National Library of Energy BETA

Sample records for abstract multiple vulnerabilities

  1. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  2. V-092: Pidgin Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  3. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  4. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  5. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  6. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  7. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  8. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  9. V-059: MoinMoin Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  10. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  11. V-126: Mozilla Firefox Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  12. U-104: Adobe Flash Player Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  13. V-097: Google Chrome Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  14. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  15. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  16. V-083: Oracle Java Multiple Vulnerabilities

    Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  17. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  18. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  19. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  20. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  1. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  2. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  3. U-171: DeltaV Products Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  4. T-540: Sybase EAServer Multiple Vulnerabilities

    Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  5. V-208: Google Chrome Multiple Vulnerabilities

    Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  6. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  7. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

  8. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  9. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  10. U-179: IBM Java 7 Multiple Vulnerabilities

    Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  11. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, ...

  12. V-187: Mozilla Firefox Multiple Vulnerabilities

    Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  13. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  14. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  15. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  16. U-187: Adobe Flash Player Multiple Vulnerabilities

    Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  17. U-273: Multiple vulnerabilities have been reported in Wireshark

    Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  18. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  19. Abstract:

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Abstract: We present a unique approach to the design and synthesis of "giant molecules" ... Herein, "nano-atoms" refer to shape-persistent molecular nanoparticles (MNPs) with ...

  20. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  1. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  2. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  3. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  4. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  5. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  6. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  7. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy 51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am Addthis PROBLEM: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities. PLATFORM: Cisco WebEx recording players. Microsoft Windows, Apple Mac OS X, and Linux versions of the player are all affected. Affected versions of the players are those prior to client builds T27LC SP22 and

  8. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  9. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  10. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  11. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  12. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  13. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  14. V-132: IBM Tivoli System Automation Application Manager Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Vulnerabilities | Department of Energy 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security

  15. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  16. Core damage vulnerability due to the loss of ESW (essential service water) systems at multiplant sites: An assessment and options

    SciTech Connect

    Kohut, P.; Musicki, Z.; Fitzpatrick, R. )

    1989-01-01

    The main objective of this study is to establish the core damage vulnerability caused by the failure of the ESW systems in multiplant units that have only two sw pumps per unit with crosstie capability. Design and operating data have been surveyed to derive system failure frequency. A core damage model is constructed including operating configurations, specific recovery actions, and time and leak rate dependent RCP seal LOCA model. The estimated CDF{sub SW} = 2.55 {times} 10{sup {minus}4}/yr is significant indicating the potential vulnerability of this particular SW design arrangement. A number of different potential improvements have been considered. The addition of a swing pump serving both units is shown to have the most significant CDF reduction potential ({approximately}50%) combined with advantageous cost/benefit aspects. 2 refs., 2 tabs.

  17. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Vulnerabilities | Department of Energy 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are

  18. Abstract Submission

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Abstract Template Please use this abstract template (docx) Abstract Submission Do not submit classified information to the form. First Name* Middle Name (optional) Last Name* ...

  19. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  20. Error abstractions

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Error and fault abstractions Mattan Erez UT Austin *Who should care about faults and errors? *Ideally, only system cares about masked faults? - Assuming application bugs are not...

  1. Abstract2007

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    19, 2007 for poster submission only). Abstract should be text only and written in good English. No figures, images, equations and special characters are allowed. The limit on the...

  2. PROGRAM ABSTRACTS

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    & DEVELOPMENT: PROGRAM ABSTRACTS Energy Efficiency and Renewable Energy Office of Transportation Technologies Office of Advanced Automotive Technologies Catalyst Layer Bipolar Plate Electrode Backing Layers INTEGRATED SYSTEMS Polymer Electrolyte Membrane Fuel Cells Fuel Cell Stack PEM STACK & STACK COMPONENTS Fuel Cell Stack System Air Management System Fuel Processor System For Transportation June 1999 ENERGY EFFICIENCY AND RENEWABLE ENERGY OFFICE OF TRANSPORTATION TECHNOLOGIES OFFICE

  3. Network Abstractions:

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Abstractions: The first step towards a programmable WAN Inder Monga TIP 2013 January 15 th , 2013 Lawrence Berkeley National Laboratory U.S. Department of Energy | Office of Science Ongoing Science Revolution Data-intensive Science * Era of Big-Data' Exascale, HPC and Future Data Centers * Optics to the end 12/18/12 2 Inder Monga, OTS Demo Lawrence Berkeley National Laboratory U.S. Department of Energy | Office of Science Data Integration Bringing together big-data' from various sources Dataset

  4. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Articles U-179: IBM Java 7 Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-094: IBM Multiple Products Multiple...

  5. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  6. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  7. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  8. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  9. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  10. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis...

  11. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Office of Environmental Management (EM)

    V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

  12. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-122: IBM Tivoli Application...

  13. SSRL30 Abstracts

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    abstracts highlighting research activities conducted over the past year at SSRL for oral and poster presentations at the Users' Meeting. Please use the abstract submission form...

  14. Analysis of complex networks using aggressive abstraction.

    SciTech Connect

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving - we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  15. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  16. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  17. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  18. Common Control System Vulnerability

    SciTech Connect

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  19. Lessons about vulnerability assessments.

    SciTech Connect

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  20. SSRL28 Abstract Submission

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Visitor Info General Info Need more information? Contact: Cathy Knotts Manager, URA SSRL, MS 99 2575 Sand Hill Road Menlo Park, CA 94025 28th Annual Stanford Synchrotron Radiation Laboratory Users' Meeting Menlo Park, California USA October 17-19, 2001 Oral Abstract Submissions - Due August 24 Poster Abstract Submissions - Due September 28 Users are invited to submit abstracts highlighting research activities conducted over the past year at SSRL for poster presentations at the Users' Meeting.

  1. SSRL29 Abstract Form

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    abstracts highlighting research activities conducted over the past year at SSRL for oral or poster presentation at the meeting. Posters will be displayed throughout the meeting...

  2. Abstract Submission Process

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Abstract Submission Process Focusing on methods and computational tools used to help sequence, assemble, and finish genomes, including new sequencing technologies. Contact Shannon...

  3. penionzhkevich_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Russian Federation Abstract: This talk is an attempt to present some problems on the evolution of the Universe: the nucleosynthesis and cosmochronology from the standpoint of...

  4. BEMS: Abstract book

    SciTech Connect

    1995-06-01

    This volume provides abstracts of presentations made at the Sixteenth Meeting of The Bioelectromagnetics Society held June 12-17, 1994 in Copenhagen, Denmark.

  5. Online Abstracts and Reports

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Online Abstracts and Reports - Sandia Energy Energy Search Icon Sandia Home Locations Contact ... Algae Testbed Battery Abuse Testing Laboratory Center for Infrastructure Research ...

  6. Presentations/Abstracts

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    PresentationsAbstracts - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Algae Testbed Battery Abuse Testing Laboratory Center for Infrastructure Research and ...

  7. V-028: Splunk Multiple Cross-Site Scripting and Denial of Service...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    28: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 -...

  8. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, ...

  9. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  10. T-657: Drupal Prepopulate- Multiple vulnerabilities

    Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  11. U-035: Adobe Flash Player Multiple Vulnerabilities

    Energy.gov [DOE]

    Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880.

  12. U-191: Oracle Java Multiple Vulnerabilities

    Energy.gov [DOE]

    The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes. This Critical Patch Update contains 14 new security fixes across Java SE products.

  13. V-214: Mozilla Firefox Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors....

  14. U-100: Google Chrome Multiple Vulnerabilities

    Energy.gov [DOE]

    A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  15. prakash_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Prakash Ohio University Athens, Ohio, USA Abstract: The neutron star in Cassiopeia A (Cas A) is now 333 years old and is the youngest known star from which thermal emission for...

  16. Abstracts of contributed papers

    SciTech Connect

    Not Available

    1994-08-01

    This volume contains 571 abstracts of contributed papers to be presented during the Twelfth US National Congress of Applied Mechanics. Abstracts are arranged in the order in which they fall in the program -- the main sessions are listed chronologically in the Table of Contents. The Author Index is in alphabetical order and lists each paper number (matching the schedule in the Final Program) with its corresponding page number in the book.

  17. Biological & Environmental Research Abstracts Database

    Office of Scientific and Technical Information (OSTI)

    Submit Ober Abstracts All project abstracts should be submitted via email to: Please include the project title and principal investigator's name along with the abstract submission. ...

  18. Thyra Abstract Interface Package

    Energy Science and Technology Software Center

    2005-09-01

    Thrya primarily defines a set of abstract C++ class interfaces needed for the development of abstract numerical atgorithms (ANAs) such as iterative linear solvers, transient solvers all the way up to optimization. At the foundation of these interfaces are abstract C++ classes for vectors, vector spaces, linear operators and multi-vectors. Also included in the Thyra package is C++ code for creating concrete vector, vector space, linear operator, and multi-vector subclasses as well as other utilitiesmore » to aid in the development of ANAs. Currently, very general and efficient concrete subclass implementations exist for serial and SPMD in-core vectors and multi-vectors. Code also currently exists for testing objects and providing composite objects such as product vectors.« less

  19. Facility Environmental Vulnerability Assessment

    SciTech Connect

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  20. abstract-hope

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Parallelization of the TRANSIMS Microsimulator - design, development, and performance Michael Hope Transportation Research and Analysis Computing Center Argonne National Laboratory List of Authors ================ Michael Hope Transportation Research and Analysis Computing Center Argonne National Laboratory 277 International Drive West Chicago, IL 60185 Abstract ========= The original TRANSIMS Microsimulator was designed as a purely parallel program. As desktop machine performance grew by leaps

  1. Seismic Consequence Abstraction

    SciTech Connect

    M. Gross

    2004-10-25

    The primary purpose of this model report is to develop abstractions for the response of engineered barrier system (EBS) components to seismic hazards at a geologic repository at Yucca Mountain, Nevada, and to define the methodology for using these abstractions in a seismic scenario class for the Total System Performance Assessment - License Application (TSPA-LA). A secondary purpose of this model report is to provide information for criticality studies related to seismic hazards. The seismic hazards addressed herein are vibratory ground motion, fault displacement, and rockfall due to ground motion. The EBS components are the drip shield, the waste package, and the fuel cladding. The requirements for development of the abstractions and the associated algorithms for the seismic scenario class are defined in ''Technical Work Plan For: Regulatory Integration Modeling of Drift Degradation, Waste Package and Drip Shield Vibratory Motion and Seismic Consequences'' (BSC 2004 [DIRS 171520]). The development of these abstractions will provide a more complete representation of flow into and transport from the EBS under disruptive events. The results from this development will also address portions of integrated subissue ENG2, Mechanical Disruption of Engineered Barriers, including the acceptance criteria for this subissue defined in Section 2.2.1.3.2.3 of the ''Yucca Mountain Review Plan, Final Report'' (NRC 2003 [DIRS 163274]).

  2. Energy vulnerability relationships

    SciTech Connect

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  3. Plutonium Vulnerability Management Plan

    SciTech Connect

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  4. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  5. ABSTRACTS FOR PAPERS PUBLISHED

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ABSTRACTS FOR PAPERS PUBLISHED April 1, 2000 - March 31, 2001 Isoscalar Giant Resonances and Nuclear Matter Compressibility D. H. Youngblood Nucl. Phys. A687, 1 (2001) Compression mode giant resonances have been measured in many nuclei from 12 C to 208 Pb with inelastic scattering of 240 MeV ∀ particles at small angles. Isoscalar monopole (GMR) distributions have been extracted for 17 nuclei and isoscalar dipole (ISDGR) distributions extracted for 11 nuclei. The isoscalar E1 strength

  6. penionzhkevich_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Exotic Nuclei and Astrophysics" Professor Yuri Penionzhkevich Flerov, Lab. of Nucl. Reactions. JINR, Dubna, Russian Federation Abstract: This talk is an attempt to present some problems on the evolution of the Universe: the nucleosynthesis and cosmochronology from the standpoint of physics of particles and nuclei, in particular with the use of the latest results, obtained by means of radioactive nuclear beams. The comparison is made between the processes taking place in the Universe and the

  7. schroeder_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Fission Chips" - Unusual Flavors (Dynamic nuclear instabilities in fission-like reactions) Professor W. Udo Schroeder Departments of Chemistry and Physics, University of Rochester, Rochester, NY 14627, USA Abstract Fission of cold nuclei is essentially a binary, adiabatic process, with only a mi- nute probability for the emission of associated light charged clusters. In contrast, nuclear systems in fast heavy-ion reactions respond to significant mechanical and thermal stresses by exhibiting

  8. stoltz_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Diamond detectors for relativistic heavy ions Professor A ndreas S tolz NSCL, M ichigan S tate U niversity, E ---Lansing, M I Abstract The newest generation of rare isotope facilities can produce radioactive heavy ions beams with intensities that exceed the capabilities of conventional particle detectors. The outstanding properties of diamond allow the development of particle detectors with very fast detector response and excellent radiation hardness. Detectors based on chemical vapor deposition

  9. abstract-moraga

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Simulation of building evacuation exit rates for TRANSIMS Reinaldo Moraga Department of Industrial and Systems Engineering Northern Illinois University 590 Garden Road DeKalb, IL 60115-2854 (815) 753-1442 List of Authors ================ Reinaldo Moraga Department of Industrial and Systems Engineering Northern Illinois University Abstract ========= This presentation deals with the topic of building evacuation modeling for TRANSIMS large scale simulation models in major metropolitan cities. The

  10. abstract-oh

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Application of TRANSIMS for Highway Work Zones: Travel Pattern and Mobility Impacts Jun-Seok Oh List of Authors ================ Jun-Seok Oh Associate Professor Western Michigan University Kalamazoo, MI 49008-5316 Phone: (269) 276-3216 FAX: (269) 276-3211 Email: This email address is being protected from spambots. You need JavaScript enabled to view it. Abstract ========= This project applies TRANSIMS to highway work zones analysis with emphasis on travel pattern changes and work-zone mobility

  11. Notices I. Abstract

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    44 Federal Register / Vol. 81, No. 199 / Friday, October 14, 2016 / Notices I. Abstract The U.S. Census Bureau plans to request a three-year extension of the current Office of Management and Budget (OMB) clearance of the Questionnaire for Building Permit Official (SOC-QBPO). The Census Bureau uses the Computer-Assisted Personal Interviewing (CAPI) electronic questionnaire SOC-QBPO to collect information from state and local building permit officials on: (1) The types of permits they issue, (2)

  12. bolgac_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Induced fission in real-time Professor Aurel Bolgac Department of Physics, University of Washington, Seattle, Washington Abstract: Nuclear fission appears to be one of the most difficult problems in quantum many-body physics and is approaching shortly the venerable age of 80 years and it still defies efforts to arrive at a microscopic description. A quantum theory of superconductivity was developed in contrast in less than 50 years. Major progress in developing an extension of the Density

  13. mosby_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    capture by any means necessary Dr. Shea Mosby Nuclear Astrophysics and Structure, Los Alamos National Laboratory, Los Alamos, NM Abstract: Knowledge of nuclear reactions in general, and neutron capture cross sections in particular, are necessary to understand both heavy element nucleosynthesis and applications in nuclear energy and defense. While many nuclei of interest lie on or near the valley of stability and can be studied directly, many more are beyond the reach of any direct measurement.

