:59:59.000Z

376

Self-organizing traffic lights at multiple-street intersections  

E-Print Network (OSTI)

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

377

Grouping Parts for Multiple Parts Production in Additive Manufacturing  

Science Journals Connector (OSTI)

Abstract Rapid prototyping (RP) has evolved to Additive Manufacturing (AM) in recent years. It can produce functional or end-use parts with small or even medium quantities. And further, due to its unique layer-by-layer construction principle, it can produce different parts at the same time in a same AM machine. To improve the productivity and machine utilization of AM processes under multiple parts production context, this paper propose the conception of ‘Grouping parts’. Based on the Group Technology (GT) used in traditional processing technologies, a modified Group Technology for AM under multiple parts manufacturing context is presented. To group parts, a set of key attributes affecting the AM production time, cost, quality and work preparation are identified to represent the parts, and then a Grey Clustering method is adopted to conduct the similarity analysis. A simple case study is presented in the end to illustrate the proposed conception and its methodology.

Yicha Zhang; Alain Bernard

2014-01-01T23:59:59.000Z

378

An efficient parallel algorithm for matrix-vector multiplication  

SciTech Connect

The multiplication of a vector by a matrix is the kernel computation of many algorithms in scientific computation. A fast parallel algorithm for this calculation is therefore necessary if one is to make full use of the new generation of parallel supercomputers. This paper presents a high performance, parallel matrix-vector multiplication algorithm that is particularly well suited to hypercube multiprocessors. For an n x n matrix on p processors, the communication cost of this algorithm is O(n/[radical]p + log(p)), independent of the matrix sparsity pattern. The performance of the algorithm is demonstrated by employing it as the kernel in the well-known NAS conjugate gradient benchmark, where a run time of 6.09 seconds was observed. This is the best published performance on this benchmark achieved to date using a massively parallel supercomputer.

Hendrickson, B.; Leland, R.; Plimpton, S.

1993-03-01T23:59:59.000Z

379

Herbig AeBe stars: Multiplicity and consequences  

E-Print Network (OSTI)

By virtue of their young age and intermediate mass, Herbig AeBe stars represent a cornerstone for our understanding of the mass-dependency of both the stellar and planetary formation processes. In this contribution, I review the current state-of-the-art multiplicity surveys of Herbig AeBe stars to assess both the overall frequency of companions and the distribution of key orbital parameters (separation, mass ratio and eccentricity). In a second part, I focus on the interplay between the multiplicity of Herbig AeBe stars and the presence and properties of their protoplanetary disks. Overall, it appears that both star and planet formation in the context of intermediate-mass stars proceeds following similar mechanisms as lower-mass stars.

Duchene, Gaspard

2014-01-01T23:59:59.000Z

380

Dynamic evolutions of multiple toroidal Alfvén eigenmodes with energetic particles  

SciTech Connect

Kinetic simulations based on a reduced model are carried out to study dynamic evolutions of multiple toroidicity-induced shear Alfvén eigenmodes driven by energetic particles. It is found that passing and trapped particles play quite different roles on the mode evolution. For cases without background damping, passing particles lead to a longer linear growth phase and subsequent enhancement of the nonlinear saturation level when resonant regions with two modes are closely overlapped. On the other hand, trapped particles are mainly responsible for the persistent mode growth in the nonlinear phase. By comparing the results from anisotropic and isotropic simulations, it is suggested that passing particles have a negative impact on the mode development in the nonlinear phase. For the near marginal stability cases with large background damping, the upward and downward frequency chirping in multiple branches are significantly affected by the multi-mode interaction due to overlapping of hole and clump in the distribution function.

Zhu, J.; Ma, Z. W. [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China)] [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China); Fu, G. Y. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)] [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)

2013-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Identification of Severe Multiple Contingencies in Electric PowerSystems  

SciTech Connect

In this work, we propose a computationally feasible approachtodetect severe multiple contingencies. We pose a contingency analysisproblem using a nonlinear optimization framework, which enables ustodetect the fewest possible transmission line outages resulting ina systemfailure of specified severity, and the most severe system failure causedby removing a specified number of transmission lines from service.Illustrations using a three bus system and the IEEE ~;30 bus system aimto exhibit the effectiveness of the proposed approach.

Donde, Vaibhav; Lopez, Vanessa; Lesieutre, Bernard; Pinar, Ali; Yang, Chao; Meza, Juan

2006-06-14T23:59:59.000Z

382

Multiple-state quantum Otto engine, 1D box system  

SciTech Connect

Quantum heat engines produce work using quantum matter as their working substance. We studied adiabatic and isochoric processes and defined the general force according to quantum system. The processes and general force are used to evaluate a quantum Otto engine based on multiple-state of one dimensional box system and calculate the efficiency. As a result, the efficiency depends on the ratio of initial and final width of system under adiabatic processes.

Latifah, E., E-mail: enylatifah@um.ac.id [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya, Indonesia and Physics Department, Malang State University (Indonesia); Purwanto, A. [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya (Indonesia)

2014-03-24T23:59:59.000Z

383

Code division multiple access signaling for modulated reflector technology  

DOE Patents (OSTI)

A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

Briles, Scott D. (Los Alamos, NM)

2012-05-01T23:59:59.000Z

384

Multiple-well testing in low permeability gas sands  

SciTech Connect

The purpose of this work was to determine the effect of various reservoir and well parameters in order to design a multiple-well pressure transient test to be conducted in low permeability, porosity, gas saturation, net pay thickness and well spacing. Long test times were found to be required for interference or pulse testing in low permeability gas reservoirs; however, the well spacing has been optimized. These calculations were made using two techniques: interference testing and pulse testing.

Bixel, H.; Carroll, H.B. Jr.; Crawley, A.

1980-10-01T23:59:59.000Z

385

Lenalidomide after Stem-Cell Transplantation for Multiple Myeloma  

Science Journals Connector (OSTI)

...survival. Lenalidomide maintenance may increase the time to progression in patients who do not have complete remission after induction therapy and transplantation, thus generating outcomes similar to those for patients with complete remission. Although the response criteria of the International Myeloma... A goal of therapy for multiple myeloma, to induce complete remission and prolong survival, is usually accomplished with combination therapy.1,2 Autologous hematopoietic stem-cell transplantation is often used after induction chemotherapy to improve the ...

McCarthy P.L.; Owzar K.; Hofmeister C.C.

2012-05-10T23:59:59.000Z

386

Multiple-scattering effects on smooth neutron-scattering spectra  

Science Journals Connector (OSTI)

Elastic and inelastic incoherent neutron-scattering experiments are simulated for simple models: a rigid solid (as used for normalization), a glass (with a smooth distribution of harmonic vibrations), and a viscous liquid (described by schematic mode-coupling equations). In cases where the input scattering law factorizes into a wave-number-dependent amplitude and a frequency-dependent spectral distribution, the latter is only weakly affected by multiple scattering, whereas the former is severely distorted.

Joachim Wuttke

2000-11-01T23:59:59.000Z

387

Optimal Power Sharing for Microgrid with Multiple Distributed Generators  

Science Journals Connector (OSTI)

Abstract This paper describes the active power sharing of multiple distributed generators (DGs) in a microgrid. The operating modes of a microgrid are 1) a grid-connected mode and 2) an autonomous mode. During islanded operation, one DG unit should share its output power with other DG units in exact accordance with the load. Unit output power control (UPC) is introduced to control the active power of DGs. The viability of the proposed power control mode is simulated by MATLAB/SIMULINK.

V. Logeshwari; N. Chitra; A. Senthil Kumar; Josiah Munda

2013-01-01T23:59:59.000Z

388

Multiple Compressions in the Middle Energy Plasma Focus Device  

Science Journals Connector (OSTI)

This paper reports some of the results that are aimed to investigate the neutron emission from the middle energy Mather?type plasma focus. These results indicated that with increase the pressure compression time is increase but there is not any direct relation between the compression time and neutron yield. Also it seems that multiple compression regimes is occurred in low pressure and single compression is appeared at higher pressure where is the favorable to neutron production.

H. R. Yousefi; Y. Ejiri; H. Ito; K. Masugata

2006-01-01T23:59:59.000Z

389

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments (OSTI)

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

390

Multiple Reference Fourier Transform Holography: Five Images for the Price  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Reference Fourier Transform Multiple Reference Fourier Transform Holography: Five Images for the Price of One Improving the quality of a high magnification image on an optical microscope is simply a matter of cranking up the intensity of the illumination lamp. The same is true for x-ray microscopes, but complications arise when there just aren't enough x-rays or even worse when the sample is susceptible to damage caused by the intense x-ray beam. To address these challenges we have demonstrated a novel technique for improving the quality of a microscopic image without increasing the x-ray exposure to the specimen. This affords new opportunities to explore materials prone to soft x-ray damage, like polymer or biological samples. Our technique uses coherent x-ray scattering to simultaneously acquire multiple images of a specimen, which can easily be combined later to enhance the image quality. Applying our technique in the weak illumination limit we imaged a nanoscale test object by detecting only 2500 photons.

391

Multiple reheat helium Brayton cycles for sodium fast reactors  

SciTech Connect

Sodium fast reactors (SFR) traditionally adopt the steam Rankine cycle for power conversion. The resulting potential for water-sodium reaction remains a continuing concern which at least partly delays the SFR technology commercialization and is a contributor to higher capital cost. Supercritical CO2 provides an alternative, but is also capable of sustaining energetic chemical reactions with sodium. Recent development on advanced inert-gas Brayton cycles could potentially solve this compatibility issue, increase thermal efficiency, and bring down the capital cost close to light water reactors. In this paper, helium Brayton cycles with multiple reheat and intercooling states are presented for SFRs with reactor outlet temperatures in the range of 510°C to 650°C. The resulting thermal efficiencies range from 39% and 47%, which is comparable with supercritical recompression CO2 cycles (SCO2 cycle). A systematic comparison between multiple reheat helium Brayton cycle and the SCO2 cycle is given, considering compatibility issues, plant site cooling temperature effect on plant efficiency, full plant cost optimization, and other important factors. The study indicates that the multiple reheat helium cycle is the preferred choice over SCO2 cycle for sodium fast reactors.

