National Library of Energy BETA

Sample records for voltage security assessment

  1. PMU-Aided Voltage Security Assessment for a Wind Power Plant...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    PMU-Aided Voltage Security Assessment for a Wind Power Plant Preprint H. Jiang, 1 Y.C. Zhang, 2 J.J. Zhang, 1 and E. Muljadi 2 1 University of Denver 2 National Renewable Energy ...

  2. PMU-Aided Voltage Security Assessment for a Wind Power Plant

    SciTech Connect

    Jiang, Huaiguang; Zhang, Yingchen; Zhang, Jun Jason; Muljadi, Eduard

    2015-10-05

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant's point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  3. PMU-Aided Voltage Security Assessment for a Wind Power Plant: Preprint

    SciTech Connect

    Jiang, H.; Zhang, Y. C.; Zhang, J. J.; Muljadi, E.

    2015-04-08

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant’s point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  4. System-area operating margin assessment and security enhancement against voltage collapse

    SciTech Connect

    Berizzi, A.; Bresesti, P.; Marannino, P.; Granelli, G.P.; Montagna, M.

    1996-08-01

    The (very) short term reactive power scheduling function, to be adopted by ENEL Spa, takes into account the voltage stability requirements in a preventive application of the security function. In this environment the procedure determines the voltage collapse distance of the global system and of the areas controlled by the Secondary Voltage Regulation (SVR) both in short (24 hours ahead) and in a very short term (few hours or fractions of hour ahead). The procedure also schedules the control actions to be taken in emergency states in a preventive way. Area or system-wise indicators, based on nodal sensitivities and/or eigen (singular) value analysis, provide effective measures of the margins of the system with respect to the risk of voltage collapse and the related corrective actions. Applications of the procedure to the EHV network and to a subtransmission area of the ENEL system are presented in the paper.

  5. Office of Security Assessments

    Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  6. Computer Security Risk Assessment

    Energy Science and Technology Software Center

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  7. Security Risk Assessment

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  8. Nevada National Security Site Performance Assessment Updates...

    Office of Environmental Management (EM)

    Performance Assessment Updates for New Waste Streams Nevada National Security Site ... Video Presentation Nevada National Security Site Performance Assessment Updates for New ...

  9. Enterprise Assessments Assessment of the Y-12 National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    National Security Complex Criticality Accident Alarm System - June 2016 Enterprise Assessments Assessment of the Y-12 National Security Complex Criticality Accident Alarm System ...

  10. Cyber and Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Cyber and Security Assessments Cyber and Security Assessments Cyber and Security Assessments within the Office of Independent Enterprise Assessments implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1A, Independent Oversight

  11. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  12. Enterprise Assessments Assessment of the Nevada National Security Site 2016

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Full-Scale Exercise DORSET-16 - July 2016 | Department of Energy the Nevada National Security Site 2016 Full-Scale Exercise DORSET-16 - July 2016 Enterprise Assessments Assessment of the Nevada National Security Site 2016 Full-Scale Exercise DORSET-16 - July 2016 July 2016 Assessment of the Nevada National Security Site 2016 Full-Scale Exercise DORSET-16 The U.S. Department of Energy (DOE) Office of Emergency Management Assessments, within the independent Office of Enterprise Assessments

  13. Enterprise Assessments Assessment of the Y-12 National Security Complex

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Criticality Accident Alarm System - June 2016 | Department of Energy Y-12 National Security Complex Criticality Accident Alarm System - June 2016 Enterprise Assessments Assessment of the Y-12 National Security Complex Criticality Accident Alarm System - June 2016 June 2016 Assessment of the Criticality Accident Alarm System at the Y-12 National Security Complex The U.S. Department of Energy Office of Nuclear Safety and Environmental Assessments, within the Office of Enterprise Assessments

  14. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  15. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  16. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  17. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  18. Independent Oversight Assessment, Y-12 National Security Complex...

    Office of Environmental Management (EM)

    Y-12 National Security Complex - June 2012 Independent Oversight Assessment, Y-12 National Security Complex - June 2012 June 2012 Assessment of Nuclear Safety Culture at the Y-12...