  14. EBS Radionuclide Transport Abstraction

    SciTech Connect

    J. Prouty

    2006-07-14

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment (TSPA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport model considers advective transport and diffusive transport

  15. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  16. How to Prepare Your Abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Prepare Your Abstract The abstract should provide a brief overview of your entire research. The abstract briefly states the research problem or purpose of the research (Introduction), how the problem was studied (Methods), what was discovered (Results), and how the results might be interpreted (Discussions and Conclusions). Acronyms may be used in an abstract, however they should be spelled out the first time they are used. Abstracts should be concise and descriptive. Symposium Abstract Format

  17. SENSE-Project-Abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    response to ASCR Program Announcement LAB 15-1295 SENSE: SDN for End-to-end Networked Science at the Exascale Lead PI: Inder Monga, Lawrence Berkeley National Lab, imonga@es.net, 510-499-8065 Team: ANL - Linda Winkler, Kate Keahey, Caltech - Harvey Newman, Ramiro Voicu, FNAL - Phil DeMar, LBNL/ESnet - Chin Guok, John MacAuley, LBNL/NERSC - Jason Hick, UMD/MAX - Tom Lehman, Xi Yang, Alberto Jimenez Abstract: Traditionally, WAN and campus networks and services have evolved independently from each

  18. prakash_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Cyclotron Colloquium on Friday, April 18, 2014, at 11:00 am in Room 300 Refreshments will be served at 10:45 am Title: The neutron star in Cassiopeia A and what it is telling us? Professor Madappa Prakash Ohio University Athens, Ohio, USA Abstract: The neutron star in Cassiopeia A (Cas A) is now 333 years old and is the youngest known star from which thermal emission for over a decade has been observed. Initial reports from the analysis of archival data indicated Cas A's surface temperature to

  19. abstract-kerenyi

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Use of TRANSIMS to Analyze Large-Scale Land-Use Changes: Status Update John Kerenyi City of Moreno Valley 14177 Frederick St P.O. Box 88005 Moreno Valley, CA 92553 (951) 413-3199 This email address is being protected from spambots. You need JavaScript enabled to view it. List of Authors ================ John Kerenyi Abstract ========= In 2008 the City of Moreno Valley was awarded a contract to develop a TRANSIMS traffic model of the Southern California region based on the current (2004) MPO's

  20. ko_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Charged pion ratio in heavy ion collisions as a probe of the nuclear symmetry energy a t h igh d ensity Abstract: K nowledge o n t he d ensity d ependence o f n uclear s ymmetry e nergy, w hich is a measure of the change in the binding energy of a nucleus when a proton is converted to a neutron, is important for understanding the structure of rare isotopes o f l arge n eutron o r p roton e xcess a nd m any i ssues i n n uclear a strophysics. Collisions between neutron---rich nuclei provide the

  1. mabiala_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Cyclotron Colloquium on Friday, August 17th, 2016, at 3:45 pm in Room 228 Refreshments will be served at 3:30 pm Dr. Justin Mabiala Cyclotron Institute Abstract: Pre-equilibrium emission and its possible relation to alpha-clustering in nuclei Cluster structure effects in nuclei have been investigated looking to the preequilibrium particles emitted in the 16O+65Cu and 19F+62Ni reactions at the same beam velocity of 16 AMeV which lead to the same 81Rb* compound nucleus. Despite the slight

  2. Biological & Environmental Research Abstracts Database

    Office of Scientific and Technical Information (OSTI)

    Welcome to the Biological and Environmental Research Abstracts Database The U.S. ... This database contains abstracts of research projects supported by the program. Work was ...

  3. Energy Research Abstracts; (USA)

    SciTech Connect

    Rutkowski, R.W.; Henline, D.M.

    1991-01-01

    Energy Research Abstracts (ERA) provides abstracting and indexing coverage of all scientific and technical reports and patent applications originated by the US Department of Energy, its laboratories, energy centers, and contractors, as well as theses and conference papers and proceedings issued by these organizations in report form. Audiovisual materials, computer media (magnetic tapes, diskettes, etc.), and engineering drawings are included in this definition. ERA also covers other energy information prepared in report form by federal and state government organizations, foreign governments, and domestic and foreign universities and research organizations, provided that the full text of the document has been received by OSTI. Foreign report information is obtained through the International Energy Agency's fourteen nation Energy Technology Data Exchange, the International Atomic Energy Agency's International Nuclear Information System, or nation-to-nation agreements. The purpose of this publication is to announce documents produced or obtained by DOE that are not so readily available as journal articles, books, or patents. ERA does not cover nonreport literature. The scope of ERA encompasses DOE's research, development, demonstration, and technology programs resulting from its broad charter for energy sources, supplies, safety, environmental impacts, and regulation.

  4. EBS Radionuclide Transport Abstraction

    SciTech Connect

    J.D. Schreiber

    2005-08-25

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in ''Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration'' (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment for the license application (TSPA-LA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA-LA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport model considers

  5. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  6. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  7. Mechanical Engineering Department technical abstracts

    SciTech Connect

    Denney, R.M.

    1982-07-01

    The Mechanical Engineering Department publishes listings of technical abstracts twice a year to inform readers of the broad range of technical activities in the Department, and to promote an exchange of ideas. Details of the work covered by an abstract may be obtained by contacting the author(s). Overall information about current activities of each of the Department's seven divisions precedes the technical abstracts.

  8. Microsoft Word - bang_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Cluster fusion experiment on the Texas Petawatt Woosuk Bang Fusion Research Center The University of Texas at Austin Abstract When an intense, femtosecond pulse irradiates van der ...

  9. Microsoft Word - mosel_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Physics is needed" Professor Ulrich Mosel Univ Giessen, Inst Theoret Phys, Giessen, Germany Abstract: Long baseline experiments with neutrinos require a precise knowledge of the ...

  10. Microsoft Word - roepke_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Cluster formation in nuclear systems Professor Gerd Roepke Institute of Physics, Rostock University, Germany Abstract To describe cluster formation in nuclear matter at ...

  11. Microsoft Word - mcnabb_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Dennis McNabb Lawrence Livermore National Laboratory Abstract: LLNL is an applied science laboratory that innovates technology to enable new ideas and concepts for government ...

  12. Microsoft Word - strickland_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    quark gluon plasma Dr. Michael Strickland Gettysburg College Abstract: In this talk I will review our theoretical understanding of the dynamics of a non- equilibrium quark ...

  13. Microsoft Word - wieloch_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    "Critical-like behavior in a lattice gas model" Professor Andrzej Wieloch M. Smoluchowski Inst. of Physics, Jagiellonian Univ., Krakow, Poland Abstract: The ALADIN...

  14. Microsoft Word - yongseok_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Yongseok Department of Physics, Kyungpook National University, Korea Abstract: (I) To ... the core facility of the Institute of Basic Sciences of Korea, will be introduced. ...

  15. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  16. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  17. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  18. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  19. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT:

  20. Vendor System Vulnerability Testing Test Plan

    SciTech Connect

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  1. Technical abstracts: Mechanical engineering, 1990

    SciTech Connect

    Broesius, J.Y.

    1991-03-01

    This document is a compilation of the published, unclassified abstracts produced by mechanical engineers at Lawrence Livermore National Laboratory (LLNL) during the calendar year 1990. Many abstracts summarize work completed and published in report form. These are UCRL-JC series documents, which include the full text of articles to be published in journals and of papers to be presented at meetings, and UCID reports, which are informal documents. Not all UCIDs contain abstracts: short summaries were generated when abstracts were not included. Technical Abstracts also provides descriptions of those documents assigned to the UCRL-MI (miscellaneous) category. These are generally viewgraphs or photographs presented at meetings. An author index is provided at the back of this volume for cross referencing.

  2. Abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Phase Fabrication Problems 5.4 Staggered Overlap Joint Design 6. D-spar Static & Modal Testing 79 6.1 Static Test Set-up 6.2 Static Test Results 6.3 Comparison Between Estimated...

  3. Abstract

    Office of Scientific and Technical Information (OSTI)

    ... to ensure successful operation of the test unit, had sufficient funds been available. ... principles for soot content detection, 3) test operation scheme, and 4) specifics ...

  4. Abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Simulations showed actinide inventories stabilizing to steady levels while fresh actinide fuel from feedstocks of Spent Nuclear Fuel or uranium-238 or thorium-232 continued to be ...

  5. Abstract

    Office of Scientific and Technical Information (OSTI)

    Ridge, TN 37831-6131-6210 3Imaging & Nanoscale Characterization Group, Center for ... Microscopy and Fluorescence Techniques. Nanoscale 2009, 1, 40-49. 13 Petibois, C. Imaging ...

  6. Abstract

    Office of Scientific and Technical Information (OSTI)

    SAND2007-2331 Unlimited Release Printed April 2007 Autothermal Reforming of Natural Gas to Synthesis Gas Reference: KBR Paper 2031 Steven F. Rice and David P. Mann Prepared by ...

  7. Abstract:

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    will discuss recent experiments on the structural, chemical, and electronic properties of graphene and hBN, including high resolution electron microscopy where real-time dynamics...

  8. Abstract:

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    A prototypical disease example is the brain cancer glioblastoma multiforme (GBM). At the molecular level, it is rare for any two GBM patients to appear as if they have the same ...

  9. ABSTRACT

    Office of Scientific and Technical Information (OSTI)

    ... Witterseh T. 2001. Environmental perception, SBS symptoms and performance of office work under combined exposure to temperature, noise and air pollution. PhD Thesis. International ...

  10. ABSTRACT

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    tracking suited for all PV technologies, protocols and the associated communications.1 In addition to advanced grid interconnection capabilities and "value added" ...

  11. ABSTRACT

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... hot-spot, and NCD hot-spot neutron ... three categories based on neutrino target: chlorine detectors, water ( C erenkov ... and has an extraction efficiency of 95%. ...

  12. Abstract

    Office of Scientific and Technical Information (OSTI)

    Acknowledgements xv 1 Introduction ...... 1 1.1 Physics motivation ... Introduction 1.1 Physics motivation High momentum transfer phenomena are known to be a ...

  13. ABSTRACT

    Office of Scientific and Technical Information (OSTI)

    ... Atlanta, GA, American Society of Heating, Refrigerating, and Air Conditioning Engineers, Inc. Beko, G., G. Clausen and C. J. Weschler (2008). "Sensory pollution from bag filters, ...

  14. Abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... Base Levelized Cost of Electricity (LCOE) Total Fuel Costs Cooling All Other Year: 6.7 centskWh 2.1 centskWh 0.3 centskWh 4.4 centskWh 2010 6.4 centskWh 2 centskWh 0.2 ...

  15. ABSTRACT

    Office of Scientific and Technical Information (OSTI)

    ... passed through Nafion tubing coiled inside a container containing silica gel desiccant. ... and the reductions in outdoor ozone production with cooler temperatures, the study was ...

  16. ABSTRACT

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    water was integral to the Site's Cold War nuclear production mission as it was used ... The study provides historic contexts for the site's Cold War history and a context for ...

  17. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    OpenEI (Open Energy Information) [EERE & EIA]

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  18. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  19. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am ...

  20. V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 -...

  1. Microsoft Word - sakai_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    will be served at 3:30 pm New Result from RIKEN RIBF Dr. H. Sakai RIKEN, Wako. Japan Abstract: Very recent experimental results from RI Beam Factory(RIBF) of RIKEN will be...

  2. Microsoft Word - linnyk_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Monday, May 22nd, at 1:30 pm "Dilepton production at SPS and RHIC energies" Dr. Olena Linnyk Frankfurt Institute for Advanced Study (FIAS), Frankfurt, Germany Abstract: Analysis of ...

  3. Microsoft Word - hohler_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    29th, 4:00 PM Bulk spectral function sum rule in QCD-like theories with a holographic dual Dr. Paul M. Hohler University of Illinois at Chicago Abstract: In this talk, the sum rule...

  4. Microsoft Word - xu_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Theory Seminar Friday, January 21st, at 4:00 pm Triangular flow and dihadron azimuthal correlations in heavy ion collisions Dr. Jun Xu Abstract The dihadron azimuthal correlations...

  5. Microsoft Word - sherrill_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    April 6 at 3:45 PM Designer Nuclei: New possibilities with the Facility for Rare Isotope Beams Professor Brad Sherrill Abstract: A quest of experimental nuclear science is to...

  6. Microsoft Word - saastamoinen_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    April 24, 2012, at 2:00 pm Refreshment will be served at 1:45 pm Beta-decay Studies for Nova Nucleosynthesis Dr. Antti Saastamoinen University of Jyvskyl TAMU Abstract...

  7. Microsoft Word - davinson_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    23 at 10:30 AM "Decay Spectroscopy at FAIR Using the Advanced Implantation Detector Array (AIDA)" Dr. Thomas Davinson The University of Edinburgh, UK Abstract: The objective of the...

  8. Microsoft Word - djawotho_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Pibero Djawotho Texas A&M University Abstract: For polarized protons colliding at RHIC energies, the production of jets and hadrons is dominated by gg and qg scattering, making the ...

  9. Poster Abstract of Nineteenth ARM STM

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    7 Science Team MeetingPoster Abstract 2007

  10. Poster Abstract of Nineteenth ARM STM

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    8 Science Team MeetingPoster Abstract 2008

  11. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    NSTB Summarizes Vulnerable Areas NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered some common areas of vulnerability in the energy control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. NSTB Summarizes Vulnerable Areas (14.04 KB) More Documents & Publications Lessons Learned from Cyber Security Assessments of SCADA and Energy

  12. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  13. Microsoft Word - roepke_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Cluster formation in nuclear systems Professor Gerd Roepke Institute of Physics, Rostock University, Germany Abstract To describe cluster formation in nuclear matter at subsaturation densities, in-medium modifications have to be taken into account. A cluster mean-field theory is discussed and compared with other approaches. Consequences for nuclear structure, heavy ion reactions and astrophysical applications are discussed

  14. Microsoft Word - satz_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Quark Confinement and Hadrosynthesis Professor Helmut Satz Fakultaet fuer Physik, Universitaet Bielefeld, Bielefeld, Germany 10 May 2012 Abstract Hadron abundances in all high energy collisions follow the thermal pattern of an ideal resonance gas at a universal temperature of 170 MeV. We attempt to find a mechanism for such behavior in terms of universal quark constraints by the color confinement horizon.

  15. Costs of strikes between vulnerable missile forces

    SciTech Connect

    Canavan, G.H.

    1997-02-01

    This note derives the first and second strike magnitudes and costs for strikes between vulnerable missile forces with multiple warheads. The extension to mixes with invulnerable missiles is performed in a companion note. Stability increases as the number of weapons per missile is reduced. The optimal allocation of weapons between missiles and value is significant in predicting the stability impact of the reduction of the number of weapons per missile at large numbers of missiles, less significant in reducing the number of missiles for fixed weapons per missile. At low numbers of missiles, the stability indices for singlet and triplet configurations are comparable, as are the number of weapons each would deliver on value targets.