Haihua Zhao; Per F. Peterson

2008-07-01T23:59:59.000Z

392

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

393

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

394

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production, and Tradeoffs at Landscape Scales  

E-Print Network (OSTI)

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production ECOSYSTEM SERVICES_ 4 o Modeling multiple ecosystem services, biodiversity conservation, commodity tradeoff between biodiversity conservation and J?l ecosystem services. Scenarios involving more development

Vermont, University of

395

Distribution of Four-Momentum Transfer in Multiple Meson Productions by High Energy Muons  

Science Journals Connector (OSTI)

......Multiple Meson Productions by High Energy Muons S. Higashi T. Kitamura Y. Mishima...Multiple Meson Productions by High Energy Muons S. Higashi, T. Kitamura, Y...production. Provided that the high energy muon-nucleon inter- actions occur......

S. Higashi; T. Kitamura; Y. Mishima; S. Miyamoto; H. Shibata; Y. Watase; K. Daiyasu; K. Kobayakawa; T. Murota; T. Nakano

1964-01-01T23:59:59.000Z

396

Analysis of oil-pipeline distribution of multiple products subject to delivery time-windows  

E-Print Network (OSTI)

This dissertation defines the operational problems of, and develops solution methodologies for, a distribution of multiple products into oil pipeline subject to delivery time-windows constraints. A multiple-product oil pipeline is a pipeline system...

Jittamai, Phongchai

2006-04-12T23:59:59.000Z

397

Supersymmetric and Kaluza-Klein Particles Multiple Scattering in the Earth  

E-Print Network (OSTI)

http://en.wikipedia.org/wiki/Earth#Chemical composition [12]Multiple Scattering in the Earth The IceCube CollaborationMultiple Scattering in the Earth Ivone F. M. Albuquerque

Albuquerque, Ivone

2009-01-01T23:59:59.000Z

398

Automated metal-free multiple-column nanoLC for improved phosphopeptid...  

NLE Websites -- All DOE Office Websites (Extended Search)

metal-free multiple-column nanoLC for improved phosphopeptide analysis sensitivity and throughput. Automated metal-free multiple-column nanoLC for improved phosphopeptide analysis...

399

Propagation models for multiple-antenna systems : methodology, measurements and statistics  

E-Print Network (OSTI)

The trend in wireless communications is towards utilization of multiple antenna systems. While techniques such as beam-forming and spatial diversity have been implemented for some time, the emergence of Multiple-Input ...

Herring, Keith, 1981-

2008-01-01T23:59:59.000Z

400

Low-coherence doppler lidar with multiple time coherence of reference and probe waves  

Science Journals Connector (OSTI)

The notion of multiple time coherence of optical beams is introduced and mathematically ... pulses (MFPs), which exhibit multiple time coherence, and the possibility of their application for ... is based on nanos...

G. G. Matvienko; S. N. Polyakov; V. K. Oshlakov

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

GenomeCons: a web server for manipulating multiple genome sequence alignments and their consensus sequences  

Science Journals Connector (OSTI)

......December 2014 brief-report Applications Note GenomeCons: a web server for manipulating multiple genome sequence alignments and...molecular biological processes. In this study, we developed a web server, GenomeCons, for manipulating multiple genome sequence......

Tetsuya Sato; Mikita Suyama

2014-12-01T23:59:59.000Z

402

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...Reserved. April 2014 research-article Articles Multiple Nuclear Localization Signals...multiple conserved nuclear localization signals...sequence was analyzed for nuclear localization signals using the PSORTII program (51), which identifies...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

403

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...April 2014 research-article Articles Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor...Sequence analysis of AreA revealed multiple nuclear localization signals (NLSs), five putative...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

404

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

405

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodolog...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific...

406

E-Print Network 3.0 - aplastic anaemia multiple Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

multiple organ systems, especially in immunosuppressed patients. We Source: Steinbach, Joe Henry - Washington University Pain Center & Department of Anesthesiology, Washington...

407

Linear demultiple solution based on bottom-multiple generator (BMG) approximation: subsalt example  

E-Print Network (OSTI)

convolution of bpa with a0 ......................................... 29 3.7 An illustration of free-surface multiples not predicted in the two steps of the BMG demultiple technique. Note that these types of free-surface multiples are usually............................ 42 4.8 An example of the field of predicted free-surface multiples obtained from the multidimensional convolution of bpa with a 0...

Oladeinde, Abiola Omobolaji

2006-10-30T23:59:59.000Z

408

Microfluidic device for delivery of multiple inks for dip pen nanolithography  

E-Print Network (OSTI)

Microfluidic device for delivery of multiple inks for dip pen nanolithography Juan Alberto Rivas of a microfluidic ink delivery device for delivering multiple species of inks to an array of multiple pens, as well as for maximizing the number of inks for simulta- neous patterning by DPN. The microfluidic device called "Centiwell

Banerjee, Debjyoti

409

Fire-Balls in Pion Multiple Production: Brasil-Japan Collaboration of Chacaltaya Emulsion Chamber Experiment  

Science Journals Connector (OSTI)

......disc-shaped dense gas of mutually interacting...Fire-Balls zn Pion Multiple Production 3 dose not immediately...mechanism of multiple production of mesons is kept essentially...in comparison to its cost. Already in 1968...events of multiple pion production--into the two types......

Jose A. Chinellato; Carola Dobrigkeit; J. Bellandi Filho; Cesar M. G. Lattes; Marcio J. Menon; Carlos E. Navia O.; Ammiraju Pemmaraju; Kotaro Sawayanagi; Edison H. Shibuya; Armando Turtelli; Jr.; Neuza M. Amato; Naoyuki Arata; F. M. Oliveira Castro; Regina H. C. Maldonado; Hiroshi Aoki; Yoichi Fujimoto; Shunichi Hasegawa; Hiroshi Semba; Masanobu Tamada; Kojiro Tanaka; Seibun Yamashita; Toru Shibata; Kei Yokoi; Hiroshi Kumano; Akinori Ohsawa; Takaaki Tabuki

1983-03-01T23:59:59.000Z

410

DOE Designated User Facilities Multiple Laboratories * ARM Climate Research Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Designated User Facilities Designated User Facilities Multiple Laboratories * ARM Climate Research Facility Argonne National Laboratory * Advanced Photon Source (APS) * Electron Microscopy Center for Materials Research * Argonne Tandem Linac Accelerator System (ATLAS) * Center for Nanoscale Materials (CNM) * Argonne Leadership Computing Facility (ALCF) * Brookhaven National Laboratory * National Synchrotron Light Source (NSLS) * Accelerator Test Facility (ATF) * Relativistic Heavy Ion Collider (RHIC) * Center for Functional Nanomaterials (CFN) * National Synchrotron Light Source II (NSLS-II ) (under construction) Fermi National Accelerator Laboratory * Fermilab Accelerator Complex Idaho National Laboratory * Advanced Test Reactor ** * Wireless National User Facility (WNUF)

411

Multiple piece turbine engine airfoil with a structural spar  

DOE Patents (OSTI)

A multiple piece turbine airfoil having an outer shell with an airfoil tip that is attached to a root with an internal structural spar is disclosed. The root may be formed from first and second sections that include an internal cavity configured to receive and secure the one or more components forming the generally elongated airfoil. The internal structural spar may be attached to an airfoil tip and place the generally elongated airfoil in compression. The configuration enables each component to be formed from different materials to reduce the cost of the materials and to optimize the choice of material for each component.

Vance, Steven J. (Orlando, FL)

2011-10-11T23:59:59.000Z

412

Muon multiplicity at high energy proton-nuclei collisions  

E-Print Network (OSTI)

Estimation of multiplicity of muons and pions production at high energy proton-nuclei collisions is given. Both QED and QCD contributions are considered for peripheral kinematics of muon pair and $\\sigma$-meson production, keeping in mind it's final conversion to muons. An attempt to explain the excess of positive charged muons compared to negative one in cosmic muon showers is given. We derive the dependence of cross-section of $n$ pairs as a function of $n$ at large n as $d^n(n!n^2)^{-1}$.

E. A. Kuraev; S. Bakmaev; V. Bytev; E. Kokoulina

2007-06-29T23:59:59.000Z

413

Multiple thresholds in a model system of noisy ion channels  

Science Journals Connector (OSTI)

Voltage-activated ion channels vary randomly between open and closed states, influenced by the membrane potential and other factors. Signal transduction is enhanced by noise in a simple ion channel model. The enhancement occurs in a finite range of signals; the range can be extended using populations of channels. The range increases more rapidly in multiple-threshold channel populations than in single-threshold populations. The diversity of ion channels may thus be present as a strategy to reduce the metabolic costs of handling a broad class of electrochemical signals.

Michael J. Barber and Manfred L. Ristig

2006-10-19T23:59:59.000Z

414

Probing Aerogels by Multiple Quantum Filtered 131Xe NMR Spectroscopy  

Science Journals Connector (OSTI)

This is demonstrated in Figure 1 where four pulse sequences using multiple quantum filters are shown. ... Pyrex tube at 7.4 T, 1.2 MPa, and 298 K:? (a) double-quantum filtered pulse sequence, (b) magic-angle double-quantum filter which is a T2,±1 pulse sequence, (c) triple-quantum filtered sequence, and (d) triple-quantum filtered inversion recovery pulse sequence. ... 14-16 The tubes have been filled with aerogel fragments of a few millimeter diameter and were pressurized with xenon to about 6.9 MPa at 298 K to create supercritical conditions. ...

Thomas Meersmann; Michaël Deschamps; Geoffrey Bodenhausen

2001-01-13T23:59:59.000Z

415

Multiple Energy Exciton Shelves in Quantum-Dot–DNA Nanobioelectronics  

Science Journals Connector (OSTI)

The DNA molecules joining the QDs form an energetic bridge that provides an efficient conduction pathway for the different energy carriers, capturing the hot electron before it can cool to the bandedge via nonradiative relaxation. ... Interband optical excitation of PbSe NCs at low pump intensities, for which less than one exciton is initially generated per NC on average, results in the formation of two or more excitons (carrier multiplication) when pump photon energies are more than 3 times the NC band gap energy. ...

Samuel M. Goodman; Vivek Singh; Josep Casamada Ribot; Anushree Chatterjee; Prashant Nagpal

2014-10-24T23:59:59.000Z

416

Multiple scattering approach to one?dimensional potential problems  

Science Journals Connector (OSTI)

By calculating the reflection and transmission coefficients for a square potential barrier in terms of a series of scatterings at step potential discontinuities a multiple scattering approach to potential problems is presented. This approach is applied to WKB potential problems by interpreting the WKB connection formulas in terms of reflection and transmission coefficients at each turning point. An algorithm for the systematic construction of the energy Green’s function is given. The significance of complex coordinate turning points is demonstrated. The equivalence of this approach and that of the Gaussian approximation of the path integral is mentioned briefly.