  19. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  20. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  1. Cyber Assessment Methods for SCADA Security

    SciTech Connect

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  2. Cyber Assessment Methods For SCADA Security

    SciTech Connect

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  3. Enterprise Assessments Review of the Nevada National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    the Nevada National Security Site Fire Protection Program - October 2015 Enterprise Assessments Review of the Nevada National Security Site Fire Protection Program - October 2015...

  4. NNSA Administrator Gordon Assesses Security Of the Nuclear Weapons...

    National Nuclear Security Administration (NNSA)

    Gordon Assesses Security Of the Nuclear Weapons Complex | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile ...

  5. Enterprise Assessments Targeted Review,Y-12 National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Y-12 National Security Complex - March 2015 Enterprise Assessments Targeted Review,Y-12 National Security Complex - March 2015 March 2015 Targeted Review of Work Planning and ...

  6. Enterprise Assessments Review of the Y-12 National Security Complex...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Review of the Y-12 National Security Complex Emergency Management Exercise Program - August 2015 Enterprise Assessments Review of the Y-12 National Security Complex Emergency ...

  7. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  8. Cyber Assessment Methods for SCADA Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  9. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  10. Strategies for Voltage Control and Transient Stability Assessment

    SciTech Connect

    Hiskens, Ian A.

    2013-09-25

    As wind generation grows, its influence on power system performance will becoming increasingly noticeable. Wind generation di ffers from traditional forms of generation in numerous ways though, motivating the need to reconsider the usual approaches to power system assessment and performance enhancement. The project has investigated the impact of wind generation on transient stability and voltage control, identifying and addressing issues at three distinct levels of the power system: 1) at the device level, the physical characteristics of wind turbine generators (WTGs) are quite unlike those of synchronous machines, 2) at the wind-farm level, the provision of reactive support is achieved through coordination of numerous dissimilar devices, rather than straightforward generator control, and 3) from a systems perspective, the location of wind-farms on the sub-transmission network, coupled with the variability inherent in their power output, can cause complex voltage control issues. The project has sought to develop a thorough understanding of the dynamic behaviour of type-3 WTGs, and in particular the WECC generic model. The behaviour of such models is governed by interactions between the continuous dynamics of state variables and discrete events associated with limits. It was shown that these interactions can be quite complex, and may lead to switching deadlock that prevents continuation of the trajectory. Switching hysteresis was proposed for eliminating deadlock situations. Various type-3 WTG models include control blocks that duplicate integrators. It was shown that this leads to non-uniqueness in the conditions governing steady-state, and may result in pre- and post-disturbance equilibria not coinciding. It also gives rise to a zero eigenvalue in the linearized WTG model. In order to eliminate the anomalous behaviour revealed through this investigation, WECC has now released a new generic model for type-3 WTGs. Wind-farms typically incorporate a variety of

  11. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  12. Office of Security Assessments - Report Titles | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Assessments - Report Titles Office of Security Assessments - Report Titles 2016 (U) Results of Limited-Notice Performance Tests at the Y-12 National Security Complex Conducted on November 3-4, 2015 [January 5, 2016] (UCNI) (U) Results of the Limited-Scope Assessment of Protective Force Management and Capabilities at the Portsmouth Gaseous Diffusion Plant, November 3-5, 2015 [January 8, 2016] (OUO) (U) Results of Limited-Notice-Performance Tests at Office of Secure Transportation

  13. Enterprise Assessments Review of the Y-12 National Security Complex...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Review of the Y-12 National Security Complex 2014 Site-Level Exercise - January 2015 Enterprise Assessments Review of the Y-12 National Security Complex 2014 Site-Level Exercise - ...

  14. Nevada National Security Site Performance Assessment Updates for New Waste

    Office of Environmental Management (EM)

    Streams | Department of Energy Performance Assessment Updates for New Waste Streams Nevada National Security Site Performance Assessment Updates for New Waste Streams Greg Shott National Security Technologies, LLC Performance and Risk Assessment Community of Practice Annual Technical Exchange Meeting December 11 and 12, 2014 To view all the P&RA CoP 2014 Technical Exchange Meeting videos click here. Video Presentation Nevada National Security Site Performance Assessment Updates for New

  15. Enterprise Assessments Review of the Nevada National Security Site Fire

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Protection Program - October 2015 | Department of Energy Nevada National Security Site Fire Protection Program - October 2015 Enterprise Assessments Review of the Nevada National Security Site Fire Protection Program - October 2015 October 2015 Review of the Fire Protection Program at the Nevada National Security Site The U.S. Department of Energy (DOE) independent Office of Enterprise Assessments (EA) conducted an oversight review of the Nevada National Security Site (NNSS) fire protection

  16. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  17. Gordon Assesses Security At Nuclear Weapons Complex News.....