  16. Microsoft Word - bang_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    fusion experiment on the Texas Petawatt Woosuk Bang Fusion Research Center The University of Texas at Austin Abstract When an intense, femtosecond pulse irradiates van der Waals bonded atomic clusters, the laser pulse energy can be absorbed very efficiently. This allows the laser to produce plasma with ion temperature higher than a few keV. When an energetic deuterium ion collides with another deuterium ion, a nuclear fusion reaction can occur, generating a 2.45 MeV neutron. By shooting

  17. Microsoft Word - bardayan_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    May 15, 2012, at 3:45 pm Room MIST 102 at the Mitchell Institute Refreshment will be served at 3:30 pm New instruments and recent results in the study of transfer reactions at the HRIBF Dr. Dan Bardayan Oak Ridge National Laboratory Abstract: Single-nucleon transfer reactions on heavy neutron-rich nuclei are critical to providing an empirical foundation for the determination of the incredibly large neutron fluxes in extreme environments such as exploding stars, internal confinement fusion

  18. Microsoft Word - bentley_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    30 at 3:45 PM Professor Michael A. Bentley Department of Physics University of York, York, UK Abstract: The new international FAIR facility in Darmstadt, Germany, has been launched and will provide a major radioactive beam facility in Europe for a wide range of science applications. One major activity within FAIR is the NuSTAR collaboration (Nuclear Structure, Astrophysics and Reactions) in which the UK plays a leading role in terms of the scientific drive and some of the technical developments.

  19. Microsoft Word - fields_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    4, 2010 at 3:45 pm "Primordial Nucleosynthesis After WMAP: The Lithium Problem and New Physics" Professor Brian Fields Departments of Astronomy and Physics Univ. of Illinois, Urbana, IL Abstract: The early universe is a central arena for the interplay among nuclear,particle, and astrophysics, and big-bang nucleosynthesis remains particularly important because it represents our earliest reliable probe of the cosmos. We will review the physics of primordial nucleosynthesis which

  20. Microsoft Word - gonin_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Seminar, Friday, February 19th, at 4:00 PM "The Tokai to Kamioka Long Baseline Neutrino Oscillation Experiment" Michel Gonin - Ecole Polytechnique - France Abstract Physicists from the Japanese-led multi-national T2K neutrino collaboration announced last November that they detected the first neutrino events generated by their newly built neutrino beam at the J-PARC accelerator laboratory in Tokai, Japan. This detection therefore marks the beginning of the operational phase of the new

  1. Microsoft Word - mcnabb_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Dennis McNabb Lawrence Livermore National Laboratory Abstract: LLNL is an applied science laboratory that innovates technology to enable new ideas and concepts for government agencies responsible for nuclear security, counter-terrorism, national defense, energy, and environment. The Nuclear and High Energy Physics Section of LLNL provides and advances nuclear physics, particle physics and accelerator technology capabilities in support of these programs and other national priorities in science

  2. Microsoft Word - moody_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    NSI Colloquium on Monday, August 27 at 3:45 pm in Hawking Auditorium--Mitchel Institute Refreshments will be served at 3:30 pm FORENSIC RADIOCHEMISTRY Dr. Ken Moody Chemical Sciences Division, Lawrence Livermore National Laboratory Abstract: Signatures inherent in a sample containing radionuclides give clues about the origin of the material. This information can be quite important when dealing with smuggled nuclear materials interdicted by law enforcement personnel, or potential debris samples

  3. Microsoft Word - mosel_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    9, at 3:45 pm "Neutrino-Long-Baseline Experiments -- where Nuclear Physics is needed" Professor Ulrich Mosel Univ Giessen, Inst Theoret Phys, Giessen, Germany Abstract: Long baseline experiments with neutrinos require a precise knowledge of the incoming neutrino beam properties (energy and flux) as well as a detailed understanding of neutrino-nucleus interactions. In this talk I will discuss a nuclear-physics based simulation of such events on the basis of the Boltzmann-

  4. Microsoft Word - nica2_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    June 1st at 3:30 PM " Experimental evidence of repeatability in high-spin data and phenomenological interpretation Part one: Differential distributions" Dr. Ninel Nica Cyclotron Institute, Texas A&M University Abstract: We present the experimental evidence of a general correlation property of high-spin physics that we named Repeatability, consisting in highly hierarchized ordering relationships in two-dimensional gamma-ray coincidence data. However despite its generality

  5. Microsoft Word - pang_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    12, 2010 at 3:45 pm "RF Carpet Development at the NSCL" Gregory K. Pang** Departments of Astronomy and Physics Univ. of Illinois, Urbana, IL NSCL, Michigan State University, E. Lansing, MI ABSTRACT: The slowing down and thermalizing of nuclear reaction products from projectile fragmentation processes is essential for allowing the study of rare isotopes in low-energy precision experiments. Current methods of stopping fast beams rely on gas filled linear chambers equipped with electrodes

  6. Microsoft Word - sherrill_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    April 6 at 3:45 PM Designer Nuclei: New possibilities with the Facility for Rare Isotope Beams Professor Brad Sherrill Abstract: A quest of experimental nuclear science is to synthesize atoms made of all possible combinations of neutrons, protons and electrons. In part, based on our current capabilities for creating new isotopes, our understanding of atomic nuclei has changed dramatically. Many of the so called basic properties of atomic nuclei turn out to not be as universal as we thought.

  7. Microsoft Word - strickland_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    15th, 4:00 PM Dynamics of an anisotropic quark gluon plasma Dr. Michael Strickland Gettysburg College Abstract: In this talk I will review our theoretical understanding of the dynamics of a non- equilibrium quark gluon plasma. I will begin by discussing the emergence of strong local momentum-space anisotropies in the plasma due to the rapid longitudinal expansion of the plasma at early times. While strongly-coupled plasmas might remain approximately isotropic in the center of the collision

  8. Microsoft Word - wieloch_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    "Critical-like behavior in a lattice gas model" Professor Andrzej Wieloch M. Smoluchowski Inst. of Physics, Jagiellonian Univ., Krakow, Poland Abstract: The ALADIN multifragmentation data for reaction Au+Au at several hundreds A.MEV show features characteristic of critical behavior, which are very well reproduced by a bond percolation model. This suggests, in the context of the lattice gas model, that fragments are formed at nearly normal nuclear densities and temperatures

  9. Microsoft Word - xu_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Theory Seminar Friday, January 21st, at 4:00 pm Triangular flow and dihadron azimuthal correlations in heavy ion collisions Dr. Jun Xu Abstract The dihadron azimuthal correlations triggered by energetic particles in heavy ion collisions at RHIC are studied in a multiphase transport (AMPT) model. A double- peak structure at the away side of triggered particles is obtained after subtracting background correlations due to the elliptic flow as observed in experiments. Both the near-side peak and the

  10. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  11. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java ...

  12. Microsoft Word - davinson_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    23 at 10:30 AM "Decay Spectroscopy at FAIR Using the Advanced Implantation Detector Array (AIDA)" Dr. Thomas Davinson The University of Edinburgh, UK Abstract: The objective of the Advanced Implantation Detector Array (AIDA) project is to develop, commission and exploit a state of the art silicon detector array for decay spectroscopy experiments at the SuperFRS, FAIR. Multi-GeV exotic ions will be implanted into the silicon detector array and AIDA will perform spectroscopy quality

  13. Microsoft Word - djawotho_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Wednesday, April 21st, 1:15-1:45 PM Gluon polarization measurements with STAR Dr. Pibero Djawotho Texas A&M University Abstract: For polarized protons colliding at RHIC energies, the production of jets and hadrons is dominated by gg and qg scattering, making the double longitudinal spin asymmetry, A_LL, sensitive to gluon polarization in the nucleon. I will present STAR results of A_LL from inclusive and correlated probes for the RHIC 2006 run totaling 4.7 pb -1 of integrated luminosity with

  14. Microsoft Word - hohler_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    29th, 4:00 PM Bulk spectral function sum rule in QCD-like theories with a holographic dual Dr. Paul M. Hohler University of Illinois at Chicago Abstract: In this talk, the sum rule for the spectral function of the stress-energy tensor in the bulk (uniform dilatation) channel is derived for a general class of strongly coupled field theories. This class includes theories holographically dual to a theory of gravity coupled to a single scalar field, representing the operator of the scale anomaly. In

  15. Microsoft Word - li_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    3, 2011 3:45 pm Refreshment will be served at 3:30 pm A few new issues regarding the density dependence of nuclear symmetry energy Professor Bao-An Li Department of Physics and Astronomy, Texas A&M University-Commerce Abstract: The density dependence of nuclear symmetry energy is rather poorly known at both sub-saturation and supra-saturation densities. However, it is very important for understanding many interesting properties/phenomena/processes in nuclear structure, heavy-ion reactions

  16. Microsoft Word - linnyk_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Monday, May 22nd, at 1:30 pm "Dilepton production at SPS and RHIC energies" Dr. Olena Linnyk Frankfurt Institute for Advanced Study (FIAS), Frankfurt, Germany Abstract: Analysis of SPS and RHIC data have established that collisions of heavy ions have created matter at a temperature of about 4 trillion degrees Celsius, higher than the temperature needed to melt protons and neutrons into a plasma of quarks and gluons. Lepton pairs provide sensitive penetrating probes of the hot quark

  17. Microsoft Word - saastamoinen_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    April 24, 2012, at 2:00 pm Refreshment will be served at 1:45 pm Beta-decay Studies for Nova Nucleosynthesis Dr. Antti Saastamoinen University of Jyväskylä / TAMU Abstract Classical novae occur in interacting binary systems, where hydrogen-rich material accretes on a white dwarf from its low-mass main-sequence companion. Eventually, the accretion of the hydrogen-rich matter leads to a thermonuclear runaway (TNR). Understanding the dynamics of the nova outbursts and the nucleosynthesis fueling

  18. Microsoft Word - sakai_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Thursday August 9th, 2012, at 3:45 pm Room MIST 102 at the Mitchell Institute Refreshment will be served at 3:30 pm New Result from RIKEN RIBF Dr. H. Sakai RIKEN, Wako. Japan Abstract: Very recent experimental results from RI Beam Factory(RIBF) of RIKEN will be briefly presented based on the 48Ca-, 124Xe- and 238U-beam campaigns. Experiments on the IVSM search and tetra neutron search using the SHARAQ spectrometer will also be shown in some detail

  19. Microsoft Word - sobotka_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    November 9th, at 3:45 pm 2p-2p decay in 8 C and other 2p decay cases in light nuclei Professor L. G. Sobotka Departments of Chemistry and Physics Washington University, St. Louis Abstract Recent technical advances have allowed for high-order correlation experiments to be done. We have primarily focused on experiments in which the final channel is composed of only alphas and protons. Three cases we have studied are: 6 Be, 10 C and 8 C via 3, 4, and 5-particle correlation experiments respectively.

  20. Microsoft Word - weber_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    March 9, at 3:45 pm "Neutron Stars as Astrophysical Laboratories for Nuclear and Particle Physics" Professor Fridolin Weber Department of Physics, San Diego State University Abstract: Neutron stars are among the most enigmatic objects that exist in the Universe. They are as massive as our Sun but are trillions of times smaller in volume. The matter in the cores of neutron stars is therefore compressed to densities that are several times greater than the densities of atomic nuclei. This

  1. Microsoft Word - yongseok_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Friday July 27, 2012, at 2:00 pm Room MIST 102 at the Mitchell Institute Refreshment will be served at 1:45 pm High spin resonances in hadron reactions Dr. Yongseok Department of Physics, Kyungpook National University, Korea Abstract: (I) To understand the reaction mechanisms of the baryon/meson production processes, it is necessary to consider high spin baryon fields since many resonances in the mass of 2 GeV carry spin higher than 3/2. In this talk, we will discuss how to introduce high spin

  2. V-087: Adobe Flash Player Two Vulnerabilities

    Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  3. U-022: Apple QuickTime Multiple Vulnerabilities

    Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  4. T-597: WordPress Multiple Security Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Attackers can exploit these issues to perform unauthorized actions in the context of the logged-in user, crash the affected application and therefore deny service to legitimate users, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials or launch other attacks.

  5. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  6. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to...

  7. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  9. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of...

    Energy Saver

    which can be exploited by malicious people to compromise a user's system. reference ... in RealPlayer, which can be exploited by malicious people to compromise a user's system. ...

  10. V-105: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    navigation handling. 3) An error in Web Audio can be exploited to cause memory corruption. 4) A use-after-free error exists in SVG animations. 5) An error in Indexed DB can...

  11. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    access to cached derivatives of users' private images can be exploited to gain access to derivatives of otherwise restricted images. 5) An error due to the application not ...

  12. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  13. Poster Abstract Guidelines | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Poster Abstract Guidelines Poster Abstract Guidelines Poster Abstract Guidelines.pdf (343.35 KB) More Documents & Publications Call For Abstracts (Student Research Forum) Funding Opportunity Webinar - Buildings University Innovators and Leaders Development (BUILD) Funding Opportunity Webinar - Buildings University Innovators and Leaders Development (BUILD) Student Poster Competition flyer

  14. Call for Abstracts | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Services » Environmental Justice » Call for Abstracts Call for Abstracts 2013 National Environmental Justice Conference and Training Program Call for Abstracts Please join us for the 2013 National Environmental Justice Conference and Training Program, April 3 - 5, 2013, co-located at the Howard University School of Law and the Marriott at Metro Center. Call for Abstracts (137.64 KB) More Documents & Publications CALL FOR ABSTRACTS for the 2014 National Environmental Justice Conference and

  15. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Vulnerabilities | Department of Energy 45: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1

  16. An abstract approach to music.

    SciTech Connect

    Kaper, H. G.; Tipei, S.

    1999-04-19

    In this article we have outlined a formal framework for an abstract approach to music and music composition. The model is formulated in terms of objects that have attributes, obey relationships, and are subject to certain well-defined operations. The motivation for this approach uses traditional terms and concepts of music theory, but the approach itself is formal and uses the language of mathematics. The universal object is an audio wave; partials, sounds, and compositions are special objects, which are placed in a hierarchical order based on time scales. The objects have both static and dynamic attributes. When we realize a composition, we assign values to each of its attributes: a (scalar) value to a static attribute, an envelope and a size to a dynamic attribute. A composition is then a trajectory in the space of aural events, and the complex audio wave is its formal representation. Sounds are fibers in the space of aural events, from which the composer weaves the trajectory of a composition. Each sound object in turn is made up of partials, which are the elementary building blocks of any music composition. The partials evolve on the fastest time scale in the hierarchy of partials, sounds, and compositions. The ideas outlined in this article are being implemented in a digital instrument for additive sound synthesis and in software for music composition. A demonstration of some preliminary results has been submitted by the authors for presentation at the conference.

  17. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  18. Environmental pollutant studies: FY 1980. [Lead abstract

    SciTech Connect

    Not Available

    1981-02-01

    Separate abstracts were prepared for the 16 papers presented in this annual report of the Energy and Environment Division. (KRM)

  19. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  20. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Environmental Management (EM)

    than the adversary can launch new attack tools and techniques. "Industry estimates that ... These tools allow a qualitative analysis of the vulnerabilities found in control systems ...