Arlen Anderson

1989-01-01T23:59:59.000Z

417

Magazine system for multiple sample transport from air into UHV  

Science Journals Connector (OSTI)

The time required to exchange specimens in a UHV system can be reduced considerably by a sample airlock. A low-cost sample exchange system is described which was originally constructed for an Auger spectrometer, but may be applied to other UHV systems as well. The essential parts are a magnetically coupled transfer rod, a magazine for the simultaneous transport of six samples, a bayonet clip to fix the samples sequentially to a carousel sample holder and a tilting mechanism in the specimen stage to bring the transferred samples into an optimum position for the further experiment. The system can be adapted to the multiple sample transport between two completely separated UHV systems.

W Pamler; W Reill; S Dorfner; K Roll

1985-01-01T23:59:59.000Z

418

Subdiffusive fluctuations of “pulled” fronts with multiplicative noise  

Science Journals Connector (OSTI)

We study the propagation of a “pulled” front with multiplicative noise that is created by a local perturbation of an unstable state. Unlike a front propagating into a metastable state, where a separation of time scales for sufficiently large t creates a diffusive wandering of the front position about its mean, we predict that for so-called pulled fronts, the fluctuations are subdiffusive with root mean square wandering ?(t)?t1/4, not t1/2. The subdiffusive behavior is confirmed by numerical simulations: For t<~600, these yield an effective exponent slightly larger than 1/4.

Andrea Rocco, Ute Ebert, and Wim van Saarloos

2000-07-01T23:59:59.000Z

419

Fine and Ultrafine Particle Decay Rates in Multiple Homes  

Science Journals Connector (OSTI)

All homes exchange indoor air with outdoor air at a certain base rate dependent on the construction quality of the home and on indoor–outdoor temperature and pressure differences. ... A number of multiple-home studies have measured indoor particle concentrations, but few have been able to determine the rates of particle removal for individual homes under normal living conditions. ... Therefore continuous measurements from this study of FP and UFP in 74 homes in Edmonton Canada were analyzed to determine these rates of removal in each home during week-long measurement periods in summer and winter. ...

Lance Wallace; Warren Kindzierski; Jill Kearney; Morgan MacNeill; Marie-Ève Héroux; Amanda J. Wheeler

2013-10-21T23:59:59.000Z

420

Multiple Time Scales in Diffraction Measurements of Diffusive Surface Relaxation  

Science Journals Connector (OSTI)

We grew SrTiO3 on SrTiO3(001) by pulsed laser deposition, using x-ray scattering to monitor the growth in real time. The time-resolved small-angle scattering exhibits a well-defined length scale associated with the spacing between unit-cell high surface features. This length scale imposes a discrete spectrum of Fourier components and rate constants upon the diffusion equation solution, evident in multiple exponential relaxation of the “anti-Bragg” diffracted intensity. An Arrhenius analysis of measured rate constants confirms that they originate from a single activation energy.

Aaron Fleet; Darren Dale; A. R. Woll; Y. Suzuki; J. D. Brock

2006-02-09T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Formation control of multiple mobile robots utilising synchronisation approach  

Science Journals Connector (OSTI)

In this paper, a new synchronous control rule is proposed for multiple mobile robot trajectories tracking while maintaining time varying formation. Each robot is controlled to track the desired path while its motion is synchronised with the two neighbouring robots to perform and maintain a desired time-varying formation. The dynamic model of the wheeled mobile robot is derived and divided into a translational and rotational dynamic model. A new synchronous translational controller is proposed to guarantee the asymptotic stability of both position and synchronisation errors. A simulation result of 20 robots has been conducted to validate the effectiveness of the proposed synchronous controller in the time-varying formation tasks.

Ibrahim M.H. Sanhoury; Shamsudin H.M. Amin; Abdul Rashid Husain

2013-01-01T23:59:59.000Z

422

Development of a public key infrastructure across multiple enterprises  

SciTech Connect

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infrastructure among multiple enterprises when different applications and standards must be supported. This discussion chronicles the efforts by a team within the US Department of Energy`s Nuclear Weapons Complex to build a public key infrastructure and deploy applications that use it. The emphasis of this talk will be on the lessons learned during this effort and an assessment of the overall impact of this technology.

Sharick, T.M.; Long, J.P.; Desind, B.J. [and others

1997-05-01T23:59:59.000Z

423

Multiple description transform codes with an application to packetized speech  

E-Print Network (OSTI)

) and for 8 = 3. Comparison of the simulation and the theoretical results. 25 10 Multiple Description Transform Coder. Er, Ez, . . . , Et are ECMDSQ encoders for the transform coefficients, Dr, Dz, . . . , Dc are ECMDSQ decoders. 27 12 Slope A... of the location at which 21 lies). 7 11 10 12 13 15 16 17 21 14 18 20 22 26 19 23 25 27 31 24 28 29 30 32 33 34 Fig. 2. Example of index assignment, 2k + 1 = 5, As previously stated, the central encoder is described by a vector of thresholds (tp, tr...

Batllo, Jean-Christophe Claude

2012-06-07T23:59:59.000Z

424

Effects of the Spatial Extent of Multiple Harmonic Layers  

SciTech Connect

An analytic model for single particle motion in the presence of a wave field and multiple cyclotron harmonics is developed and investigated. The model suggests that even in the absence of Doppler broadening, cyclotron harmonic layers have finite spatial extent. This allows for particles to interact with more than one harmonic layer simultaneously, provided the layers are tightly packed. The latter phenomenon is investigated in the context of the model using symplectic mapping techniques. Then the model behavior is compared with numerical simulations of neutral beam particle trajectories in NSTX using the full-orbit code SPIRAL.

Burby, J. W.; Kramer, G. J.; Phillips, C. K.; Valeo, E. J. [Princeton Plasma Physics Laboratory, Princeton University, Princeton, NJ 08543 (United States)

2011-12-23T23:59:59.000Z

425

Carfilzomib, Lenalidomide, and Dexamethasone for Relapsed Multiple Myeloma  

Science Journals Connector (OSTI)

...there was a significant between-group difference in progression-free survival at the interim analysis, secondary end points were to be sequentially tested in the order of overall survival, overall response rate, and health-related quality of life, each at a one-sided significance level of 0.025. Efficacy... Survival rates have improved for patients with multiple myeloma, yet relapse remains common,1 indicating an ongoing need for new therapeutic approaches. The immunomodulatory agent lenalidomide in combination with high-dose dexamethasone is approved for ...

2014-12-06T23:59:59.000Z

426

A computed tomography implementation of multiple-image radiography  

SciTech Connect

Conventional x-ray computed tomography (CT) produces a single volumetric image that represents the spatially variant linear x-ray attenuation coefficient of an object. However, in many situations, differences in the x-ray attenuation properties of soft tissues are very small and difficult to measure in conventional x-ray imaging. In this work, we investigate an analyzer-based imaging method, called computed tomography multiple-image radiography (CT-MIR), which is a tomographic implementation of the recently proposed multiple-image radiography method. The CT-MIR method reconstructs concurrently three physical properties of the object. In addition to x-ray attenuation, CT-MIR produces volumetric images that represent the refraction and ultrasmall-angle scattering properties of the object. These three images can provide a rich description of the object's physical properties that are revealed by the probing x-ray beam. An imaging model for CT-MIR that is based on the x-ray transform of the object properties is established. The CT-MIR method is demonstrated by use of experimental data acquired at a synchroton radiation imaging beamline, and is compared to the pre-existing diffraction-enhanced imaging CT method. We also investigate the merit of an iterative reconstruction method for use with future clinical implementations of CT-MIR, which we anticipate would be photon limited.

Brankov, Jovan G.; Wernick, Miles N.; Yang Yongyi; Li Jun; Muehleman, Carol; Zhong Zhong; Anastasio, Mark A. [Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 and Department of Biomedical Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Rush University Medical Center, Chicago, Illinois 60616 (United States); National Synchrotron Light Source, Brookhaven National Laboratory, Upton, New York 11973 (United States); Department of Biomedical Engineering, Illinois Institute of Technology, Chicago, Illinois 60616 (United States)

2006-02-15T23:59:59.000Z

427

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network (OSTI)

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative aspects of hadron structure, opening important insights into the physics of spin, flavor and momentum structure of hadrons.

Alessandro Bacchetta; Miguel G. Echevarria; Marco Radici; Andrea Signori

2014-09-25T23:59:59.000Z

428

Hanford Technical Basis for Multiple Dosimetry Effective Dose Methodology  

SciTech Connect

The current method at Hanford for dealing with the results from multiple dosimeters worn during non-uniform irradiation is to use a compartmentalization method to calculate the effective dose (E). The method, as documented in the current version of Section 6.9.3 in the 'Hanford External Dosimetry Technical Basis Manual, PNL-MA-842,' is based on the compartmentalization method presented in the 1997 ANSI/HPS N13.41 standard, 'Criteria for Performing Multiple Dosimetry.' With the adoption of the ICRP 60 methodology in the 2007 revision to 10 CFR 835 came changes that have a direct affect on the compartmentalization method described in the 1997 ANSI/HPS N13.41 standard, and, thus, to the method used at Hanford. The ANSI/HPS N13.41 standard committee is in the process of updating the standard, but the changes to the standard have not yet been approved. And, the drafts of the revision of the standard tend to align more with ICRP 60 than with the changes specified in the 2007 revision to 10 CFR 835. Therefore, a revised method for calculating effective dose from non-uniform external irradiation using a compartmental method was developed using the tissue weighting factors and remainder organs specified in 10 CFR 835 (2007).

Hill, Robin L.; Rathbone, Bruce A.

2010-08-01T23:59:59.000Z

429

Multiple time step integrators in ab initio molecular dynamics  

SciTech Connect

Multiple time-scale algorithms exploit the natural separation of time-scales in chemical systems to greatly accelerate the efficiency of molecular dynamics simulations. Although the utility of these methods in systems where the interactions are described by empirical potentials is now well established, their application to ab initio molecular dynamics calculations has been limited by difficulties associated with splitting the ab initio potential into fast and slowly varying components. Here we present two schemes that enable efficient time-scale separation in ab initio calculations: one based on fragment decomposition and the other on range separation of the Coulomb operator in the electronic Hamiltonian. We demonstrate for both water clusters and a solvated hydroxide ion that multiple time-scale molecular dynamics allows for outer time steps of 2.5 fs, which are as large as those obtained when such schemes are applied to empirical potentials, while still allowing for bonds to be broken and reformed throughout the dynamics. This permits computational speedups of up to 4.4x, compared to standard Born-Oppenheimer ab initio molecular dynamics with a 0.5 fs time step, while maintaining the same energy conservation and accuracy.