    National Nuclear Security Administration (NNSA)

    Anson Franklin, 202586-7371 September 21, 2001 NNSA Administrator Gordon Assesses Security Of the Nuclear Weapons Complex John Gordon, Administrator of the Department of Energy's ...

  18. Security Risk Assessment Methodologies (RAM) for Critical Infrastructu...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Building Energy Efficiency Find More Like This Return to Search Security Risk Assessment Methodologies (RAM) for Critical Infrastructures Sandia National Laboratories...

  19. Enterprise Assessments Review of the Y-12 National Security Complex

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Emergency Management Exercise Program - August 2015 | Department of Energy Y-12 National Security Complex Emergency Management Exercise Program - August 2015 Enterprise Assessments Review of the Y-12 National Security Complex Emergency Management Exercise Program - August 2015 August 2015 Review of Emergency Management Exercise Program The U.S. Department of Energy (DOE) independent Office of Enterprise Assessments (EA) conducted a review of National Nuclear Security Administration's (NNSA)

  20. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  1. Office of Security Assessments | Department of Energy

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    protection of special nuclear material, and classified and sensitive information. ... amounts of special nuclear material, classified information, or other security assets. ...

  2. Hazard classification assessment for the High Voltage Initiator

    SciTech Connect

    Cogan, J.D.

    1994-04-19

    An investigation was conducted to determine whether the High Voltage Initiator (Sandia p number 395710; Navy NAVSEA No. 6237177) could be assigned a Department of Transportation (DOT) hazard classification of ``IGNITERS, 1.4G, UN0325`` under Code of Federal Regulations, 49 CFR 173.101, when packaged per Mound drawing NXB911442. A hazard classification test was performed, and the test data led to a recommended hazard classification of ``IGNITERS, 1.4G, UN0325,`` based on guidance outlined in DOE Order 1540.2 and 49 CFR 173.56.

  3. Design of a decision fusion rule for power system security assessment

    SciTech Connect

    Chow, J.C.; Zhu, Q.; Fischl, R.; Kam, M. )

    1993-08-01

    An Integrated Decision Support system is designed via sensor fusion techniques, for assessing the security of power systems. The Integrated Decision Support system fuses information from various Approximated System Performance (ASP) models in order to minimize the risk of making the wrong decision under changing operating conditions. It uses the classification decisions provided by different ASP models together with information about their statistical performance (e.g. probabilities of misclassifications) to synthesize the globally optimal decision in the Bayesian risk sense. This global decision is often superior (and in no case inferior) to the one obtained using any single ASP model. The design of the integrated decision support system is illustrated for detecting static voltage collapse by fusing the security information from a set of existing security indices.

  4. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  5. Office of Enterprise Assessments Assessment of Nuclear Reactor Facility Operations at Nevada National Security Site – September 2016

    Energy.gov [DOE]

    Assessment of Nuclear Reactor Facility Operations at Nevada National Security Site Assessment of the Uranium Processing Facility Project Engineering Processes

  6. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the

  7. PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SPRO - Physical Security Major Application PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Deparlment of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional gUidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetexUneword/206/o2061.pdf MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site JUly 21, 2009 Office of

  8. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  9. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  10. A total risk assessment methodology for security assessment.

    SciTech Connect

    Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

    2009-06-01

    Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a

  11. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  12. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  13. Office of Cyber and Security Assessments | Department of Energy

    Office of Environmental Management (EM)

    and classified and unclassified cyber security policies and programs throughout the Department, including protection of special nuclear material, and classified and ...

  14. Safeguards and Security Oversight and Assessments Implementation Guide

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-12-21

    This Guide identifies acceptable methods for implementing the safeguards and security provisions of DOE O 226.1A. Canceled by DOE N 251.80.