  1. US Energy Sector Vulnerabilities to Climate Change

    Energy.gov [DOE] (indexed site)

    Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND ... and International Affairs (DOE-PI) and the National Renewable Energy Laboratory (NREL). ...

  2. Proliferation Vulnerability Red Team report

    SciTech Connect

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  3. Distruptive Solar Technologies Breakout Session Speaker Abstracts |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy Distruptive Solar Technologies Breakout Session Speaker Abstracts Distruptive Solar Technologies Breakout Session Speaker Abstracts Disruptive Solar Tech - Abstracts.pdf (532.66 KB) More Documents & Publications Pt-free, Perovskite-based Lean NOx Trap Catalysts Download the Final Agenda Mitigating Breakdown in High Energy Density Perovskite Polymer Nanocomposite Capacitors

  4. Microsoft Word - roepke_abstract2.pdf

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Professor Gerd Roepke University of Rostock, Germany Abstract: Correlations are significant for the properties of nuclear systems at low densities and moderate temperatures. ...

  5. Poster Abstract of Nineteenth ARM STM

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    9 Science Team MeetingPoster Abstract 2009 Proceedings Proceedings Sorted by Title Proceedings Sorted by Author Proceedings Sorted by Category

  6. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  7. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  9. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  10. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  11. ARM - Instructions for Submitting Extended Abstracts

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    govPublicationsScience Team Meeting ProceedingsInstructions for Submitting Extended Abstracts Publications Journal Articles Conference Documents Program Documents & Technical Reports Publications Database Public Information Materials Image Library Videos Publication Resources Submit a Publication Publishing Procedures ARM Style Guide (PDF, 448KB) Acronyms Glossary Logos Contacts RSS for Publications Instructions for Submitting Extended Abstracts Following are instructions for submitting

  12. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Environmental Management (EM)

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  13. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    OpenEI (Open Energy Information) [EERE & EIA]

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  14. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    OpenEI (Open Energy Information) [EERE & EIA]

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  15. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  16. OLADE-Central America Climate Change Vulnerability Program |...

    OpenEI (Open Energy Information) [EERE & EIA]

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  17. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    OpenEI (Open Energy Information) [EERE & EIA]

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  18. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides...

  19. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Energy Saver

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  20. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  1. Applicability of existing C3 (command, control and communications) vulnerability and hardness analyses to sentry system issues. Technical report

    SciTech Connect

    Lee, R.C.

    1983-01-13

    This report is a compilation of abstracts resulting from a literature search of reports relevant to Sentry Ballistic missile system C3 vulnerability and hardness. Primary sources consulted were the DOD Nuclear Information Analysis Center (DASIAC) and the Defense Technical Information Center (DTIC). Approximately 175 reports were reviewed and abstracted, including several related to computer programs for estimating nuclear effects on electromagnetic propagation. The reports surveyed were ranked in terms of their importance for Sentry C3 VandH issues.

  2. Microsoft Word - abstract-lacognata-tx_2012

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ASTROPHYSICAL ENERGIES Dr. M. La Cognata INFN-Laboratori Nazionali del Sud, Catania, Italy ABSTRACT The 19 F(p,) 16 O reaction is an important fluorine destruction channel in ...

  3. Microsoft Word - McIntosh_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    23 at 2:00 PM Binary and Ternary Break-up of Excited Projectile-like Fragments Produced in 124 Xe + 112,124 Sn Reactions at EA 50MeV. Alan McIntosh Indiana University Abstract:...

  4. Pulmonary toxicology of respirable particles. [Lead abstract

    SciTech Connect

    Sanders, C.L.; Cross, F.T.; Dagle, G.E.; Mahaffey, J.A.

    1980-09-01

    Separate abstracts were prepared for the 44 papers presented in these proceedings. The last paper (Stannard) in the proceedings is an historical review of the field of inhalation toxicology and is not included in the analytics. (DS)

  5. Earth Sciences Division collected abstracts: 1980

    SciTech Connect

    Henry, A.L.; Hornady, B.F.

    1981-10-15

    This report is a compilation of abstracts of papers, reports, and talks presented during 1980 at national and international meetings by members of the Earth Sciences Division, Lawrence Livermore National Laboratory. The arrangement is alphabetical (by author). For a given report, a bibliographic reference appears under the name of each coauthor, but the abstract itself is given only under the name of the first author (indicated in capital letters) or the first Earth Sciences Division author.

  6. Earth Sciences Division collected abstracts: 1979

    SciTech Connect

    Henry, A.L.; Schwartz, L.L.

    1980-04-30

    This report is a compilation of abstracts of papers, internal reports, and talks presented during 1979 at national and international meetings by members of the Earth Sciences Division, Lawrence Livermore Laboratory. The arrangement is alphabetical (by author). For a given report, a bibliographic reference appears under the name of each coauthor, but the abstract iself is given only under the name of the first author or the first Earth Sciences Division author. A topical index at the end of the report provides useful cross references, while indicating major areas of research interest in the Earth Sciences Division.

  7. Natural radiation environment III. [Lead Abstract

    SciTech Connect

    Gesell, T.F.; Lowder, W.M.

    1980-01-01

    Separate abstracts were prepared for the 52 research papers presented at this symposium in April 1978. The major topics in this volume deal with penetrating radiation measurements, radiation surveys and population exposure, radioactivity in the indoor environment, and technologically enhanced natural radioactivity. (KRM)

  8. Regulatory and technical reports (Abstract Index Journal)

    SciTech Connect

    Not Available

    1991-03-01

    This journal includes all formal reports in the NUREG series prepared by the NRC staff and contractors; proceedings of conferences and workshops; as well as international agreement reports. The entries in this compilation are indexed for access by title and abstract, secondary report number, personal author, subject, NRC organization for staff and international agreements, contractor, international organization, and licensed facility.

  9. Regulatory and technical reports (Abstract Index Journal)

    SciTech Connect

    Not Available

    1993-02-01

    This journal includes all formal reports in the NUREG series prepared by the NRC staff and contractors, proceedings of conferences and workshops, grants, and international agreement reports. The entries in this compilation are indexed for access by title and abstract, secondary report number, personal author, subject, NRC organization for staff and international agreements, contractor, international organization, and licensed facility.

  10. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  11. Chemical Safety Vulnerability Working Group Report

    SciTech Connect

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  12. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  13. Automatic identification of abstract online groups

    DOEpatents

    Engel, David W; Gregory, Michelle L; Bell, Eric B; Cowell, Andrew J; Piatt, Andrew W

    2014-04-15

    Online abstract groups, in which members aren't explicitly connected, can be automatically identified by computer-implemented methods. The methods involve harvesting records from social media and extracting content-based and structure-based features from each record. Each record includes a social-media posting and is associated with one or more entities. Each feature is stored on a data storage device and includes a computer-readable representation of an attribute of one or more records. The methods further involve grouping records into record groups according to the features of each record. Further still the methods involve calculating an n-dimensional surface representing each record group and defining an outlier as a record having feature-based distances measured from every n-dimensional surface that exceed a threshold value. Each of the n-dimensional surfaces is described by a footprint that characterizes the respective record group as an online abstract group.

  14. FFCAct Clearinghouse, Directory of abstracts. Revision 1

    SciTech Connect

    Harwood, T.

    1994-05-01

    The Federal Facility Compliance Act (FFCAct) Clearinghouse is a card catalog of information about the FFCAct and its requirements for developing Site Treatment Plans (STP). The information available in the clearinghouse includes abstracts describing computer applications, technical reports, and a list of technical experts. Information can be accessed for use in responding to FFCAct requirements, and the clearinghouse provides search capabilities on particular topics and issues related to STP development. Appendix A includes: contacts from each site, for which contact has been made, who are developing STPs; the FFCAct Clearinghouse Fact Sheet and; additional hard copy forms to be used to populate the database. This report contains 50 abstracts related to the Radioactive Waste Technical Support Program.

  15. Microsoft Word - Lazerson abstract-bio.doc

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    17 January 2015 Stellarators: Shedding new light on an old idea Dr. Samuel Lazerson Princeton Plasma Physics Lab ABSTRACT: The stellarator is an old concept in magnetically confined nuclear fusion which has recently received new life through advanced computer modeling. In a stellarator the magnetic field which confines the plasma, composed of charged particles, is entirely generated by an external set of electromagnetic coils. The resulting configuration avoids many of the limiting instabilities

  16. Microsoft Word - roepke_abstract2.pdf

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    June 5, 2012, at 3:45 pm Room MIST 102 at the Mitchell Institute Refreshment will be served at 3:30 pm Four-particle (alpha-like) correlations in nuclear systems Professor Gerd Roepke University of Rostock, Germany Abstract: Correlations are significant for the properties of nuclear systems at low densities and moderate temperatures. Continuum correlations, as well as bound state formation and quantum condensates are investigated in a systematic quantum statistical approach. In contrast to

  17. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  18. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  19. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  20. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  1. U-122 Google Chrome Two Code Execution Vulnerabilities

    Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  2. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  3. T-564: Vulnerabilities in Citrix Licensing administration components

    Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  4. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  5. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection

  6. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  7. Microsoft Word - McIntosh_abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    23 at 2:00 PM Binary and Ternary Break-up of Excited Projectile-like Fragments Produced in 124 Xe + 112,124 Sn Reactions at E/A = 50MeV. Alan McIntosh Indiana University Abstract: Peripheral reactions of 124 Xe ions with 112,124 Sn target nuclei were examined by measuring charged particles in a highly segmented silicon/CsI(Tl) array at forward angles together with the measurement of coincident neutrons. Charged particles were identified for Z≤54 and isotopically resolved for Z≤14. Of

  8. Microsoft Word - abstract-lacognata-tx_2012

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    THE FLUORINE DESTRUCTION IN STARS: FIRST EXPERIMENTAL STUDY OF THE 19 F(p,α 0 ) 16 O REACTION AT ASTROPHYSICAL ENERGIES Dr. M. La Cognata INFN-Laboratori Nazionali del Sud, Catania, Italy ABSTRACT The 19 F(p,α) 16 O reaction is an important fluorine destruction channel in the proton-rich outer layers of asymptotic giant branch (AGB) stars and it might also play a role in hydrogen-deficient post- AGB star nucleosynthesis. So far, available direct measurements do not reach the energy region of

  9. Microsoft Word - mcintosh_abstract_2013.pdf

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Tuesday April 2nd, 2013, at 3:45 pm Room MIST 102 at the Mitchell Institute Refreshment will be served at 3:30 pm The Asymmetry Dependence of the Nuclear Caloric Curve Dr. Alan McIntosh Cyclotron Institute, TAMU Abstract: The nuclear caloric curve is a fundamental facet of the nuclear equation of state. By studying isotopically reconstructed sources produced in intermediate-energy heavy-ion collisions, we report for the first time a clear dependence of the caloric curve on the neutron-proton

  10. Current Abstracts Nuclear Reactors and Technology

    SciTech Connect

    Bales, J.D.; Hicks, S.C.

    1993-01-01

    This publication Nuclear Reactors and Technology (NRT) announces on a monthly basis the current worldwide information available from the open literature on nuclear reactors and technology, including all aspects of power reactors, components and accessories, fuel elements, control systems, and materials. This publication contains the abstracts of DOE reports, journal articles, conference papers, patents, theses, and monographs added to the Energy Science and Technology Database during the past month. Also included are US information obtained through acquisition programs or interagency agreements and international information obtained through acquisition programs or interagency agreements and international information obtained through the International Energy Agency`s Energy Technology Data Exchange or government-to-government agreements. The digests in NRT and other citations to information on nuclear reactors back to 1948 are available for online searching and retrieval on the Energy Science and Technology Database and Nuclear Science Abstracts (NSA) database. Current information, added daily to the Energy Science and Technology Database, is available to DOE and its contractors through the DOE Integrated Technical Information System. Customized profiles can be developed to provide current information to meet each user`s needs.

  11. Multiplicity Counting

    SciTech Connect

    Geist, William H.

    2015-12-01

    This set of slides begins by giving background and a review of neutron counting; three attributes of a verification item are discussed: 240Pueff mass; α, the ratio of (α,n) neutrons to spontaneous fission neutrons; and leakage multiplication. It then takes up neutron detector systems – theory & concepts (coincidence counting, moderation, die-away time); detector systems – some important details (deadtime, corrections); introduction to multiplicity counting; multiplicity electronics and example distributions; singles, doubles, and triples from measured multiplicity distributions; and the point model: multiplicity mathematics.

  12. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  13. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  14. Call For Abstracts (Student Research Forum) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Call For Abstracts (Student Research Forum) Call For Abstracts (Student Research Forum) Call For Abstracts (Student Research Forum).pdf (439.22 KB) More Documents & Publications Poster Abstract Guidelines 2015 National Environmental Justice Conference and Training Program Concludes in Washington, DC Program Update: 4th Quarter 2011

  15. ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop Residues In a

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Densified Large Square Bale Format | Department of Energy abstract

  16. ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop Residues In a

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Densified Large Square Bale Format | Department of Energy abstract_1

  17. Evaluating operating system vulnerability to memory errors.

    SciTech Connect

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  18. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  19. DOE NABIR PI Workshop: Abstracts 2002

    SciTech Connect

    Hawkes , Dan

    2002-01-09

    The mission of the NABIR program is to provide the fundamental science that will serve as the basis for the development of cost-effective bioremediation and long-term stewardship of radionuclides and metals in the subsurface at DOE sites. The focus of the program is on strategies leading to long-term immobilization of contaminants in place to reduce the risk to humans and the environment. Contaminants of special interest are uranium, technetium, plutonium, chromium, and mercury. The focus of the NABIR program is on the bioremediation of these contaminants in the subsurface below the root zone, including both vadose and saturated zones. The program is implemented through four interrelated scientific research elements (Biogeochemistry, Biomolecular Science and Engineering, Biotransformation, and Community Dynamics/Microbial Ecology); and through an element called Bioremediation and its Societal Implications and Concerns (BASIC), which addresses societal issues and potential concerns of stakeholders. The material presented at this year's workshop focuses on approximately 60 research projects funded in FY 2000-2002 by DOE's Office of Biological and Environmental Research (BER). Abstracts of NABIR research projects are provided in this book.

  20. DOE-NABIR PI Workshop: Abstracts 2003

    SciTech Connect

    Various

    2003-01-28

    The mission of the NABIR program is to provide the fundamental science that will serve as the basis for the development of cost-effective bioremediation and long-term stewardship of radionuclides and metals in the subsurface at DOE sites. The focus of the program is on strategies leading to long-term immobilization of contaminants in situ to reduce the risk to humans and the environment. Contaminants of special interest are uranium, technetium, plutonium, chromium, and mercury. The focus of the NABIR program is on the bioremediation of these contaminants in the subsurface below the root zone, including both vadose and saturated zones. The program consists of four interrelated Science Elements (Biotransformation, Community Dynamics/Microbial Ecology, Biomolecular Science and Engineering, and Biogeochemistry). The program also has a cross-cutting Assessment Element that supports development of innovative approaches and technologies to support the science elements. An element called Bioremediation and its Societal Implications and Concerns (BASIC) addresses potential societal issues of implementing NABIR scientific findings. The material presented at this year's workshop focuses on approximately 60 research projects funded in FY 2000-2003 by the Environmental Remediation Sciences Division in DOE's Office of Biological and Environmental Research (BER) in the Office of Science. Abstracts of NABIR research projects are provided in this book.