Luehr, Nathan; Martínez, Todd J. [Department of Chemistry, Stanford University, Stanford, California 94305 (United States) [Department of Chemistry, Stanford University, Stanford, California 94305 (United States); The PULSE Institute, Stanford University, Stanford, California 94305 (United States); SLAC National Accelerator Laboratory, Menlo Park, California 94025 (United States); Markland, Thomas E. [Department of Chemistry, Stanford University, Stanford, California 94305 (United States)] [Department of Chemistry, Stanford University, Stanford, California 94305 (United States)

2014-02-28T23:59:59.000Z

430

Energetics of Multiple-Ion Species Hohlraum Plasmas  

SciTech Connect

A study of the laser-plasma interaction processes in multiple-ion species plasmas has been performed in plasmas that are created to emulate the plasma conditions in indirect drive inertial confinement fusion targets. Gas-filled hohlraums with densities of xe22/cc are heated to Te=3keV and backscattered laser light is measured by a suite of absolutely calibrated backscatter diagnostics. Ion Landau damping is increased by adding hydrogen to the CO2/CF4 gas fill. We find that the backscatter from stimulated Brillouin scattering is reduced is monotonically reduced with increasing damping, demonstrating that Landau damping is the controlling damping mechanism in ICF relevant high-electron temperature plasmas. The reduction in backscatter is accompanied by a comparable increase in both transmission of a probe beam and an increased hohlraum radiation temperature, showing that multiple-ion species plasmas improve the overall hohlraum energetics/performance. Comparison of the experimental data to linear gain calculations as well as detailed full-scale 3D laser-plasma interaction simulations show quantitative agreement. Our findings confirm the importance of Landau damping in controlling backscatter from high-electron temperature hohlraum plasmas and have lead to the inclusion of multi-ion species plasmas in the hohlraum point design for upcoming ignition campaigns at the National Ignition Facility.

Neumayer, P; Berger, R; Callahan, D; Divol, L; Froula, D; London, R; MacGowan, B J; Meezan, N; Michel, P; Ross, J S; Sorce, C; Widmann, K; Suter, L; Glenzer, S H

2007-11-05T23:59:59.000Z

431

Multiple models decentralized coordinated control of doubly fed induction generator  

Science Journals Connector (OSTI)

Abstract In this paper, a multiple model optimal tracking control (MOTC) design method for the double fed induction generator (DFIG) using correlative measured technique is proposed. The DFIG is represented by a third-order model, where electro-magnetic transients of stator are neglected. By using the correlative measured technique, the correlative measured matrix (CMM) of wind power system is obtained firstly. Then, a nonstandard state space equation of DFIG is obtained with the correlative measured vectors (CMVs), which reflect interactions between the \\{DFIGs\\} and grid. In order to cope with nonlinearities and continuous variation in the operating points, a multiple model design method is proposed in the discrete domain. The obtained control law, synthesized by using Bayesian probability, only depends on the local measured parameters. Hence, the MOTC can be regarded as a decentralized coordinated control, which can simplify the control structure and improve the transient stability of DFIG. To illustrate the effectiveness of the proposed MOTC strategy, simulations on a hybrid wind thermal power (HWTP) system are performed. The results show that the proposed MOTC strategy can provide acceptable performance throughout the whole operating region. Comparing to the conventional PID control, transient stability, damping, and fault ride-through capability of DFIG with the proposed MOTC design method have been improved effectively.

Yu-guang Niu; Xiao-ming Li; Zhong-wei Lin; Ming-yang Li

2015-01-01T23:59:59.000Z

432

Quantum Dot Solar Cells: High Efficiency through Multiple Exciton Generation  

SciTech Connect

Impact ionization is a process in which absorbed photons in semiconductors that are at least twice the bandgap can produce multiple electron-hole pairs. For single-bandgap photovoltaic devices, this effect produces greatly enhanced theoretical thermodynamic conversion efficiencies that range from 45-85%, depending upon solar concentration, the cell temperature, and the number of electron-hole pairs produced per photon. For quantum dots (QDs), electron-hole pairs exist as excitons. We have observed astoundingly efficient multiple exciton generation (MEG) in QDs of PbSe (bulk Eg = 0.28 eV), ranging in diameter from 3.9 to 5.7nm (Eg = 0.73, 0.82, and 0.91 eV, respectively). The effective masses of electron and holes are about equal in PbSe, and the onset for efficient MEG occurs at about three times the QD HOMO-LUMO transition (its ''bandgap''). The quantum yield rises quickly after the onset and reaches 300% at 4 x Eg (3.64 eV) for the smallest QD; this means that every QD in the sample produces three electron-hole pairs/photon.

Hanna, M. C.; Ellingson, R. J.; Beard, M.; Yu, P.; Micic, O. I.; Nozik, A. J.; c.

2005-01-01T23:59:59.000Z

433

Extramedullary progression of multiple myeloma despite concomitant medullary response to multiple combination therapies and autologous transplant: a case report  

E-Print Network (OSTI)

-line JOURNAL OF MEDICAL CASE REPORTS Kasi Loknath Kumar et al. Journal of Medical Case Reports 2014, 8:299 http://www.jmedicalcasereports.com/content/8/1/299Kansas City, KS, USA Full list of author information is available at the end of the articlesetting..., University of Kansas Medical Center,transplant: a case report Anup Kasi Loknath Kumar1*, Christopher Dakhil2, Megha Teeka Satyan1 and Nisreen Haideri3 Abstract Introduction: Extramedullary myeloma that occurs during the clinical course of multiple myeloma...

Kumar, Anup Kasi Loknarth; Dakhil, Christopher; Satyan, Megha Teeka; Haideri, Nisreen

2014-09-08T23:59:59.000Z

434

Object Oriented Modeling of a Multiple-Input Multiple-Output Flyback Converter in Nicholas D. Benavides and Patrick L.Chapman  

E-Print Network (OSTI)

Object Oriented Modeling of a Multiple-Input Multiple-Output Flyback Converter in Dymola Nicholas D not lend itself to many traditional circuit simulators such as SPICE. The state equations of a converter dependent on the states, and cannot be determined prior to simulation, requiring the use of an iterative

Chapman, Patrick

435

Building Design Advisor: Automated integration of multiple simulation tools K. Papamichael, J. LaPorta, H. Chauvet  

E-Print Network (OSTI)

LBNL-40591 Preprint Building Design Advisor: Automated integration of multiple simulation tools K Design Advisor (BDA) is a software environment that supports the integrated use of multiple analysis

436

Alignement multiple Alignement multiple  

E-Print Network (OSTI)

GTTGGAGAAA AAGATCAATA TATTGCTTAT Borago CGATGCCGTT CCGGGAGAAG AAAATCAATA TATATGTTAT Heliotrop CGATCCCGTT

Csürös, Miklós

437

MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations  

Office of Legacy Management (LM)

52. 52. APR 9 1986 MULTIPLE LETTERS Mr. James Speir, Vice President Phosphate Operations International Minerals and Chemical Corporation P.O. Box 7047 Lakeland, Florida 33807 Dear Mr. Speir: The Department of Energy is evaluating the radiological condition of sites that were utilized by the Manhattan Engineer District and the Atomic Energy Commission (AEC) during the early years of nuclear energy development to determine whether they need remedial action and whether the Department has authority to perform such action. As you may be aware through previous correspondence, the International Minerals and Chemical Corporation facility in Mulberry, Florida, was identified as one such site, as a result of some research, development, and pilot plant work conducted at the

438

Quantum teleportation scheme by selecting one of multiple output ports  

E-Print Network (OSTI)

The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state, and (ii) the state is also optimized as well as Alice's measurement. We analytically determine the optimal protocols for all the four cases, and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of $N\\to\\infty$. The entanglement properties of the teleportation scheme are also discussed.

Satoshi Ishizaka; Tohya Hiroshima

2009-04-06T23:59:59.000Z

439

High-Yield Secretion of Multiple Client Proteins in Aspergillus  

SciTech Connect

Production of pure and high-yield client proteins is an important technology that addresses the need for industrial applications of enzymes as well as scientific experiments in protein chemistry and crystallization. Fungi are utilized in industrial protein production because of their ability to secrete large quantities of proteins. In this study, we engineered a high-expression-secretion vector, pEXPYR that directs proteins towards the extracellular medium in two Aspergillii host strains, examine the effect of maltose-induced over-expression and protein secretion as well as time and pH-dependent protein stability in the medium. We describe five client proteins representing a core set of hemicellulose degrading enzymes that accumulated up to 50-100 mg/L of protein. Using a recyclable genetic marker that allows serial insertion of multiple genes, simultaneous hyper-secretion of three client proteins in a single host strain was accomplished.

Segato, F.; Damasio, A. R. L.; Goncalves, T. A.; de Lucas, R. C.; Squina, F. M.; Decker, S. R.; Prade, R. A.

2012-07-15T23:59:59.000Z

440

Will multiple probes of dark energy find modified gravity?  

SciTech Connect

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w{sub 0}-w{sub a} plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Shapiro, Charles [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); Dodelson, Scott [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States); Department of Astronomy and Astrophysics, University of Chicago, Chicago, Illinois 60637 (United States); Kavli Institute for Cosmological Physics, Chicago, Illinois 60637 (United States); Hoyle, Ben [Institut de Ciencies del Cosmos, Barcelona (Spain); Samushia, Lado [Institute of Cosmology and Gravitation, Portsmouth, PO1 3FX (United Kingdom); National Abastumani Astrophysical Observatory, Ilia State University, 2A Kazbegi Ave, GE-0160 Tbilisi (Georgia); Flaugher, Brenna [Center for Particle Astrophysics, Fermi National Accelerator Laboratory, Batavia, Illinois 60510 (United States)

2010-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Non-invertibility of Multiple-Scattered QELSS Spectra  

E-Print Network (OSTI)

We consider the spectrum S(q,t) and field correlation function f(q,t) of light quasielastically scattered from diffusing optical probes in complex viscoelastic fluids. Relationships between the single-scattering f_1(q,t) and the multiple-scattering f_m(t) are examined. We show that it is fundamentally impossibly to invert f_m(t) to obtain f_1(q,t) or particle displacement moments , except with assumptions that are certainly not correct in complex, viscoelastic fluids. For diffusing dilute probes in viscoelastic fluids, f_1(q,t) is determined by all even moments , n > 0$, of the particle displacement X; this information is lost in f_m(t). In the special case of monodisperse probes in a true simple fluid, f_1(q,t) can be obtained from f_m(t), but only because the functional form of f_1(q,t) is already known.