  1. A Review of Climate Change Vulnerability Assessments: Current Practices and

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Lessons Learned from DOE's "Partnership for Energy Sector Climate Resilience" | Department of Energy A Review of Climate Change Vulnerability Assessments: Current Practices and Lessons Learned from DOE's "Partnership for Energy Sector Climate Resilience" A Review of Climate Change Vulnerability Assessments: Current Practices and Lessons Learned from DOE's "Partnership for Energy Sector Climate Resilience" A Review of Climate Change Vulnerability Assessments:

  2. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  3. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. Top 10 Vulnerabilities of

  4. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  5. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  7. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  8. U-172: OpenOffice.org Two Vulnerabilities

    Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  9. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  10. V-082: Novell GroupWise Client Two Vulnerabilities

    Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  11. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  12. AFTER A Framework for electrical power sysTems vulnerability...

    OpenEI (Open Energy Information) [EERE & EIA]

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  13. AFTER A Framework for electrical power sysTems vulnerability...

    OpenEI (Open Energy Information) [EERE & EIA]

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  14. V-062: Asterisk Two Denial of Service Vulnerabilities

    Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  15. AFTER A Framework for electrical power sysTems vulnerability...

    OpenEI (Open Energy Information) [EERE & EIA]

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  16. AFTER A Framework for electrical power sysTems vulnerability...

    OpenEI (Open Energy Information) [EERE & EIA]

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  17. AFTER A Framework for electrical power sysTems vulnerability...

    OpenEI (Open Energy Information) [EERE & EIA]

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  18. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Energy.gov [DOE] (indexed site)

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  19. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  20. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  1. DSNF AND OTHER WASTE FORM DEGRADATION ABSTRACTION

    SciTech Connect

    J. CUNNANE

    2004-11-19

    Several hundred distinct types of DOE-owned spent nuclear fuel (DSNF) may potentially be disposed in the Yucca Mountain repository. These fuel types represent many more types than can be viably individually examined for their effect on the Total System Performance Assessment for the License Application (TSPA-LA). Additionally, for most of these fuel types, there is no known direct experimental test data for the degradation and dissolution of the waste form in repository groundwaters. The approach used in the TSPA-LA model is, therefore, to assess available information on each of 11 groups of DSNF, and to identify a model that can be used in the TSPA-LA model without differentiating between individual codisposal waste packages containing different DSNF types. The purpose of this report is to examine the available data and information concerning the dissolution kinetics of DSNF matrices for the purpose of abstracting a degradation model suitable for use in describing degradation of the DSNF inventory in the Total System Performance Assessment for the License Application. The data and information and associated degradation models were examined for the following types of DSNF: Group 1--Naval spent nuclear fuel; Group 2--Plutonium/uranium alloy (Fermi 1 SNF); Group 3--Plutonium/uranium carbide (Fast Flux Test Facility-Test Fuel Assembly SNF); Group 4--Mixed oxide and plutonium oxide (Fast Flux Test Facility-Demonstration Fuel Assembly/Fast Flux Test Facility-Test Demonstration Fuel Assembly SNF); Group 5--Thorium/uranium carbide (Fort St. Vrain SNF); Group 6--Thorium/uranium oxide (Shippingport light water breeder reactor SNF); Group 7--Uranium metal (N Reactor SNF); Group 8--Uranium oxide (Three Mile Island-2 core debris); Group 9--Aluminum-based SNF (Foreign Research Reactor SNF); Group 10--Miscellaneous Fuel; and Group 11--Uranium-zirconium hydride (Training Research Isotopes-General Atomics SNF). The analyses contained in this document provide an ''upper-limit'' (i

  2. Division of Environmental Control Technology Program, 1979. [Lead abstract

    SciTech Connect

    1980-06-01

    Separate abstracts were prepared for the 10 sections in this progress report dealing with environmental engineering. (KRM)

  3. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  4. Abstract: Design and Demonstration of an Advanced Agricultural Feedstock

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Supply System for Lignocellulosic Bioenergy Production | Department of Energy Abstract: Design and Demonstration of an Advanced Agricultural Feedstock Supply System for Lignocellulosic Bioenergy Production Abstract: Design and Demonstration of an Advanced Agricultural Feedstock Supply System for Lignocellulosic Bioenergy Production This abstract from FDC Enterprises discusses the impact and objectives for project that designs equipment improvements to streamline the harvest, staging, and

  5. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  6. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  7. Multiple operating system rotation environment moving target defense

    DOEpatents

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  8. Supporting Multiple Workloads, Batch Systems,

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Supporting Multiple Workloads, Batch Systems, and Computing Environments on a Single Linux Cluster Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory Berkeley, CA USA lmpezzaglia@lbl.gov Abstract-A new Intel-based, InfiniBand attached computing system from Cray Cluster Solutions (formerly Appro), at NERSC, provides computational resources to transparently expand several existing NERSC production systems serving three different

  9. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  10. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  11. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  12. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  13. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  14. Abstracts | U.S. DOE Office of Science (SC)

    Office of Science (SC)

    Abstracts Chemical Sciences, Geosciences, & Biosciences (CSGB) Division CSGB Home About Research Areas Reports and Activities Science Highlights Principal Investigators' Meetings BES Home Third DOE BES Separations Research Workshop Abstracts Print Text Size: A A A FeedbackShare Page Third DOE/BES Separations Research Workshop Presentation Abstracts Last Modified May 18, 1999 High Pressure and High Temperature Spectroscopic Studies of Supercritical Fluid Solutions Clement R. Yonker

  15. Poster Abstract of Eighteenth ARM STM: Sort by Title

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    8 Science Team Meeting 2008 Proceedings Proceedings Sorted by Title Proceedings Sorted by Author Proceedings Sorted by Category Cover image Poster Abstract of the Eighteenth Atmospheric Radiation Measurement (ARM) Science Team Meeting ARM-CONF-2008, March 2008 Norfolk, Virginia View poster abstract by Author or Category or Title. 3D Shortwave Radiative Transfer in the Multiscale Modelling Framework ABSTRACT, POSTER Cole, J., Barker, H., Khairoutdinov, M., and Randall, D. 4STAR Spectrometer for

  16. Poster Abstract of Nineteenth ARM STM: Sort by Title

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    9 Science Team Meeting 2009 Proceedings Proceedings Sorted by Title Proceedings Sorted by Author Proceedings Sorted by Category Poster Abstract of the Nineteenth Atmospheric Radiation Measurement (ARM) Science Team Meeting ARM-CONF-2009, March-April 2009 Louisville, Kentucky View poster abstract by Author or Category or Title. A 10-year Climatology of Arctic Cloud Fractions and Their Impact on Surface Radiation Budget at Barrow, Alaska ABSTRACT Dong, X., Xi, B., Crosby, K., Long, C., and Stone,

  17. Poster Abstract of Seventeenth ARM STM: Sort by Title

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    7 Science Team Meeting 2007 Proceedings Proceedings Sorted by Title Proceedings Sorted by Author Proceedings Sorted by Category Cover image Poster Abstract of the Seventeenth Atmospheric Radiation Measurement (ARM) Science Team Meeting ARM-CONF-2007, March 2007 Monterey, California View poster abstract by Author or Category or Title. 10 Years of External Data ABSTRACT, POSTER Ma, L., Wagener, R., Gregory, L., Liang, M., Tilp, A., and Cialella, A. A Comparison of Broad-band Fluxes at the Main and

  18. ARM - Publications: Science Team Meeting Documents: Abstracts sorted by

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Author Meeting 2005 Proceedings Proceedings Sorted by Title Proceedings Sorted by Author Science Team Meeting Proceedings Cover image Proceedings of the Fifteenth Atmospheric Radiation Measurement (ARM) Science Team Meeting ARM-CONF-2005, March 2005 Daytona Beach, Florida For proper viewing, extended abstracts should be viewed with Adobe Acrobat Reader. Download the latest version from the Adobe Reader website. * Poster abstract only; an extended abstract was not provided by the author(s).

  19. 7th international symposium on photosynthetic prokaryotes. Abstracts

    SciTech Connect

    Fuller, R.C.

    1991-12-31

    This book contains the abstracts of all the presentations made either in oral or poster form, at the VII International Symposium on Photosynthetic Prokaryotes.

  20. Kinetics of the Hydrogen Atom Abstraction Reactions from 1-Butanol...

    Office of Scientific and Technical Information (OSTI)

    Theory Matches Experiment and More Citation Details In-Document Search Title: Kinetics of the Hydrogen Atom Abstraction Reactions from 1-Butanol by Hydroxyl Radical: Theory ...

  1. Deep Borehole Disposal of Spent Fuel. Brady, Patrick V. Abstract...

    Office of Scientific and Technical Information (OSTI)

    Spent Fuel. Brady, Patrick V. Abstract not provided. Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States) USDOE National Nuclear Security Administration (NNSA)...

  2. Chemical Hieroglyphs: Abstract Depiction of Complex Void Space...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Chemical Hieroglyphs: Abstract Depiction of Complex Void Space Topology of Nanoporous Materials Previous Next List Kevin Theisen, Berend Smit and Maciej Haranczyk, J. Chem. Inf. ...

  3. Abstract: Development and Deployment of a Short Rotation Woody...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Crops Harvesting System Based on a Case New Holland Forage Harvester and SRC Woody Crop Header Abstract: Development and Deployment of a Short Rotation Woody Crops Harvesting ...

  4. Abstract - This paper documents the effect that the PI controller

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Abstract - This paper documents the effect that the PI controller gains in the generic ... in the course of this investigation documents the relation between specific PI ...

  5. Evgeniy Koshchiy Cyclotron Institute, Texas A&M University Abstract

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Experiments with Array for Nuclear Astrophysics and Structure with Exotic Nuclei (ANASEN) Evgeniy Koshchiy Cyclotron Institute, Texas A&M University Abstract The Array for Nuclear ...

  6. Molecular biology of signal transduction in plants. Abstracts

    SciTech Connect

    Not Available

    1991-12-31

    This volume contains abstracts of oral presentations and poster sessions of the 1991 Cold Springs Harbor Meeting entitled Molecular Biology of Signal Transduction in Plants.

  7. Alamos National Laboratory] Materials Science(36) Abstract Not...

    Office of Scientific and Technical Information (OSTI)

    Co-Design at the Mesoscale: Opportunities for NSLS-II Sarrao, John L. Los Alamos National Laboratory Materials Science(36) Abstract Not Provided Los Alamos National Laboratory...

  8. Microsoft Word - Call for Abstracts Student Research Forum.docx

    Energy Saver

    Environmental Sciences Preferred abstract submissions will address environmental exposures and triggers, e.g., air pollution and respiratory health, proximity to hazardous waste, ...

  9. 24th Annual Anomalous Absorption Conference. Book of abstracts

    SciTech Connect

    Not Available

    1994-08-01

    This report contains abstracts on topics in the following areas: parametric instabilities; hohlraum physics; laser plasma physics with short pulses; and rayleigh-taylor instability and hydrodynamics.

  10. Selected Translated Abstracts of Chinese-Language Climate Change Publications

    SciTech Connect

    Cushman, R.M.; Burtis, M.D.

    1999-05-01

    This report contains English-translated abstracts of important Chinese-language literature concerning global climate change for the years 1995-1998. This body of literature includes the topics of adaptation, ancient climate change, climate variation, the East Asia monsoon, historical climate change, impacts, modeling, and radiation and trace-gas emissions. In addition to the biological citations and abstracts translated into English, this report presents the original citations and abstracts in Chinese. Author and title indexes are included to assist the reader in locating abstracts of particular interest.

  11. Abstract: Design and Demonstration of an Advanced Agricultural...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Design and Demonstration of an Advanced Agricultural Feedstock Supply System for Lignocellulosic Bioenergy Production Abstract: Design and Demonstration of an Advanced Agricultural ...

  12. ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop Residues...

    Energy.gov [DOE] (indexed site)

    advanced logistical systems and focused bioenergy harvesting technologies that supply crop ... More Documents & Publications ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop ...

  13. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  14. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Office of Environmental Management (EM)

    U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions This interactive ...

  15. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  16. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  17. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    OpenEI (Open Energy Information) [EERE & EIA]

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  18. Generating multiple new designs from a sketch

    SciTech Connect

    Stahovich, T.F.; Davis, R.; Shrobe, H.

    1996-12-31

    We describe a program called SKETCHIT that transforms a single sketch of a mechanical device into multiple families of new designs. It represents each of these families with a {open_quotes}BEP-Model,{close_quotes} a parametric model augmented with constraints that ensure the device produces the desired behavior. The program is based on qualitative configuration space (qc-space), a novel representation that captures mechanical behavior while abstracting away its implementation. The program employs a paradigm of abstraction and resynthesis: it abstracts the initial sketch into qc-space then maps from qc-space to new implementations.

  19. Potential Vulnerability of US Petroleum Refineries to Increasing Water

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Temperature and/or Reduced Water Availability | Department of Energy Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability This report discusses potential impacts of increased water temperature and reductions in water availability on petroleum refining and presents case studies related to refinery water use. Report

  20. U.S. Energy Sector Vulnerabilities and Resilience Solutions Reports |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy U.S. Energy Sector Vulnerabilities and Resilience Solutions Reports U.S. Energy Sector Vulnerabilities and Resilience Solutions Reports As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation's energy system, and developing methodologies, information, tools

  1. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  2. Abstract: Design and Demonstration of an Advanced Agricultural Feedstock

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Supply System for Lignocellulosic Bioenergy Production | Department of Energy Design and Demonstration of an Advanced Agricultural Feedstock Supply System for Lignocellulosic Bioenergy Production Abstract: Design and Demonstration of an Advanced Agricultural Feedstock Supply System for Lignocellulosic Bioenergy Production This abstract from FDC Enterprises discusses the impact and objectives for project that designs equipment improvements to streamline the harvest, staging, and hauling costs

  3. Ecological Research Division Theoretical Ecology Program. [Contains abstracts

    SciTech Connect

    Not Available

    1990-10-01

    This report presents the goals of the Theoretical Ecology Program and abstracts of research in progress. Abstracts cover both theoretical research that began as part of the terrestrial ecology core program and new projects funded by the theoretical program begun in 1988. Projects have been clustered into four major categories: Ecosystem dynamics; landscape/scaling dynamics; population dynamics; and experiment/sample design.

  4. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

    Energy.gov [DOE]

    Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible.

  5. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  6. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  7. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  8. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  9. Earth Sciences Division annual report 1981. [Lead abstract

    SciTech Connect

    Not Available

    1982-09-01

    Separate abstracts were prepared for the 59 papers of the 1981 annual report of the Earth Sciences Division at Lawrence Berkeley Laboratory. The general topics covered included nuclear waste isolation, geophysics and reservoir engineering, and geosciences. (KRM)

  10. Microsoft Word - CYCLOTRON_2011_ABSTRACT_REPET_nica

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Draw a Level Scheme? Dr. N. Nica Cyclotron Institute TAMU Cyclotron Institute, Texas A&M University, College Station, Texas 77843, USA Abstract Drawing a level scheme is a...

  11. Small Business Innovation Research. Abstracts of Phase I awards, 1999

    SciTech Connect

    1999-12-01

    This booklet presents technical abstracts of Phase I awards made in Fiscal Year (FY) 1999 under the DOE Small Business Innovation Research (SBIR) program. SBIR research explores innovative concepts in important technological and scientific areas that can lead to valuable new technology and products. The work described in the abstracts is novel, high-risk research, but the benefits will also be potentially high if the objectives are met. Brief comments on the potential applications, as described by the awardee, are given after each abstract. Individuals and organizations, including venture capital and larger industrial firms, with an interest in the research described in any of the abstracts are encouraged to contact the appropriate small business directly.

  12. GRC 2009 Annual Meeting Announced, Call for Abstracts Issued

    Energy.gov [DOE]

    The Geothermal Resources Council (GRC) issued a call for abstracts today with the announcement of the world’s largest geothermal event taking place October 4-7, 2009, in Reno, Nevada, at the Peppermill Resort Spa Casino.

  13. SERS internship Fall 1992--Spring 1993: Abstract and research papers

    SciTech Connect

    Not Available

    1993-08-05

    This report contains the abstracts and research papers by students on a variety of topics in engineering, genetics, solid state physics, thermonuclear energy, astrophysics, and other science related topics.

  14. The Bioelectromagnetic Society Thirteenth Annual Meeting 1991: Program and abstracts

    SciTech Connect

    Not Available

    1992-12-31

    This volume contains author abstracts representing oral and poster presentations made at the Thirteenth Annual Meeting of The Bioelectromagnetic Society held in Salt Lake City, Utah June 23--27, 1991.

  15. Conference Abstracts & Book Chapters | Photosynthetic Antenna Research

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Center Conference Abstracts & Book Chapters Conference Abstracts & Book Chapters Collins AM, Wen J and Blankenship RE (2011) Photosynthetic Light Harvesting Complexes. In Molecular Solar Fuels, T. Wydrzynski and W. Hillier, Eds., Royal Society of Chemistry, Cambridge, UK. Frank HA, Magdaong N, Niedzwiedzki DM, LaFountain AM, Gardiner AT, Carey A-M, Gibson GN, and Cogdell RJ (2014) Investigation of the excited state spectra and dynamics of rhodopinal glucoside from Rhodoblastus

  16. Fuel Cells for Transportation - Research and Development: Program Abstracts

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy Research and Development: Program Abstracts Fuel Cells for Transportation - Research and Development: Program Abstracts Remarkable progress has been achieved in the development of proton-exchange-membrane(PEM) fuel cell technology since the U.S. Department of Energy (DOE) initiated a significant developmental program in the early 1990s. This progress has stimulated enormous interest worldwide in developing fuel cell products for transportation as well as for stationary

  17. Abstracts and research accomplishments of university coal research projects

    SciTech Connect

    Not Available

    1991-06-01

    The Principal Investigators of the grants supported by the University Coal Research Program were requested to submit abstracts and highlight accomplishments of their projects in time for distribution at a grantees conference. This book is a compilation of the material received in response to the request. Abstracts discuss the following area: coal science, coal surface science, reaction chemistry, advanced process concepts, engineering fundamentals and thermodynamics, environmental science.

  18. Reducing Soft-error Vulnerability of Caches using Data Compression

    SciTech Connect

    Vetter, Jeffrey S

    2016-01-01

    With ongoing chip miniaturization and voltage scaling, particle strike-induced soft errors present increasingly severe threat to the reliability of on-chip caches. In this paper, we present a technique to reduce the vulnerability of caches to soft-errors. Our technique uses data compression to reduce the number of vulnerable data bits in the cache and performs selective duplication of more critical data-bits to provide extra protection to them. Microarchitectural simulations have shown that our technique is effective in reducing architectural vulnerability factor (AVF) of the cache and outperforms another technique. For single and dual-core system configuration, the average reduction in AVF is 5.59X and 8.44X, respectively. Also, the implementation and performance overheads of our technique are minimal and it is useful for a broad range of workloads.

  19. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  20. SRS scientific and technical abstracts, July--September 1992

    SciTech Connect

    Not Available

    1992-10-01

    This document focuses on the scientific and technical information (STT) reports, articles, and presentations generated at the site by various authors and organizations of Westinghouse Savannah River Company and its subcontractors. Abstracts of these STI products are contained within this document. The abstracts have been compiled as they originally appeared in the source reports. No changes to the content have been made except as necessary to correct errors of spelling, to reduce abstract length, or to ensure that the information is unclassified. The abstracts are organized according to information categories ( UC'' categories) established by the Department of Energy's Office of Scientific and Technical Information (OSTI). When reports fall into more than one category, their abstract is included as an entry in the most applicable section of this document. UC-700 General, Miscellaneous, and Progress Reports, UC-701 Chemistry, UC-702 Environmental Sciences, UC-703 Geosciences, UC-704 Materials, UC-705 Mathematics and Computer Sciences, UC-706 Engineering, Equipment, and Instruments, UC-707 Health and Safety, UC-708 Biological Sciences, UC-711 Chemical Separation Processes for Plutonium and Uranium, UC-712 Inertial Confinement Fusion, UC-713 Radioisotope and Radiation Applications, UC-714 Criticality Studies, UC-715 Technology - Feed Materials, UC-721 Defense Waste Management, UC-722 Transportation of Nuclear Materials, UC-731 Nuclear Materials Production, UC-732 Special Isotope Separation (Plutonium), UC-733 Nuclear Raw Materials, UC-741 Chemical High Explosives, UC-742 Applications of Explosions, UC-743 Nuclear Propulsion Systems, UC-744 Aerospace Nuclear Safety, and Index 91.

  1. SRS scientific and technical abstracts, July--September 1992

    SciTech Connect

    Not Available

    1992-10-01

    This document focuses on the scientific and technical information (STT) reports, articles, and presentations generated at the site by various authors and organizations of Westinghouse Savannah River Company and its subcontractors. Abstracts of these STI products are contained within this document. The abstracts have been compiled as they originally appeared in the source reports. No changes to the content have been made except as necessary to correct errors of spelling, to reduce abstract length, or to ensure that the information is unclassified. The abstracts are organized according to information categories (``UC`` categories) established by the Department of Energy`s Office of Scientific and Technical Information (OSTI). When reports fall into more than one category, their abstract is included as an entry in the most applicable section of this document. UC-700 General, Miscellaneous, and Progress Reports, UC-701 Chemistry, UC-702 Environmental Sciences, UC-703 Geosciences, UC-704 Materials, UC-705 Mathematics and Computer Sciences, UC-706 Engineering, Equipment, and Instruments, UC-707 Health and Safety, UC-708 Biological Sciences, UC-711 Chemical Separation Processes for Plutonium and Uranium, UC-712 Inertial Confinement Fusion, UC-713 Radioisotope and Radiation Applications, UC-714 Criticality Studies, UC-715 Technology - Feed Materials, UC-721 Defense Waste Management, UC-722 Transportation of Nuclear Materials, UC-731 Nuclear Materials Production, UC-732 Special Isotope Separation (Plutonium), UC-733 Nuclear Raw Materials, UC-741 Chemical High Explosives, UC-742 Applications of Explosions, UC-743 Nuclear Propulsion Systems, UC-744 Aerospace Nuclear Safety, and Index 91.

  2. U-117: Potential security vulnerability has been identified with...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory...

  3. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  4. Vulnerability of the US to future sea level rise

    SciTech Connect

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  5. National conference on environmental remediation science and technology: Abstracts

    SciTech Connect

    1998-12-31

    This conference was held September 8--10, 1998 in Greensboro, North Carolina. The purpose of this conference was to provide a multidisciplinary forum for exchange of state-of-the-art information on methods and site characterization technologies for environmental monitoring and remedial action planning of hazardous materials. This report contains the abstracts of sixty-one papers presented at the conference.

  6. Recent advances in yeast molecular biology: recombinant DNA. [Lead abstract

    SciTech Connect

    Not Available

    1982-09-01

    Separate abstracts were prepared for the 25 papers presented at a workshop focusing on chromosomal structure, gene regulation, recombination, DNA repair, and cell type control, that have been obtained by experimental approaches incorporating the new technologies of yeast DNA transformation, molecular cloning, and DNA sequence analysis. (KRM)

  7. Human genome program report. Part 2, 1996 research abstracts

    SciTech Connect

    1997-11-01

    This report contains Part 2 of a two-part report to reflect research and progress in the US Department of Energy Human Genome Program from 1994 through 1996, with specified updates made just before publication. Part 2 consists of 1996 research abstracts. Attention is focused on the following: sequencing; mapping; informatics; ethical, legal, and social issues; infrastructure; and small business innovation research.

  8. Nineteenth annual actinide separations conference: Conference program and abstracts

    SciTech Connect

    Bronson, M.

    1995-12-31

    This report contains the abstracts from the conference presentations. Sessions were divided into the following topics: Waste treatment; Spent fuel treatment; Issues and responses to Defense Nuclear Facility Safety Board 94-1; Pyrochemical technologies; Disposition technologies; and Aqueous separation technologies.

  9. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  10. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  11. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  12. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  13. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  14. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  15. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  16. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  17. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  18. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities

    Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions

  19. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  20. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | (NNSA) GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials that could be used for a nuclear weapon or radiological dispersal device (RDD), or "dirty bomb". Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

  1. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  2. T-682:Double free vulnerability in MapServer

    Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  3. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use

  4. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  5. Abstract and research accomplishments of University Coal Research Projects

    SciTech Connect

    1995-06-01

    The Principal Investigators of the grants supported by the University Coal Research Program were requested to submit abstracts and highlight accomplishments of their respective projects in time for distribution at a conference on June 13--14, 1995 at Tennessee State University in Nashville, Tennessee. This book is a compilation of the material received in response to that request. For convenience, the 70 grants reported in this book are stored into eight technical areas, Coal Science, Coal Surface Science, Reaction Chemistry, Advanced Process Concepts, Engineering Fundamentals and Thermodynamics, Environmental Science, high Temperature Phenomena, and Special topics. Indexes are provided for locating projects by subject, principal investigators, and contracting organizations. Each extended abstract describes project objectives, work accomplished, significance to the Fossil Energy Program, and plans for the next year.

  6. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  7. ABSTRACTS: Seventh annual conference on fossil energy materials

    SciTech Connect

    Not Available

    1993-01-01

    Objective of the Advanced Research and Technology Development materials program is to conduct R and D on materials for fossil energy applications (coal processing, coal liquefaction, gasification, heat engines and recovery, combustion systems, fuel cells). Research is aimed at better understanding of materials in fossil energy environments and development of new materials for improvement of plant operations and reliability. Abstracts are given of 37 papers on ceramics/composites, intermetallics (iron aluminides, etc.), and advanced austenitics. (DLC)

  8. ABSTRACTS: Seventh annual conference on fossil energy materials

    SciTech Connect

    Not Available

    1993-06-01

    Objective of the Advanced Research and Technology Development materials program is to conduct R and D on materials for fossil energy applications (coal processing, coal liquefaction, gasification, heat engines and recovery, combustion systems, fuel cells). Research is aimed at better understanding of materials in fossil energy environments and development of new materials for improvement of plant operations and reliability. Abstracts are given of 37 papers on ceramics/composites, intermetallics (iron aluminides, etc.), and advanced austenitics. (DLC)

  9. Microsoft Word - SoS abstract-bio_template.doc

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Ronald E. Hatcher Science on Saturday Lecture Series 10 January 2015 Consciousness and the Social Brain Dr. Michael Graziano Professor of Psychology, Princeton University Princeton New Jersey ABSTRACT: What is consciousness and how can a brain, a mere collection of neurons, create it? In my lab we are developing a theoretical and experimental approach to these questions. The theory begins with our ability to attribute awareness to others. The human brain has a complex circuitry that allows it to

  10. Extended abstracts for an international conference on the development of the North and problems of recultivation

    SciTech Connect

    Everett, K.R.

    1994-12-31

    Ecological problems in many regions on Earth are the result of increasing technological pressure on the environment. These problems concern many of us and cause mankind to unite in order to search for means to protect the environment. Scientists, especially are responsible for the protection of the biosphere. The objective of this conference was to discuss the results of studies on the present condition of the environment in the Far North where the industrial pressure is increasing. The participants of this conference also offered and suggested various necessary measures for the protection of the region and restoration of its disturbed sites. The specific structural characteristics of the environment of the Far North, tundra and northern taiga, cause its fragility and vulnerability to anthropogenic impact. The destruction of the thin, weak layer of soil and vegetation cover changes the thermal balance and thus causes the development of erosion process, which in their turn increase the zone of the direct technogenous destruction. Self restoration processes in this harsh climate usually are slow. The preservation of the ecological integrity in the Far North is essential for the stability of the biosphere of the planet. The specifics of the natural conditions must be taken into account so that man will be able to develop the means of intensive agro-technology that can speed up the process of restoration of the biocenosis in the damaged areas. The extended abstracts of the conference reports that constitute this volume contain both theoretical discussions of problems of recultivation as well as accounts of experimental studies and applied explorations.

  11. Small Business Innovation Research: Abstracts of Phase 1 awards, 1994

    SciTech Connect

    Not Available

    1994-12-31

    The Small Business Innovation Research (SBIR) program enables DOE to obtain effective, innovative solutions to important problems through the private sector, which has a commercial incentive to pursue the resulting technology and bring it to the marketplace. The growing number of awardees, many of them started in business in response to SBIR solicitations, is becoming a significant resource for the solution of high risk, high technology problems for the Department. As detailed here, this publication describes the technical efforts for SBIR Phase 1 awards in 1994. It is intended for the educated layman, and may be of particular interest to potential investors who wish to get in on the ground floor of exciting opportunities. Contained in this booklet are abstracts of the Phase 1 awards made in FY 1994 under the DOE SBIR program. The 212 Phase 1 projects described here were selected in a highly competitive process from a total of 2,276 grant applications received in response to the 1994 DOE annual SBIR Solicitation. The selections for awards were made on scientific and technical merit, as judged against the specific criteria listed in the Solicitation. Conclusions were reached on the basis of detailed reports returned by reviewers drawn from DOE laboratories, universities, private industry, and government. (Any discrepancies noted in prior DOE releases naming the firms selected for awards are due either to the firm changing its name after the award selection or to the firm not proceeding to a signed grant.) It is expected that between one-third and one-half of the Phase 1 projects will be continued into Phase 2. The work described in the abstracts is novel, high-risk research, but the benefits will also be potentially high if the objectives are met. Brief comments on the potential applications are given after each abstract. Individuals and organizations with an interest in the research described are encouraged to contact the appropriate small business directly.