George D. J. Phillies

2005-09-18T23:59:59.000Z

442

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network (OSTI)

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

443

Multiple-Coincidence Active Neutron Interrogation of Fissionable Materials  

SciTech Connect

Using a beam of tagged 14.1 MeV neutrons to probe for the presence of fissionable materials, we have measured n-?-? coincidences from depleted uranium (DU). The multiple coincidence rate is substantially above that measured from lead, tungsten, and iron. The presence of coincidences involving delayed gammas in the DU time spectra provides a signature for fissionable materials that is distinct from non-fissionable ones. In addition, the information from the tagged neutron involved in the coincidence gives the position of the fissionable material in all three dimensions. The result is an imaging probe for fissionable materials that is more compact and that produces much less radiation than other solutions.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham, and S.C. Wilde

2008-08-06T23:59:59.000Z

444

PLT scaling laws for thermonuclear fusion power multiplication  

SciTech Connect

While present experiments are evaluated on the basis of confinement time, it is the fusion power multiplication factor, Q, and the fusion power which will be the parameters that measure the performance of ignition experiments and fusion reactors. We have determined the relationship of Q to tau/sub E/ and the Lawson number, n tau/sub e/, for ohmically heated plasmas from the Princeton Large Tokamak (PLT). Q, tau/sub E/, and n tau/sub E/ all increase with density at low densities. Above anti n/sub e/ approx. = 4 x 10/sup 13/ cm/sup -3/, tau/sub Ee/ approx. = 30 msec, or anti n/sub e/ tau/sub Ee/ approx. = 1.5 x 10/sup 12/ cm/sup -3/s, Q saturates. Q scaling has also been obtained on PLT as a function of toroidal magnetic field, plasma current, and auxiliary heating power.

Grisham, L.R.; Strachan, J.D.

1982-11-01T23:59:59.000Z

445

Chapter 2 - Coal as Multiple Sources of Energy  

Science Journals Connector (OSTI)

Abstract Coal as multiple sources of energy is mined for its solid and gas-, oil-, and condensate-derived hydrocarbons as well as liquefied for synfuels. More than 50 countries mine coal as feedstock for power plants to generate electricity but only six of these countries monopolize 73% of the total recoverable coalbed gas resources of the world. Worldwide, about 30,000 coal mine explosions are caused by methane and carbon dioxide, and to prevent outbursts and emissions, underground, surface, and abandoned coalmine gases are exploited for industrial and commercial uses. Still, a large volume of unrecovered fugitive coalmine gases is released as global greenhouse gas emissions. An alternative source for foreign oil dependent countries is synfuels from coal liquefaction technology. Also, coal-derived hydrocarbons are a part of the conventional resources that is, gas, oil, and condensate sourced from coal but expelled into adjoining reservoirs, are attractive alternative energy sources.

Romeo M. Flores

2014-01-01T23:59:59.000Z

446

Charging system with galvanic isolation and multiple operating modes  

DOE Patents (OSTI)

Systems and methods are provided for operating a charging system with galvanic isolation adapted for multiple operating modes. A vehicle charging system comprises a DC interface, an AC interface, a first conversion module coupled to the DC interface, and a second conversion module coupled to the AC interface. An isolation module is coupled between the first conversion module and the second conversion module. The isolation module comprises a transformer and a switching element coupled between the transformer and the second conversion module. The transformer and the switching element are cooperatively configured for a plurality of operating modes, wherein each operating mode of the plurality of operating modes corresponds to a respective turns ratio of the transformer.

Kajouke, Lateef A.; Perisic, Milun; Ransom, Ray M.

2013-01-08T23:59:59.000Z

447

Multiple reentrant glass transitions in confined hard-sphere glasses  

E-Print Network (OSTI)

Glass forming liquids exhibit a rich phenomenology upon confinement. This is often related to the effects arising from wall-fluid interactions. Here we focus on the interesting limit where the separation of the confining walls becomes of the order of a few particle diameters. For a moderately polydisperse, densely packed hard-sphere fluid confined between two smooth hard walls, we show via event-driven molecular dynamics simulations the emergence of a multiple reentrant glass transition scenario upon a variation of the wall separation. Using thermodynamic relations, this reentrant phenomenon is shown to persist also under constant chemical potential. This allows straightforward experimental investigation and opens the way to a variety of applications in micro- and nanotechnology, where channel dimensions are comparable to the size of the contained particles. The results are in-line with theoretical predictions obtained by a combination of density functional theory and the mode-coupling theory of the glass transition.

S. Mandal; S. Lang; M. Gross; M. Oettel; D. Raabe; T. Franosch; F. Varnik

2014-06-20T23:59:59.000Z

448

Single transmission line interrogated multiple channel data acquisition system  

DOE Patents (OSTI)

A single transmission line interrogated multiple channel data acquisition system is provided in which a plurality of remote station/sensor circuits each monitors a specific process variable and each transmits measurement values over a single transmission line to a master interrogating station when addressed by said master interrogating station. Typically, as many as 330 remote stations may be parallel connected to the transmission line which may exceed 7,000 feet. The interrogation rate is typically 330 stations/second. The master interrogating station samples each station according to a shared, charging transmit-receive cycle. All remote station address signals, all data signals from the remote stations/sensors and all power for all of the remote station/sensors are transmitted via a single continuous terminated coaxial cable. A means is provided for periodically and remotely calibrating all remote sensors for zero and span. A provision is available to remotely disconnect any selected sensor station from the main transmission line.

Fasching, George E. (Morgantown, WV); Keech, Jr., Thomas W. (Morgantown, WV)

1980-01-01T23:59:59.000Z

449

Will multiple probes of dark energy find modified gravity?  

Science Journals Connector (OSTI)

One of the most pressing issues in cosmology is whether general relativity (GR) plus a dark sector is the underlying physical theory or whether a modified gravity model is needed. Upcoming dark energy experiments designed to probe dark energy with multiple methods can address this question by comparing the results of the different methods in constraining dark energy parameters. Disagreement would signal the breakdown of the assumed model (GR plus dark energy). We study the power of this consistency test by projecting constraints in the w0-wa plane from the four different techniques of the Dark Energy Survey in the event that the underlying true model is modified gravity. We find that the standard technique of looking for overlap has some shortcomings, and we propose an alternative, more powerful Multidimensional Consistency Test. We introduce the methodology for projecting whether a given experiment will be able to use this test to distinguish a modified gravity model from GR.

Charles Shapiro; Scott Dodelson; Ben Hoyle; Lado Samushia; Brenna Flaugher

2010-08-17T23:59:59.000Z

450

Influence of heavy modes on perturbations in multiple field inflation  

SciTech Connect

We investigate linear cosmological perturbations in multiple field inflationary models where some of the directions are light while others are heavy (with respect to the Hubble parameter). By integrating out the massive degrees of freedom, we determine the multi-dimensional effective theory for the light degrees of freedom and give explicitly the propagation matrix that replaces the effective sound speed of the one-dimensional case. We then examine in detail the consequences of a sudden turn along the inflationary trajectory, in particular the possible breakdown of the low energy effective theory in case the heavy modes are excited. Resorting to a new basis in field space, instead of the usual adiabatic/entropic basis, we study the evolution of the perturbations during the turn. In particular, we compute the power spectrum and compare with the result obtained from the low energy effective theory.

Gao, Xian; Langlois, David [Astroparticule et Cosmologie (APC), UMR 7164-CNRS, Université Denis Diderot-Paris 7, 10 rue Alice Domon et Léonie Duquet, 75205 Paris (France); Mizuno, Shuntaro, E-mail: xgao@apc.univ-paris7.fr, E-mail: langlois@apc.univ-paris7.fr, E-mail: shuntaro.mizuno@th.u-psud.fr [Laboratoire de Physique Théorique, Université Paris-Sud 11 et CNRS, Bâtiment 210, 91405 Orsay Cedex (France)

2012-10-01T23:59:59.000Z

451

MULTIPLE SCATTERING POLARIZATION OF SUBSTELLAR-MASS OBJECTS: T DWARFS  

SciTech Connect

While there have been multiple observational programs aimed at detecting linear polarization of optical radiation emitted by ultracool dwarfs, there has been comparatively less rigorous theoretical analysis of the problem. The general expectation has been that the atmospheres of those substellar-mass objects with condensate clouds would give rise to linear polarization due to scattering. Because of rotation-induced non-sphericity, there is expected to be incomplete cancellation of disk-integrated net polarization and thus a finite polarization. For cloudless objects, however, only molecular Rayleigh scattering will contribute to any net polarization and this limit has not been well studied. Hence in this paper we present a detailed multiple scattering analysis of the polarization expected from those T-dwarfs whose spectra show absence of condensates. For this, we develop and solve the full radiative transfer equations for linearly polarized radiation. Only atomic and molecular Rayleigh scattering are considered to be the sources of polarization. We compute the local polarization at different angular directions in a plane-parallel atmosphere calculated for the range of effective temperatures of T dwarfs and then average over the whole surface of the object. The effects of gravity and limb darkening as well as rotation induced non-sphericity are included. It is found that the amount of polarization decreases with the increase in effective temperature. It is also found that significant polarization at any local point in the atmosphere arises only in the optical (B band). However, the disk integrated polarization-even in the B band-is negligible. Hence we conclude that, unlike the case for cloudy L dwarfs, polarization of cloudless T dwarfs by atomic and molecular scattering may not be detectable. In the future we will extend this work to cloudy L and T dwarf atmospheres.

Sengupta, Sujan [Indian Institute of Astrophysics, Koramangala 2nd Block, Bangalore 560 034 (India); Marley, Mark S., E-mail: sujan@iiap.res.i, E-mail: Mark.S.Marley@NASA.go [NASA Ames Research Center, MS-245-3, Moffett Field, CA 94035 (United States)

2009-12-10T23:59:59.000Z

452

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

453

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML 8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities January 5, 2011 - 2:28pm Addthis PROBLEM: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities PLATFORM: Mozilla Firefox 3.5.11 - 3.6.10, Mozilla SeaMonkey 2.0 - 2.0.9 Vulnerable Platforms Details ABSTRACT: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the

454

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

455

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

456

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

457

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

458

Estimation of multi-particle correlation from multiplicity distribution observed in relativisitic heavy ion collisions  

E-Print Network (OSTI)

Analytical formula for multiplicity distribution is derived in the QO approach, where chaotic and coherent fields are contained. Observed charged multiplicity distributions in Au+Au collisions at $\\sqrt{s}=200$ AGeV and in pp collisions at $\\sqrt{s}=900$ GeV are analyzed by the formula. Chaoticity parameters in the inclusive events estimated from the analysis of multiplicity distributions are compared with those estimated from the analysis of observed two-particle inclusive identical particle correlations.