  12. Third conference on radiation protection and dosimetry. Program and abstracts

    SciTech Connect

    Not Available

    1991-12-31

    This conference has been designed with the objectives of promoting communication among applied, research, regulatory, and standards personnel involved in radiation protection and providing them with sufficient information to evaluate their programs. To partly fulfill these objectives, a technical program consisting of more than 75 invited and contributed oral presentations encompassing all aspects of radiation protection has been prepared. General topics include external dosimetry, internal dosimetry, instruments, regulations and standards, accreditation and test programs, research advances, and applied program experience. This publication provides a summary of the technical program and a collection of abstracts of the oral presentations.

  13. ASC 84: applied superconductivity conference. Final program and abstracts

    SciTech Connect

    Not Available

    1984-01-01

    Abstracts are given of presentations covering: superconducting device fabrication; applications of rf superconductivity; conductor stability and losses; detectors and signal processing; fusion magnets; A15 and Nb-Ti conductors; stability, losses, and various conductors; SQUID applications; new applications of superconductivity; advanced conductor materials; high energy physics applications of superconductivity; electronic materials and characterization; general superconducting electronics; ac machinery and new applications; digital devices; fusion and other large scale applications; in-situ and powder process conductors; ac applications; synthesis, properties, and characterization of conductors; superconducting microelectronics. (LEW)

  14. Abstracted publications related to the Hanford environment, 1980 to 1988

    SciTech Connect

    Becker, C.D.; Gray, R.H.

    1989-05-01

    This abstracted bibliography provides a reference to the diverse environmental activities conducted on the Hanford Site from 1980 through 1988. It includes 500 reports and articles that were prepared largely by onsite contractors and the Department of Energy. Documents contained here were separated into eight subject areas: air and atmosphere, aquatic ecology, effluents and wastes, geology and hydrology, Hanford Site, radioactivity, terrestrial ecology, and socioeconomics. These areas form the basis of a key word index, which is intended to help the reader locate subjects of interest. An author index is also included.

  15. Microsoft Word - CYCLOTRON_2011_ABSTRACT_REPET_nica

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Draw a Level Scheme? Dr. N. Nica Cyclotron Institute TAMU Cyclotron Institute, Texas A&M University, College Station, Texas 77843, USA Abstract Drawing a level scheme is a procedure of figuring the levels and decaying transitions of an excited nucleus, which nowadays is a well- known, rather technical procedure. In a previous talk we showed that some extra correlations exist in the gamma-ray coincidence spectra which we were able to sample in the decay of high-spin states of several nuclei

  16. Second SIAM conference on sparse matrices: Abstracts. Final technical report

    SciTech Connect

    1996-12-31

    This report contains abstracts on the following topics: invited and long presentations (IP1 & LP1); sparse matrix reordering & graph theory I; sparse matrix tools & environments I; eigenvalue computations I; iterative methods & acceleration techniques I; applications I; parallel algorithms I; sparse matrix reordering & graphy theory II; sparse matrix tool & environments II; least squares & optimization I; iterative methods & acceleration techniques II; applications II; eigenvalue computations II; least squares & optimization II; parallel algorithms II; sparse direct methods; iterative methods & acceleration techniques III; eigenvalue computations III; and sparse matrix reordering & graph theory III.

  17. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type

  18. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  19. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    Applying current guidance and practices for common-cause failure (CCF) mitigation to digital instrumentation and control (I&C) systems has proven problematic, and the regulatory environment has been unpredictable. The potential for CCF vulnerability inhibits I&C modernization, thereby challenging the long-term sustainability of existing plants. For new plants and advanced reactor concepts, concern about CCF vulnerability in highly integrated digital I&C systems imposes a design burden that results in higher costs and increased complexity. The regulatory uncertainty in determining which mitigation strategies will be acceptable (e.g., what diversity is needed and how much is sufficient) drives designers to adopt complicated, costly solutions devised for existing plants. To address the conditions that constrain the transition to digital I&C technology by the US nuclear industry, crosscutting research is needed to resolve uncertainty, demonstrate necessary characteristics, and establish an objective basis for qualification of digital technology for nuclear power plant (NPP) I&C applications. To fulfill this research need, Oak Ridge National Laboratory is investigating mitigation of CCF vulnerability for nuclear-qualified applications. The outcome of this research is expected to contribute to a fundamentally sound, comprehensive basis to qualify digital technology for nuclear power applications. This report documents the development of a CCF taxonomy. The basis for the CCF taxonomy was generated by determining consistent terminology and establishing a classification approach. The terminology is based on definitions from standards, guides, and relevant nuclear power industry technical reports. The classification approach is derived from identified classification schemes focused on I&C systems and key characteristics, including failure modes. The CCF taxonomy provides the basis for a systematic organization of key systems aspects relevant to analyzing the potential for

  20. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  1. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  2. Laboratory technology research: Abstracts of FY 1998 projects

    SciTech Connect

    1998-11-01

    The Laboratory Technology Research (LTR) program supports high-risk, multidisciplinary research partnerships to investigate challenging scientific problems whose solutions have promising commercial potential. These partnerships capitalize on two great strengths of the country: the world-class basic research capability of the DOE Office of Science (SC) national laboratories and the unparalleled entrepreneurial spirit of American industry. Projects supported by the LTR program in FY 1998 explore the applications of basic research advances relevant to DOE`s mission over a full range of scientific disciplines. The program presently emphasizes three critical areas of mission-related research: advanced materials, intelligent processing and manufacturing research, and environmental and biomedical research. Abstracts for 85 projects are contained in this report.

  3. 15. international conference on plant growth substances: Program -- Abstracts

    SciTech Connect

    1995-12-31

    Since the 14th Conference in Amsterdam in 1991, progress in plant hormone research and developmental plant biology has been truly astonishing. The five ``classical`` plant hormones, auxin, gibberellin, cytokinin, ethylene, and abscisic acid, have been joined by a number of new signal molecules, e.g., systemin, jasmonic acid, salicylic acid, whose biosynthesis and functions are being understood in ever greater detail. Molecular genetics has opened new vistas in an understanding of transduction pathways that regulate developmental processes in response to hormonal and environmental signals. The program of the 15th Conference includes accounts of this progress and brings together scientists whose work focuses on physiological, biochemical, and chemical aspects of plant growth regulation. This volume contains the abstracts of papers presented at this conference.

  4. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  5. Selected translated abstracts of Russian-language climate-change publications, III aerosols: Issue 164

    SciTech Connect

    Razuvaev, V.N.; Ssivachok, S.G.

    1995-10-01

    This report presents abstracts in Russian and translated into English of important Russian-language literature concerning aerosols as they relate to climate change. In addition to the bibliographic citations and abstracts translated into English, this report presents the original citations and abstracts in Russian. Author and title indexes are included to assist the reader in locating abstracts of particular interest.

  6. Selected translated abstracts of Russian-language climate-change publications: II, Clouds. Issue 159

    SciTech Connect

    Burtis, M.D.

    1994-01-01

    This report presents abstracts (translated into English) of important Russian-language literature concerning clouds as they relate to climate change. In addition to the bibliographic citations and abstracts translated into English, this report presents the original citations and abstracts in Russian. Author and title indexes are included to assist the reader in locating abstracts of particular interest.

  7. Selected Translated Abstracts of Russian-Language Climate-Change Publications, I. Surface Energy Budget

    SciTech Connect

    Ravina, C.B.

    1992-01-01

    This report presents abstracts (translated into English) of important Russian-language literature concerning the surface energy budget as it relates to climate change. In addition to the bibliographic citations and abstracts translated into English, this report presents the original citations and abstracts in Russian. Author and title indexes are included, to assist the reader in locating abstracts of particular interest.

  8. Selected translated abstracts of Russian-language climate-change publications. 4: General circulation models

    SciTech Connect

    Burtis, M.D.; Razuvaev, V.N.; Sivachok, S.G.

    1996-10-01

    This report presents English-translated abstracts of important Russian-language literature concerning general circulation models as they relate to climate change. Into addition to the bibliographic citations and abstracts translated into English, this report presents the original citations and abstracts in Russian. Author and title indexes are included to assist the reader in locating abstracts of particular interest.

  9. Selected Translated Abstracts of Russian-Language Climate-Change Publications, II. Clouds

    SciTech Connect

    Ravina, C.B.

    1994-01-01

    This report presents abstracts (translated into English) of important Russian-language literature concerning clouds as they relate to climate change. In addition to the bibliographic citations and abstracts translated into English, this report presents the original citations and abstracts in Russian. Author and title indexes are included, to assist the reader in locating abstracts of particular interest.

  10. Selected translated abstracts of Russian-language climate-change publications: I, Surface energy budget

    SciTech Connect

    Burtis, M.D.

    1992-09-01

    This report presents abstracts (translated into English) of important Russian-language literature concerning the surface energy budget as it relates to climate change. In addition to the bibliographic citations and abstracts translated into English, this report presents the original citations and abstracts in Russian. Author and title indexes are included, to assist the reader in locating abstracts of particular interest.

  11. 11th Topical conference high-temperature plasma diagnostics. Book of abstracts

    SciTech Connect

    1996-06-01

    This report contains abstracts from the 11th topical conference on high-temperature plasma diagnostics.

  12. October 2016 Natural Phenomena Hazards (NPH) Meeting- Tuesday, October 18th Session Presentation Abstracts

    Energy.gov [DOE]

    Presentation abstracts for the October 2016 Natural Phenomena Hazards Meeting - Tuesday, October 18th Session

  13. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  14. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  15. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  16. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service)

  17. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  18. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  19. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  20. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  1. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  2. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  3. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  4. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-181: IBM WebSphere Application Server Information Disclosure Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information.

  6. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  7. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  8. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  9. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  10. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Energy.gov [DOE] (indexed site)

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  11. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  12. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  13. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  14. Abstracts of Phase 1 awards, (fiscal year) 1987

    SciTech Connect

    Not Available

    1987-01-01

    Contained in this booklet are abstracts of the Phase I awards made in Fiscal Year 1987 under the Small Business Innovation Research (SBIR) program in the Department of Energy (DOE). The program is designed for implementation in a three-phase process, with Phase I determining the scientific or technical merit and feasibility of ideas proposed for investigation. The period of performance in this initial phase is relatively brief, typically about 6 months, and the awards are limited to $50,000. Phase II is the principal research or research and development effort, and the awards are as high as $500,000 for work to be performed in periods of up to 2 years. Phase III is the commercial application. The 111 Phase I projects described were selected in a highly competitive process from a total of 942 proposals received in response to the 1987 Solicitation. They cover the fields of chemistry, materials, control systems, plant natural products, instrumentation, nuclear medicine, health and environmental effects, high energy physics, particle accelerators, nuclear physics, plasma diagnostics and confinement, fusion energy systems, robotics and remote systems, nuclear reactors, space nuclear power, fuel cycle, decontamination/decommissioning, commputers in nuclear plants, coal, enhanced oil recovery/tar sands, fossil energy, photovoltaics, solar thermal, ceramics for heat engines, and industrial separation, conversion and recovery processes. (DLC)

  15. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  16. 4th Annual DOE-ERSP PI Meeting: Abstracts

    SciTech Connect

    Hazen, Terry C.

    2009-03-01

    This contains abstracts from the 2009 Annual Environmental Remediation Sciences Program (ERSP) Principal Investigators (PI) Meeting. The ERSP seeks to advance fundamental science to understand, predict, and mitigate the impacts of environmental contamination from past nuclear weapons production and provide a scientific basis for the long-term stewardship of nuclear waste disposal. These ambitious goals cannot be achieved by any one project alone. Therefore, ERSP funds a combination of research programs at the DOE national laboratories, individual projects at universities and federal agencies, and large long(er)-term field site research. Integration of these activities to advance the ERSP goals is a constant challenge, but made significantly simpler by bringing together all funded ERSP researchers once a year to discuss the very latest research results. It is at these meetings where new ideas and/or scientific advancements in support of ERSP goals can be discussed and openly debated among all PIs in the program. The ERSP thrives, in part, on the new ideas, concepts, scientific connections, and collaborations generated as a result of these meetings. The annual PI Meeting is very much a working meeting with three major goals: (1) to provide opportunities for scientific interaction among the ERSP scientists, a critical element for the program; (2) to provide the ERSP program staff with an opportunity to evaluate the progress of each program and project; and (3) to showcase the ERSP to interested parties within DOE and within other federal agencies In addition to program managers from within OBER, there will be representatives from other offices within DOE and other federal agencies in attandance at the meeting.

  17. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  18. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  19. Fusion Energy Division Annual Information Meeting. Agenda and abstracts, April 8-9, 1986

    SciTech Connect

    Not Available

    1986-01-01

    Abstracts of the presentations are included. The general topics covered included the following: (1) development and technology, and (2) plasma confinement, theory, and FEDC. In addition, abstracts are also given for various invited talks. (MOW)

  20. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W.

    2011-04-08

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be

  1. Multiple density layered insulator

    DOEpatents

    Alger, Terry W.

    1994-01-01

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  2. Multiple density layered insulator

    DOEpatents

    Alger, T.W.

    1994-09-06

    A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

  3. Toward Abstracting the Communication Intent in Applications to Improve Portability and Productivity

    SciTech Connect

    Mintz, Tiffany M; Hernandez, Oscar R; Kartsaklis, Christos; Bernholdt, David E; Eisenbach, Markus; Pophale, Swaroop

    2013-01-01

    Programming with communication libraries such as the Message Passing Interface (MPI) obscures the high-level intent of the communication in an application and makes static communication analysis difficult to do. Compilers are unaware of communication libraries specifics, leading to the exclusion of communication patterns from any automated analysis and optimizations. To overcome this, communication patterns can be expressed at higher-levels of abstraction and incrementally added to existing MPI applications. In this paper, we propose the use of directives to clearly express the communication intent of an application in a way that is not specific to a given communication library. Our communication directives allow programmers to express communication among processes in a portable way, giving hints to the compiler on regions of computations that can be overlapped with communication and relaxing communication constraints on the ordering, completion and synchronization of the communication imposed by specific libraries such as MPI. The directives can then be translated by the compiler into message passing calls that efficiently implement the intended pattern and be targeted to multiple communication libraries. Thus far, we have used the directives to express point-to-point communication patterns in C, C++ and Fortran applications, and have translated them to MPI and SHMEM.

  4. A Decision Analysis Tool for Climate Impacts, Adaptations, and Vulnerabilities

    SciTech Connect

    Omitaomu, Olufemi A; Parish, Esther S; Nugent, Philip J

    2016-01-01

    Climate change related extreme events (such as flooding, storms, and drought) are already impacting millions of people globally at a cost of billions of dollars annually. Hence, there are urgent needs for urban areas to develop adaptation strategies that will alleviate the impacts of these extreme events. However, lack of appropriate decision support tools that match local applications is limiting local planning efforts. In this paper, we present a quantitative analysis and optimization system with customized decision support modules built on geographic information system (GIS) platform to bridge this gap. This platform is called Urban Climate Adaptation Tool (Urban-CAT). For all Urban-CAT models, we divide a city into a grid with tens of thousands of cells; then compute a list of metrics for each cell from the GIS data. These metrics are used as independent variables to predict climate impacts, compute vulnerability score, and evaluate adaptation options. Overall, the Urban-CAT system has three layers: data layer (that contains spatial data, socio-economic and environmental data, and analytic data), middle layer (that handles data processing, model management, and GIS operation), and application layer (that provides climate impacts forecast, adaptation optimization, and site evaluation). The Urban-CAT platform can guide city and county governments in identifying and planning for effective climate change adaptation strategies.

  5. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  6. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  7. 2nd Annual DOE-ERSP PI Meeting: Abstracts

    SciTech Connect

    Hazen, Terry C.

    2007-03-14

    and allows ample time for informal group discussions and poster presentations. The intent of this format is to foster informal discussion of research among PIs and ERSD program managers-discussion that is a hallmark of previous ERSD-sponsored meetings. Morning sessions will be dominated by oral presentations from PIs chosen by ERSD program managers to communicate key topics of research within the program. There is ample time during lunch and in the early afternoon for small group discussions/meetings prior to convening again in the later afternoon for oral presentations on field research conducted at the Integrated Field-Scale Subsurface Research Challenge sites (IFCs). Formal poster sessions begin after dinner. Abstracts for all poster presentations are listed within this meeting booklet. On behalf of the ERSD program managers and staff, we thank you for attending this year's PI meeting. We look forward to discussing the results of your research with you and your ideas for the future, and we hope that this meeting will continue as an important tradition for PIs in the program and serve as a valuable resource for your investigations.

  8. Towards an Abstraction-Friendly Programming Model for High Productivity and High Performance Computing

    SciTech Connect

    Liao, C; Quinlan, D; Panas, T

    2009-10-06

    General purpose languages, such as C++, permit the construction of various high level abstractions to hide redundant, low level details and accelerate programming productivity. Example abstractions include functions, data structures, classes, templates and so on. However, the use of abstractions significantly impedes static code analyses and optimizations, including parallelization, applied to the abstractions complex implementations. As a result, there is a common perception that performance is inversely proportional to the level of abstraction. On the other hand, programming large scale, possibly heterogeneous high-performance computing systems is notoriously difficult and programmers are less likely to abandon the help from high level abstractions when solving real-world, complex problems. Therefore, the need for programming models balancing both programming productivity and execution performance has reached a new level of criticality. We are exploring a novel abstraction-friendly programming model in order to support high productivity and high performance computing. We believe that standard or domain-specific semantics associated with high level abstractions can be exploited to aid compiler analyses and optimizations, thus helping achieving high performance without losing high productivity. We encode representative abstractions and their useful semantics into an abstraction specification file. In the meantime, an accessible, source-to-source compiler infrastructure (the ROSE compiler) is used to facilitate recognizing high level abstractions and utilizing their semantics for more optimization opportunities. Our initial work has shown that recognizing abstractions and knowing their semantics within a compiler can dramatically extend the applicability of existing optimizations, including automatic parallelization. Moreover, a new set of optimizations have become possible within an abstraction-friendly and semantics-aware programming model. In the future, we will

  9. Proceedings of the international conference on nuclear physics, August 24-30, 1980, Berkeley, California. Volume 1. Abstracts. [Berkeley, California, August 24-30, 1980 (abstracts only)

    SciTech Connect

    Not Available

    1980-01-01

    This volume contains all abstracts (931) received by the conference organizers before June 20, 1980. The abstracts are grouped according to the following topics: nucleon-nucleon interactions, free and in nuclei; distribution of matter, charge, and magnetism; exotic nuclei and exotic probes; giant resonances and other high-lying excitations; applications of nuclear science; nuclei with large angular momentum and deformation; heavy-ion reactions and relaxation phenomena; new techniques and instruments; pion absorption and scattering by nuclei; and miscellaneous. Some of these one-page abstracts contain data. A complete author index is provided. (RWR)

  10. Photovoltaics: Separating Multiple Excitons

    SciTech Connect

    Nozik, A. J.

    2012-05-01

    Scientists have demonstrated an efficient process for generating multiple excitons in adjacent silicon nanocrystals from a single high-energy photon. Their findings could prove useful for a wide range of photovoltaic applications.

  11. Multiple shell fusion targets

    DOEpatents

    Lindl, J.D.; Bangerter, R.O.

    1975-10-31

    Multiple shell fusion targets for use with electron beam and ion beam implosion systems are described. The multiple shell targets are of the low-power type and use a separate relatively low Z, low density ablator at large radius for the outer shell, which reduces the focusing and power requirements of the implosion system while maintaining reasonable aspect ratios. The targets use a high Z, high density pusher shell placed at a much smaller radius in order to obtain an aspect ratio small enough to protect against fluid instability. Velocity multiplication between these shells further lowers the power requirements. Careful tuning of the power profile and intershell density results in a low entropy implosion which allows breakeven at low powers. For example, with ion beams as a power source, breakeven at 10-20 Terrawatts with 10 MeV alpha particles for imploding a multiple shell target can be accomplished.

  12. Multiple stage multiple filter hydrate store

    DOEpatents

    Bjorkman, H.K. Jr.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  13. Multiple stage multiple filter hydrate store

    DOEpatents

    Bjorkman, Jr., Harry K.

    1983-05-31

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means or separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means.

  14. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    SciTech Connect

    Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge

  15. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  16. V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability

    Energy.gov [DOE]

    McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

  17. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  18. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    to version 2.3.0 or 1.2.19. Addthis Related Articles U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability V-062: Asterisk Two Denial of...

  19. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

    SciTech Connect

    Chinthavali, Supriya; Shankar, Mallikarjun

    2016-01-01

    Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph, (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.

  20. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  1. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  2. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department...

    Office of Environmental Management (EM)

    Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN ...

  3. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  4. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy.gov [DOE] (indexed site)

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis ...

  5. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  6. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  7. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Resilience Solutions | Department of Energy U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser. This report examines the current and potential future impacts of climate change and extreme weather on the U.S. energy sector at the regional level. It provides illustrative examples of climate

  8. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the Administration's efforts to support national climate change adaptation planning through the Interagency Climate Change Adaptation Task Force and Strategic Sustainability Planning process established under Executive Order 13514 and to advance the U.S. Department of Energy's goal of promoting energy

  9. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  10. Find a lot of patent information fast using the patent abstracts feature at

    Office of Scientific and Technical Information (OSTI)

    the DOepatents database | OSTI, US Dept of Energy Office of Scientific and Technical Information a lot of patent information fast using the patent abstracts feature at the DOepatents database Back to the OSTI News Listing for 2010 Now it's easy to quickly scan patent abstracts to find the scientific patent information you need. Search at DOepatents for the patent information related to your science topic; then hover over the patent titles and read the first 50 words of the patent abstracts

  11. Program and abstracts: IS-MPMI sixth International Symposium on Molecular Plant-Microbe Interactions

    SciTech Connect

    Not Available

    1992-12-31

    This volume provides abstracts of oral and poster presentations made for the Sixth International Symposium on Molecular Plant-Microbe Interactions.

  12. Science and engineering research semester internship spring 1997 abstracts and research papers

    SciTech Connect

    Williams, Beverly

    1997-10-01

    This document consists of abstracts and research papers from the science and engineering research semester internship spring 1997 held at Lawrence Livermore National Laboratory.

  13. 2015 National Environmental Justice Conference and Training Program Call for Abstracts

    Energy.gov [DOE]

    The 2015 National Environmental Justice Conference and Training Program planners are inviting individuals to submit abstracts, not to exceed two pages, related to environmental justice. Each...

  14. CALL FOR ABSTRACTS for the 2014 National Environmental Justice Conference and Training Program

    Energy.gov [DOE]

    The 2014 National Environmental Justice Conference and Training Program planners are inviting individuals to submit abstracts, not to exceed two pages, related to environmental justice.

  15. Advanced light source: Compendium of user abstracts and technical reports,1993-1996

    SciTech Connect

    None, None

    1997-04-01

    This compendium contains abstracts written by users summarizing research completed or in progress from 1993-1996, ALS technical reports describing ongoing efforts related to improvement in machine operations and research and development projects, and information on ALS beamlines planned through 1998. Two tables of contents organize the user abstracts by beamline and by area of research, and an author index makes abstracts accessible by author and by principal investigator. Technical details for each beamline including whom to contact for additional information can be found in the beamline information section. Separate abstracts have been indexed into the database for contributions to this compendium.

  16. Comparison with Carrier Multiplication

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Complete Theory of Down-Conversion, and a Comparison with Carrier Multiplication 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 22 24 26 28 30 32 34 Measured Quantum Efficiency (QE) Efficiency [%] with Down-Conversion Single- Junction Threshold Solar Cell 1 2 3 4 5 6 7 8 9 10 20 30 40 50 60 70 80 90 Peak Efficiency [%] Splitting Multiplicity (M) C=max C=1000 C=100 C=1 C=10 Down Conversion Carrier Multiplication Ze'ev R. Abrams, Avi Niv, Majid Gharghi, Chris Gladden & Xiang Zhang Materials Science

  17. Multiple sort flow cytometer

    DOEpatents

    Van den Engh, Ger (Seattle, WA); Esposito, Richard J. (Seattle, WA)

    1996-01-01

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane.

  18. Multiple sort flow cytometer

    DOEpatents

    Engh, G. van den; Esposito, R.J.

    1996-01-09

    A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane. 8 figs.

  19. Multiple gap photovoltaic device

    DOEpatents

    Dalal, Vikram L.

    1981-01-01

    A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

  20. Regulatory and technical reports (abstract index journal). Compilation for third quarter 1997, July--September

    SciTech Connect

    Stevenson, L.L.

    1998-01-01

    This compilation consists of bibliographic data and abstracts for the formal regulatory and technical reports issued by the US Nuclear Regulatory Commission (NRC) Staff and its contractors. It is NRC`s intention to publish this compilation quarterly and to cumulate it annually. This report contains the third quarter 1997 abstracts.

  1. Abstract As

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The aerodynamic performance of various HAWT configurations was established using PROP for personal computers (Tangler,1987). The PROP family of codes is somewhat of an...

  2. Abstract Measurement

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Heat Pump Systems » Absorption Heat Pumps Absorption Heat Pumps Absorption heat pumps are essentially air-source heat pumps driven not by electricity, but by a heat source such as natural gas, propane, solar-heated water, or geothermal-heated water. Because natural gas is the most common heat source for absorption heat pumps, they are also referred to as gas-fired heat pumps. There are also absorption (or gas-fired) coolers available that work on the same principle. Unlike some absorption heat

  3. Structuring Materials on Multiple Length Scales for Energy Applications |

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    MIT-Harvard Center for Excitonics Structuring Materials on Multiple Length Scales for Energy Applications October 25, 2012 at 3pm/36-428 Adreas Stein Department of Chemistry, University of Minnesota astein Abstract: Nanoporous and nanostructured materials are becoming increasingly important for advanced applications, including energy storage and conversion materials. Templating methods based on hard templates (colloidal crystal templating, nanocasting) and soft templates (surfactant systems)

  4. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  5. Portable multiplicity counter

    DOEpatents

    Newell, Matthew R.; Jones, David Carl

    2009-09-01

    A portable multiplicity counter has signal input circuitry, processing circuitry and a user/computer interface disposed in a housing. The processing circuitry, which can comprise a microcontroller integrated circuit operably coupled to shift register circuitry implemented in a field programmable gate array, is configured to be operable via the user/computer interface to count input signal pluses receivable at said signal input circuitry and record time correlations thereof in a total counting mode, coincidence counting mode and/or a multiplicity counting mode. The user/computer interface can be for example an LCD display/keypad and/or a USB interface. The counter can include a battery pack for powering the counter and low/high voltage power supplies for biasing external detectors so that the counter can be configured as a hand-held device for counting neutron events.

  6. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  7. Pacific Northwest Laboratory annual report for 1979 to the DOE Assistant Secretary for Environment. Part 1. Biomedical sciences. [Lead abstract

    SciTech Connect

    Not Available

    1980-02-01

    Separate abstracts were prepared for the 101 individual papers presented in this annual report. (ERB)

  8. Competition between abstraction and exchange channels in H + HCN reaction: Full-dimensional quantum dynamics

    SciTech Connect

    Jiang, Bin; Guo, Hua

    2013-12-14

    Dynamics of the title reaction is investigated on an ab initio based potential energy surface using a full-dimensional quantum wave packet method within the centrifugal sudden approximation. It is shown that the reaction between H and HCN leads to both the hydrogen exchange and hydrogen abstraction channels. The exchange channel has a lower threshold and larger cross section than the abstraction channel. It also has more oscillations due apparently to quantum resonances. Both channels are affected by long-lived resonances supported by potential wells. Comparison with experimental cross sections indicates underestimation of the abstraction barrier height.

  9. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

  10. U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability

    Energy.gov [DOE]

    A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks.

  11. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  12. Eighteenth symposium on biotechnology for fuels and chemicals: Program and abstracts

    SciTech Connect

    1996-12-31

    This volume provides the proceedings for the Eighteenth Symposium on Biotechnology for Fuels and Chemicals held May 5-9, 1996 in Gatlinburg, Tennessee. The proceedings contains abstracts for oral and poster presentations.

  13. Biology Division progress report, October 1, 1978-May 31, 1980. [Lead abstract

    SciTech Connect

    Not Available

    1980-10-01

    Separate abstracts were prepared for each of the four sections into which this progress report has been divided. The report also contains sections related to interdivision activities and educational activities. (ERB)

  14. Regulatory and technical reports (abstract index journal): Annual compilation for 1996, Volume 21, No. 4

    SciTech Connect

    Sheehan, M.A.

    1997-04-01

    This compilation is the annual cumulation of bibliographic data and abstracts for the formal regulatory and technical reports issued by the U.S. Nuclear Regulatory Commission (NRC) Staff and its contractors.

  15. Heat flow in the northwest Atlantic (abstract) (Conference) | SciTech

    Office of Scientific and Technical Information (OSTI)

    Connect Heat flow in the northwest Atlantic (abstract) Citation Details In-Document Search Title: Heat flow in the northwest Atlantic (abstract) Authors: Hobart, M.A. [1] ; Herman, B.M. ; Langseth, M.G. ; Sclater, J.G. ; Crowe, J. + Show Author Affiliations (Lamont-Doherty Geological Observatory, Palisades, NY) Publication Date: 1977-06-01 OSTI Identifier: 5202016 Resource Type: Conference Resource Relation: Journal Name: EOS, Trans., Am. Geophys. Union; (United States); Journal Volume:

  16. Environmental Tracers for Determining Water Resource Vulnerability to Climate Change

    SciTech Connect

    Singleton, M

    2009-07-08

    Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components

  17. Multiple capillary biochemical analyzer

    DOEpatents

    Dovichi, Norman J.; Zhang, Jian Z.

    1995-01-01

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibres to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands.

  18. Multiple capillary biochemical analyzer

    DOEpatents

    Dovichi, N.J.; Zhang, J.Z.

    1995-08-08

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

  19. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  20. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.