Naomichi Suzuki; Minoru Biyajima; Takuya Mizoguchi

2010-12-12T23:59:59.000Z

459

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

460

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Neutron generators with size scalability, ease of fabrication and multiple ion source functionalities  

DOE Patents (OSTI)

A neutron generator is provided with a flat, rectilinear geometry and surface mounted metallizations. This construction provides scalability and ease of fabrication, and permits multiple ion source functionalities.

Elizondo-Decanini, Juan M

2014-11-18T23:59:59.000Z

462

Multiple-beam laser–plasma interactions in inertial confinement fusion  

SciTech Connect

The experimental evidence for multiple-beam laser-plasma instabilities of relevance to laser driven inertial confinement fusion at the ignition scale is reviewed, in both the indirect and direct-drive approaches. The instabilities described are cross-beam energy transfer (in both indirectly driven targets on the NIF and in direct-drive targets), multiple-beam stimulated Raman scattering (for indirect-drive), and multiple-beam two-plasmon decay instability (in direct drive). Advances in theoretical understanding and in the numerical modeling of these multiple beam instabilities are presented.

Myatt, J. F., E-mail: jmya@lle.rochester.edu; Zhang, J.; Maximov, A. V. [Laboratory for Laser Energetics, University of Rochester, 250 East River Road, Rochester, New York 14623-1299 (United States); Department of Mechanical Engineering, University of Rochester, Rochester, New York 14627 (United States); Short, R. W.; Seka, W.; Edgell, D. H.; Michel, D. T.; Igumenshchev, I. V. [Laboratory for Laser Energetics, University of Rochester, 250 East River Road, Rochester, New York 14623-1299 (United States); Froula, D. H. [Laboratory for Laser Energetics, University of Rochester, 250 East River Road, Rochester, New York 14623-1299 (United States); Department of Physics and Astronomy, University of Rochester, Rochester, New York 14627-0171 (United States); Hinkel, D. E.; Michel, P.; Moody, J. D. [Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, California 94551-0808 (United States)

2014-05-15T23:59:59.000Z

463

Hohlraum Symmetry Experiments with Multiple Beam Cones on the Omega Laser Facility  

SciTech Connect

Symmetry experiments have been performed on the Omega laser facility using cylindrical hohlraum targets with as many as 40thinspthinspbeams arranged into multiple beam cones. These experiments constitute a first step in the development of {open_quotes}beam phasing{close_quotes} in which beams are arranged into multiple beam cones, forming multiple rings of beam spots on the inner surface of a cylindrical hohlraum, and demonstrate the ability to model hohlraums incorporating multiple beam cones and to tune the time-integrated capsule flux asymmetry by adjustment of the beam pointing. {copyright} {ital 1998} {ital The American Physical Society}

Murphy, T.J.; Wallace, J.M.; Delamater, N.D.; Barnes, C.W.; Gobby, P.; Hauer, A.A.; Lindman, E.; Magelssen, G.; Moore, J.B.; Oertel, J.A.; Watt, R. [Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States)] [Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States); Landen, O.L.; Amendt, P.; Cable, M.; Decker, C.; Hammel, B.A.; Koch, J.A.; Suter, L.J.; Turner, R.E.; Wallace, R.J. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States)] [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Marshall, F.J.; Bradley, D.; Craxton, R.S.; Keck, R.; Knauer, J.P.; Kremens, R.; Schnittman, J.D. [Laboratory for Laser Energetics, University of Rochester, Rochester, New York 14627 (United States)] [Laboratory for Laser Energetics, University of Rochester, Rochester, New York 14627 (United States)

1998-07-01T23:59:59.000Z

464

From Microevolutionary Processes to Macroevolutionary Patterns: Investigating Diversification at Multiple Scales in Southeast Asian Lizards  

E-Print Network (OSTI)

A comprehensive understanding of the evolutionary processes responsible for generating biodiversity is best obtained using integrative approaches at multiple scales. In doing so, these investigations can provide complex ...

Barley, Anthony John

2014-05-31T23:59:59.000Z

465

Accelerometry coherence analysis to assess balance strategies in patients with multiple sclerosis.  

E-Print Network (OSTI)

??Patients with multiple sclerosis often complain about reduced balance and have increased sway during quiet standing. However, thus far, no investigations have been conducted to… (more)

Veys, Christopher G.

2012-01-01T23:59:59.000Z

466

Indigenous climate knowledge in southern Uganda: the multiple components of a dynamic regional system  

E-Print Network (OSTI)

knowledge in southern Uganda: the multiple components of aAbstract Farmers in southern Uganda seek information toMakerere University, Kampala, Uganda A. Majugu Department of

Orlove, Ben; Roncoli, Carla; Kabugo, Merit; Majugu, Abushen

2010-01-01T23:59:59.000Z

467

CONTAINMENT EVALUATION OF PU-METAL TRANSPORT USING MULTIPLE BARRIERS  

SciTech Connect

A methodology was developed previously by SRNL to show that Al-SNF with cladding breaches can be directly transported in standard casks and maintained within the allowable release rates. This novel approach may be extended to other nuclear material systems. Utilizing an adaptation to the methodology, a containment analysis has been performed for the scenario of non-routine transfer of a damaged 9975 package containing plutonium metal from K-area monitored storage to F-area on the Savannah River Site. A multiple barrier system with each barrier having a defined leakage rate of less than 1 x 10{sup -3} cm{sup 3}/sec of air at Standard Temperature and Pressure was analyzed to determine the number of barriers needed to transport the package under normal transportation conditions to meet transportation requirements for containment. The barrier system was analyzed parametrically to achieve a composite system that met the federal requirements for the maximum permissible release rate. The multiple barrier system acts to retard the release of radioactivity. That is, a build-up in the radioactivity release rate occurs with time. For example, a system with three barriers (e.g., sealed plastic barrier) with a total free volume of 4,500 cm{sup 3} could be transported for a total time of up to approximately 10 days with a release rate within the permissible rate. Additional number of barriers, or volume of the barriers, or both, would extend to this period of time. For example, a system with seven barriers with a total free volume of 4,500 cm{sup 3} could be transported for up to 100 days. Plastic bags are one type of barrier used in movement of radioactive materials and capable of achieving a leak rate of 1 x 10{sup -3} cm{sup 3}/sec of air at STP. Low-density polyethylene bags can withstand high temperature (up to 180 C); a barrier thickness of 10 mils should be suitable for the barrier system.

Vinson, D.

2011-07-18T23:59:59.000Z

468

Containment analysis of the 9975 transportation package with multiple barriers  

SciTech Connect

A containment analysis has been performed for the scenario of non-routine transfer of a damaged 9975 package containing plutonium metal from K-area monitored storage to F-area on the Savannah River Site. A multiple barrier system with each barrier having a defined leakage rate of less than 1{times}10{sup {minus}3} cm{sup 3}/sec of air at Standard Temperature and Pressure was analyzed to determine the number of barriers needed to transport the package under normal transportation conditions to meet transportation requirements for containment. The barrier system was analyzed parametrically to achieve a composite system that met the federal requirements for the maximum permissible release rate given in Title 10 of the Code of Federal Regulations, Part 71. The multiple barrier system acts to retard the release of radioactivity. That is, a build-up in the radioactivity release rate occurs with time. For example, a system with three barriers (e.g., sealed plastic barrier) with a total free volume of 4,500 cm{sup 3} could be transported for a total time of up to approximately 10 days with a release rate within the permissible rate. Additional number of barriers, or volume of the barriers, or both, would extend to this period of time. For example, a system with seven barriers with a total free volume of 4,500 cm{sup 3} could be transported for up to 100 days. Plastic bags are one type of barrier used in movement of radioactive materials and capable of achieving a leak rate of 1{times}10{sup {minus}3} cm{sup 3}/sec of air at STP. Low-density polyethylene bags can withstand high temperature (up to 180 degrees C); a barrier thickness of 10 mils should be suitable for the barrier system. Additional requirements for barriers are listed in Section 4.2 of this report. Container testing per ANSI N14.5 is required to demonstrate leak rates for the individual barriers of less than 1{times}10{sup {minus}3} cm{sup 3}/sec.

Vinson, D.W.

2000-01-20T23:59:59.000Z

469

Two-phase flow characteristics in multiple orifice valves  

SciTech Connect

This work presents an experimental investigation on the characteristics of two-phase flow through multiple orifice valve (MOV), including frictional pressure drop and void fraction. Experiments were carried out using an MOV with three different sets of discs with throat thickness-diameter ratios (s/d) of 1.41, 1.66 and 2.21. Tests were run with air and water flow rates ranging between 1.0 and 3.0 m{sup 3}/h, respectively. The two-phase flow patterns established for the experiment were bubbly and slug. Two-phase frictional multipliers, frictional pressure drop and void fraction were analyzed. The determined two-phase multipliers were compared against existing correlations for gas-liquid flows. None of the correlations tested proved capable of predicting the experimental results. The large discrepancy between predicted and measured values points at the role played by valve throat geometry and thickness-diameter ratio in the hydrodynamics of two-phase flow through MOVs. A modification to the constants in the two-phase multiplier equation used for pipe flow fitted the experimental data. A comparison between computed frictional pressure drop, calculated with the modified two-phase multiplier equation and measured pressure drop yielded better agreement, with less than 20% error. (author)

Alimonti, Claudio [Sapienza University of Rome, Department ICMA, Via Eudossiana 18, 00184 Roma (Italy); Falcone, Gioia; Bello, Oladele [The Harold Vance Department of Petroleum Engineering, Texas A and M University, 3116 TAMU, Richardson Building, College Station, TX 77843 (United States)

2010-11-15T23:59:59.000Z

470

Multiple-relaxation-time lattice Boltzmann kinetic model for combustion  

E-Print Network (OSTI)

To probe both the Mechanical Non-Equilibrium (MNE) and Thermodynamic Non-Equilibrium (TNE) in the combustion procedure, a two-dimensional Multiple-Relaxation-Time (MRT) version of the Lattice Boltzmann Kinetic Model(LBKM) for combustion phenomena is presented. The chemical energy released in the progress of combustion is dynamically coupled into the system by adding a chemical term to the LB kinetic equation. The LB model is required to recover the Navier-Stokes equations with chemical reaction in the hydrodynamic limit. To that aim, we construct a discrete velocity model with $24$ velocities divided into $3$ groups. In each group a flexible parameter is used to control the size of discrete velocities and a second parameter is used to describe the contribution of the extra degrees of freedom. The current model works for both subsonic and supersonic flows with or without chemical reaction. In this model both the specific-heat ratio and the Prandtl number are flexible, the TNE effects are naturally presented in...

Xu, Aiguo; Zhang, Guangcai; Li, Yingjun

2014-01-01T23:59:59.000Z

471

Supporting Multiple Cognitive Processing Styles Using Tailored Support Systems  

SciTech Connect

According to theories of cognitive processing style or cognitive control mode, human performance is more effective when an individual’s cognitive state (e.g., intuition/scramble vs. deliberate/strategic) matches his/her ecological constraints or context (e.g., utilize intuition to strive for a "good-enough" response instead of deliberating for the "best" response under high time pressure). Ill-mapping between cognitive state and ecological constraints are believed to lead to degraded task performance. Consequently, incorporating support systems which are designed to specifically address multiple cognitive and functional states e.g., high workload, stress, boredom, and initiate appropriate mitigation strategies (e.g., reduce information load) is essential to reduce plant risk. Utilizing the concept of Cognitive Control Models, this paper will discuss the importance of tailoring support systems to match an operator's cognitive state, and will further discuss the importance of these ecological constraints in selecting and implementing mitigation strategies for safe and effective system performance. An example from the nuclear power plant industry illustrating how a support system might be tailored to support different cognitive states is included.

Tuan Q. Tran; Karen M. Feigh; Amy R. Pritchett

2007-08-01T23:59:59.000Z

472

Smart microgrid operational planning considering multiple demand response programs  

Science Journals Connector (OSTI)

Microgrid (MG) is one of the important blocks in the future smart distribution systems. The scheduling pattern of MGs affects distribution system operation. Also the optimal scheduling of MGs will result in reliable and economical operation of distribution system. In this paper an operational planning model of a MG which considers multiple demand response programs is proposed. In the proposed approach all types of loads can participate in demand response programs which will be considered in either energy or reserve scheduling. Also the renewable distributed generation uncertainty is covered by reserve provided by both Distributed Generations (DGs) and responsive loads. The novelty of this paper is the demand side participation in energy and reserve scheduling simultaneously. Furthermore the energy and reserve scheduling is proposed for day-ahead and real-time. The proposed model was tested on a typical MG system and the results show that running demand response programs will reduce total operation cost of MG and cause more efficient use of resources.

Alireza Zakariazadeh; Shahram Jadid

2014-01-01T23:59:59.000Z

473

Real-time multi-mode neutron multiplicity counter  

DOE Patents (OSTI)

Embodiments are directed to a digital data acquisition method that collects data regarding nuclear fission at high rates and performs real-time preprocessing of large volumes of data into directly useable forms for use in a system that performs non-destructive assaying of nuclear material and assemblies for mass and multiplication of special nuclear material (SNM). Pulses from a multi-detector array are fed in parallel to individual inputs that are tied to individual bits in a digital word. Data is collected by loading a word at the individual bit level in parallel, to reduce the latency associated with current shift-register systems. The word is read at regular intervals, all bits simultaneously, with no manipulation. The word is passed to a number of storage locations for subsequent processing, thereby removing the front-end problem of pulse pileup. The word is used simultaneously in several internal processing schemes that assemble the data in a number of more directly useable forms. The detector includes a multi-mode counter that executes a number of different count algorithms in parallel to determine different attributes of the count data.

Rowland, Mark S; Alvarez, Raymond A

2013-02-26T23:59:59.000Z

474

Pair-production multiplicities in rotation-powered pulsars  

E-Print Network (OSTI)

We discuss the creation of electron-positron cascades in the context of pulsar polar cap acceleration models and derive several useful analytic and semi-analytic results for the spatial extent and energy response of the cascade. Instead of Monte Carlo simulations, we use an integro- differential equation which describes the development of the cascade energy spectrum in one space dimension quite well, when it is compared to existing Monte Carlo models. We reduce this full equation to a single integral equation, from which we can derive useful results, such as the energy loss between successive generations of photons and the spectral index of the response. We find that a simple analytic formula represents the pair cascade multiplicity quite well, provided that the magnetic field is below 10^12 Gauss, and that an only slightly more complex formula matches the numerically-calculated cascade at all other field strengths. Using these results, we find that cascades triggered by gamma rays emitted through inverse Compton scattering of thermal photons from the neutron star's surface, both resonant and non-resonant, are important for the dynamics of the polar cap region in many pulsars.

J. A. Hibschman; J. Arons

2001-07-11T23:59:59.000Z

475

Testing String Material Selection in Environment with Multiple Deleterious Gases  

Science Journals Connector (OSTI)

Abstract While testing a deep exploratory well located in Bohai bay in China, a large amount of carbon dioxide (CO2), hydrogen sulfide (H2S) and carbon monoxide (CO) was detected unexpectedly. Being afraid of their corrosiveness and toxicity, testing work was terminated immediately. After tripped out, the string was found to have been eroded severely. In order to keep going the exploratory work, experiment was made to investigate corrosion rate of carbon steel in environment with multiple deleterious substances. A main purpose was to determine if carbon monoxide has a strong impact on anti-sulfide steel P110S, which is low-cost and has been widely used in sour wells. Experiment result indicates that carbon monoxide has no obvious influence on corrosion rate in circumstances that carbon dioxide and hydrogen sulfide exist. Comprehensive studies show that P110S tubing can be used as testing string to carry out down-hole work. These results eliminated worries of decision-makers.

Gao Baokui; Qin Xing; Wang Wei

2014-01-01T23:59:59.000Z

476

Probing Radiation Damage in Plutonium Alloys with Multiple Measurement Techniques  

SciTech Connect

A material subjected to radiation damage will usually experience changes in its physical properties. Measuring these changes in the physical properties provides a basis to study radiation damage in a material which is important for a variety of real world applications from reactor materials to semiconducting devices. When investigating radiation damage, the relative sensitivity of any given property can vary considerably based on the concentration and type of damage present as well as external parameters such as the temperature and starting material composition. By measuring multiple physical properties, these differing sensitivities can be leveraged to provide greater insight into the different aspects of radiation damage accumulation, thereby providing a broader understanding of the mechanisms involved. In this report, self-damage from {alpha}-particle decay in Pu is investigated by measuring two different properties: magnetic susceptibility and resistivity. The results suggest that while the first annealing stage obeys second order chemical kinetics, the primary mechanism is not the recombination of vacancy-interstitial close pairs.

McCall, S K; Fluss, M J; Chung, B W

2010-04-21T23:59:59.000Z

477

Mixed non-Gaussianity in multiple-DBI inflation  

SciTech Connect

We study a model of multiple-field DBI inflation leading to mixed form of primordial non-Gaussianity, including equilateral and local bispectrum shapes. We present a general formalism based on the Hamilton-Jacobi approach, allowing us to go beyond slow-roll, combining the three-point function for the fields at Hubble-exit with the non-linear evolution of super-Hubble scales. We are able to obtain analytic results by taking a separable Ansatz for the Hubble rate. We find general expressions for both the equilateral and local type non-Gaussianity parameter f{sub NL}. The equilateral non-Gaussianity includes the usual enhancement for small sound speeds, but multiplied by an analytic factor which can lead to a suppression. We illustrate our results with two scenarios. In the first model, previously found to have detectable local non-Gaussianity, we find that the equilateral signal is not sufficiently suppressed to evade current observational bounds. In our second scenario we construct a model which exhibits both a detectable equilateral f{sub NL} and a negative local f{sub NL}.

Emery, Jon; Tasinato, Gianmassimo; Wands, David, E-mail: jon.emery@port.ac.uk, E-mail: gianmassimo.tasinato@port.ac.uk, E-mail: david.wands@port.ac.uk [Institute of Cosmology and Gravitation, University of Portsmouth, Dennis Sciama Building, Portsmouth, PO1 3FX (United Kingdom)

2013-05-01T23:59:59.000Z

478

Detection and track of a stochastic target using multiple measurements  

SciTech Connect

The authors are interested in search and tracking problems. In a search, the target might be located among a number of hiding places. Multiple measurements from various locations might be used to determine the likelihood that a particular hiding place is occupied. An obvious example would be a search for a weak radiation source in a building. Search teams might make many measurements with radiation detectors and analyze this data to determine likely areas for further searching. In this paper the authors present a statistical interpretation of the implications of measurements made on a stochastic system, one which makes random state transitions with known average rates. Knowledge of the system is represented as a statistical ensemble of instances which accord with measurements and prior information. The evolution of ratios of populations in this ensemble due to measurements and stochastic transitions may be calculated efficiently. Applied to target detection and tracking, this approach allows a rigorous definition of probability of detection and probability of false alarm and reveals a computationally useful functional relationship between the two. An example of a linear array of simple counters is considered in detail. For it, accurate analytic approximations are developed for detection and tracking statistics as functions of system parameters. A single measure of effectiveness for individual sensors is found which is a major determinant of system performance and which would be useful for initial sensor design.

Cunningham, C.T.

1995-11-01T23:59:59.000Z

479

Sparse matrix-vector multiplication on a reconfigurable supercomputer  

SciTech Connect

Double precision floating point Sparse Matrix-Vector Multiplication (SMVM) is a critical computational kernel used in iterative solvers for systems of sparse linear equations. The poor data locality exhibited by sparse matrices along with the high memory bandwidth requirements of SMVM result in poor performance on general purpose processors. Field Programmable Gate Arrays (FPGAs) offer a possible alternative with their customizable and application-targeted memory sub-system and processing elements. In this work we investigate two separate implementations of the SMVM on an SRC-6 MAPStation workstation. The first implementation investigates the peak performance capability, while the second implementation balances the amount of instantiated logic with the available sustained bandwidth of the FPGA subsystem. Both implementations yield the same sustained performance with the second producing a much more efficient solution. The metrics of processor and application balance are introduced to help provide some insight into the efficiencies of the FPGA and CPU based solutions explicitly showing the tight coupling of the available bandwidth to peak floating point performance. Due to the FPGA's ability to balance the amount of implemented logic to the available memory bandwidth it can provide a much more efficient solution. Finally, making use of the lessons learned implementing the SMVM, we present an fully implemented nonpreconditioned Conjugate Gradient Algorithm utilizing the second SMVM design.

Dubois, David H [Los Alamos National Laboratory; Dubois, Andrew J [Los Alamos National Laboratory; Boorman, Thomas M [Los Alamos National Laboratory; Connor, Carolyn M [Los Alamos National Laboratory; Poole, Steve [ORNL

2008-01-01T23:59:59.000Z

480

Multiple crossbar network: A switched high-speed local network  

SciTech Connect

The Multiple Crossbar Network (MCN) is a prototype High-Speed Local Network at the Los Alamos National Laboratory. It will interconnect supercomputers, network servers and workstations from various commercial vendors. The MCN can also serve as a backbone for message traffic between local area networks. The MCN is a switched local network of switching nodes called Cross-Point Stars (CPs). Hosts and CPs are connected by 800-Mbit/s (100-Mbyte/s) point-to-point ANSI High-Speed Channels. CPs include RISC-based network protocol processors called Crossbar Interfaces and a switching core called the Crossbar Switch. Protocols include physical, data link, intranet, and network access functionality. Various internet and transport protocols are intended to run above the MCN protocol suite. A network management and simple naming service is also included within the Los Alamos Network Architecture. Immediate applications include visualization. The MCN is intended to also serve as a framework for multicomputer applications. 36 refs., 10 figs.

Hoebelheinrich, R.; Thomsen, R.

1989-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple denial" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Certification of Plutonium Standards for KAMS Neutron Multiplicity Counter  

SciTech Connect

As part of the implementation of the PEIS record of decision in January of 1997, DOE will pursue two technologies to disposition fifty metric tons of its stockpile of plutonium. As a result of this and in order to expedite the closure of Rocky Flats Environmental Technology Site in Colorado, DOE decided to use existing facilities at the Savannah River Site (SRS) for storing all material containing plutonium at KAMS. A neutron multiplicity counter was designed and built to carry out receipt verification measurement at the facility. Since the material covers a wide range and different levels of impurities, it is essential that we obtain a set of working standards. An agreement was drafted to select the first drums to be these standards. A plan was developed for the certification of these standards using Rocky Flat's existing nondestructive assay equipment. This paper will discuss the types of materials to be shipped to SRS, number of standards to certify for each type of material, and the certification plan. It will also discuss the activities necessary to determine the nuclear content of these working standards to be used at SRS facilities in support of shipment and receipt of the Pu containing materials. Definition of instrument qualifications, measurement control processes, measurement methodologies, and calculations necessary to report the gram quantities and their uncertainties for plutonium, americium-241, uranium-235 (if present) and neptunium-237 (if present) will also be presented.

Salaymeh, S.R.

2002-05-31T23:59:59.000Z

482

Inter-rack Live Migration of Multiple Virtual Machines Umesh Deshpande, Unmesh Kulkarni, and Kartik Gopalan  

E-Print Network (OSTI)

Inter-rack Live Migration of Multiple Virtual Machines Umesh Deshpande, Unmesh Kulkarni, and Kartik a distributed system for inter-rack live migration (IRLM), i.e., parallel live migration of multiple VMs across racks. The key performance objective of IRLM is to reduce the traffic load on the core network links

Gopalan, Kartik

483

Multiple-objective Scheduling for the Hierarchical Control of Flexible Manufacturing Cells  

E-Print Network (OSTI)

Multiple-objective Scheduling for the Hierarchical Control of Flexible Manufacturing Cells (Revised level controller employs a combined priority rule to rank shop orders considering multiple scheduling the detailed schedule with projected order completion times back to the shop controller. Upon receiving

Nagi, Rakesh

484

Faster Algorithms for Optimal Multiple Sequence Alignment Based on Pairwise Comparisons  

E-Print Network (OSTI)

Faster Algorithms for Optimal Multiple Sequence Alignment Based on Pairwise Comparisons Pankaj K algorithm more efficient, while still finding an optimal solution under these restrictions. Namely, in our) algorithms compute an optimal Multiple Sequence Alignment for a wide range of scoring functions. In 1970

Kolodny, Rachel

485

On the Performance of Energy-Division Multiple Access with Regular Constellations  

Science Journals Connector (OSTI)

In this paper we describe a multiple-access protocol in which different users are assumed to share the same bandwidth and the same pulse. Users employ the same modulation (binary-phase shift keying, quadrature-phase shift keying, and rectangular-phase ... Keywords: Amplitude modulation, Bit error rate, Multiple access, Normalized throughput, Successive decoding

Pierluigi Salvo Rossi; Gianmarco Romano; Francesco Palmieri

2012-05-01T23:59:59.000Z

486

Efficient Implementation of Polynomial Arithmetic in a Multiple-Level Programming  

E-Print Network (OSTI)

Efficient Implementation of Polynomial Arithmetic in a Multiple-Level Programming Environment Xin-level programming environment. We are interested in the integration of polynomial data type implementations realized of this study is to investigate implementation techniques for polynomial arithmetic in a multiple

Moreno Maza, Marc

487

A study of information dissemination under multiple random walkers and replication mechanisms  

Science Journals Connector (OSTI)

Random walk-based approaches are suitable for information dissemination in mobile and opportunistic environments that are inherently dynamic and typically large-scale. Multiple random walkers have been proposed in the recent past as a suitable ... Keywords: coverage, dissemination and replication techniques, multiple random walkers

Konstantinos Oikonomou; Dimitrios Kogias; Ioannis Stavrakakis

2010-02-01T23:59:59.000Z

488

Multiple paternity in Asclepias syriaca using a paired-fruit analysis  

E-Print Network (OSTI)

Multiple paternity in Asclepias syriaca using a paired-fruit analysis Julie J. Gold and Joel S. Shore Introduction Abstract: We investigated the extent of multiple paternity within and between fruits within fruits. When pairs of fruits obtained from individual ramets were analyzed in a similar manner

Shore, Joel S.

489

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks  

E-Print Network (OSTI)

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G protocol design for wireless ad hoc networks is between proactive and reactive coor- dination, where describe Clique-Based Randomized Multiple Access (CRMA), a distributed MAC protocol for wireless ad hoc

490

10.1098/rsta.2001.0955 Multiple-relaxation-time lattice Boltzmann  

E-Print Network (OSTI)

10.1098/rsta.2001.0955 Multiple-relaxation-time lattice Boltzmann models in three dimensions-relaxation-time lattice Boltzmann equation, with examples of 15-velocity and 19-velocity models in three dimensions Boltzmann equation over the popular lattice Bhatnagar{Gross{Krook equation. Keywords: multiple

Luo, Li-Shi

491

POSTER(1) POSTER(1) poster -Scale and tile a postscript image to print on multiple pages  

E-Print Network (OSTI)

POSTER(1) POSTER(1) NAME poster - Scale and tile a postscript image to print on multiple pages SYNOPSIS poster infile DESCRIPTION Poster can be used to create a large poster by building multiple pages together building the poster. The output pages bear cutmarks and have slightly overlapping

Read, Charles

492

Ionospheric local model and climatology from long-term databases of multiple incoherent scatter radars  

E-Print Network (OSTI)

Ionospheric local model and climatology from long-term databases of multiple incoherent scatter and climatology from long-term databases of multiple incoherent scatter radars, Geophys. Res. Lett., 32, L20102 to ionospheric and ther- mospheric climatology. The altitude dependence, for in- stance, of various variations

493

Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks  

E-Print Network (OSTI)

Energy-Efficient Multiple Routing Trees for Aggregate Query Evaluation in Sensor Networks Yuzhen is of paramount importance. Energy-efficient routing trees built for in-network pro- cessing play a central role multiple routing trees in sensor networks for the evaluation of a class of aggre- gate queries including

Liang, Weifa

494

On the generating function of weight multiplicities for the representations of the Lie algebra $C_2$  

E-Print Network (OSTI)

We use the generating function of the characters of $C_2$ to obtain a generating function for the multiplicities of the weights entering in the irreducible representations of that simple Lie algebra. From this generating function we derive some recurrence relations among the multiplicities and a simple graphical recipe to compute them.

José Fernández Nuñez; Wifredo Garc'\\ia Fuertes; Askold M. Perelomov

2014-05-12T23:59:59.000Z

495

A Game Theoretical Study of Cooperative Advertising with Multiple Retailers in a Distribution Channel  

E-Print Network (OSTI)

1 A Game Theoretical Study of Cooperative Advertising with Multiple Retailers in a Distribution. Beijing 100084, China Abstract Extant studies of cooperative advertising mainly consider a single advertising decisions. Based on the quantitative results, it is observed that: 1) When there are multiple

Xie, Jinxing

496

Multiple cross-docks scheduling using two meta-heuristic algorithms  

Science Journals Connector (OSTI)

This paper considers a truck scheduling problem in a multiple cross docks while there is temporary storage in front of the shipping docks. Receiving and shipping trucks can intermittently move in and out of the docks during the time intervals between ... Keywords: Experimental design, Firefly algorithm, Multiple cross-docks scheduling, Simulated annealing

Mansooreh Madani-Isfahani, Reza Tavakkoli-Moghaddam, Bahman Naderi

2014-08-01T23:59:59.000Z

497

Economic Congestion Relief Across Multiple Regions Requires Tradable Physical Flow-gate Rights  

E-Print Network (OSTI)

PWP-076 Economic Congestion Relief Across Multiple Regions Requires Tradable Physical Flow.ucei.berkeley.edu/ucei #12;Economic Congestion Relief Across Multiple Regions Requires Tradable Physical Flow-gate Rights- mission use. The North American Electric Reliability Council NERC is in the process of implementing

California at Berkeley. University of

498

Incorporating Multiple cDNA Microarray Slide Scans -Application to Somatic Embryogenesis in Maize  

E-Print Network (OSTI)

Incorporating Multiple cDNA Microarray Slide Scans -Application to Somatic Embryogenesis in Maize 1 the measurements of gene expression. Because `optimal' settings may vary from slide to slide, operators typically scan each slide multiple times and then choose the reading with the fewest over-exposed and under

499

Multiplication of Distributions in one dimension: possible approaches and applications to $?$-function and its derivatives  

E-Print Network (OSTI)

We introduce a new class of multiplications of distributions in one dimension merging together two different regularizations of distributions. Some of the features of these multiplications are discussed in a certain detail. We use our theory to study a certain number of examples, involving products between Dirac delta functions and its successive derivatives.

F. Bagarello

2009-04-01T23:59:59.000Z

500

A construct of internal multiples from surface data only: the concept of virtual seismic events  

Science Journals Connector (OSTI)

......another reason why the iterative process described in Figs 12 and 13...multiples During the review process for this paper, an internal-multiple...suggestions during the review process. References 1 Berkhout A...only: 74th Annual Internat. Mtg., Soc. Expl. Geophys......

Luc T. Ikelle

2006-02-01T23:59:59.000Z