  15. Assessment of research directions for high-voltage direct-current power systems. Final report

    SciTech Connect

    Long, W F

    1982-09-01

    High voltage direct current (HVDC) power transmission continues to be an emerging technology nearly thirty years after its introduction into modern power systems. To date its use has been restricted to either specialized applications having identifiable economic advantages (e.g., breakeven distance) or, rarely, applications where decoupling is needed. Only recently have the operational advantages (e.g., power modulation) of HVDC been realized on operating systems. A research project whose objective was to identify hardware developments and, where appropriate, system applications which can exemplify cost and operational advantages of integrated ac/dc power systems is discussed. The three principal tasks undertaken were: assessment of equipment developments; quantification of operational advantages; and interaction with system planners. Interest in HVDC power transmission has increased markedly over the past several years, and many new systems are now being investigated. The dissemination of information about HVDC, including specifically the symposium undertaken for Task 3, is a critical factor in fostering an understanding of this important adjunct to ac power transmission.

  16. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  17. Enterprise Assessments Assessment of the Nevada National Security Site 2016 Full-Scale Exercise DORSET-16 … July 2016

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Nevada National Security Site 2016 Full-Scale Exercise DORSET-16 July 2016 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ..................................................................................................................................................... ii Executive Summary

  18. Enterprise Assessments Assessment of the Y-12 National Security Complex Criticality Accident Alarm System … June 2016

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Y-12 National Security Complex Criticality Accident Alarm System June 2016 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  19. Office of Enterprise Assessments Assessment of Nuclear Reactor Facility Operations at Nevada National Security Site … September 2016

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Nuclear Reactor Facility Operations at Nevada National Security Site September 2016 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  20. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  1. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  2. AMI FW UPGRADEABILITY TEST PROCEDURE AND SECURITY ASSESSMENT

    SciTech Connect

    Snyder, Isabelle B

    2014-01-01

    The National Institute of Standards and Technology (NIST) is producing NISTIR 7823 to define test requirements for Smart Meter upgradability. The term Smart Meter refers specifically to advanced electric meters being deployed to enhance management of electricity distribution for residential and industrial consumers. The underlying functional and security requirements for Smart Meter upgradability are specified in NEMA standard SG-AMI 1-2009. The purpose of NISTIR 7823 is to describe conformance test requirements that may be used voluntarily by testers and/or test laboratories to determine whether Smart Meters and Upgrade Management Systems conform to the requirements of NEMA SG-AMI 1-2009.

  3. Independent Oversight Assessment, Y-12 National Security Complex - June

    Office of Environmental Management (EM)

    2012 | Department of Energy Portsmouth/Paducah Project Office - May 2012 Independent Oversight Assessment, Portsmouth/Paducah Project Office - May 2012 May 2012 Assessment of the Portsmouth/Paducah Project Office Conduct of Operations Oversight of the Depleted Uranium Hexafluoride Conversion Plants This report provides the results of an independent assessment of the Department of Energy's (DOE) Portsmouth/Paducah Project Office oversight of conduct of operations at DOE's depleted uranium

  4. Technical Qualification Program Self-Assessment Report- Office of Health, Safety and Security- 2014

    Energy.gov [DOE]

    Beginning in April 2014, a self-assessment of the Technical Qualification Program (TQP) was performed in the Office of Health, Safety and Security (HSS). The assessment was led by the HSS TQP Manager who is assigned the responsibility for maintaining and implementing the programs.

  5. A review of video security training and assessment-systems and their applications

    SciTech Connect

    Cellucci, J.; Hall, R.J. )

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.

  6. Chapter 3: Enabling Modernization of the Electric Power System Technology Assessment | Cyber and Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Cyber and Physical Security Chapter 3: Technology Assessments Introduction As understanding of the threats facing the operation, components, and subsystems of the electric power system is gained, a need has emerged for improvements in grid security and resilience. The focus on resiliency implies that threats will not go away and that some attacks, in addition to natural events, will be carried out successfully. The objective is for the system and associated subsystems to be designed and operated

  7. An expert system for automating security incident assessment using OPS5 in an Ada environment

    SciTech Connect

    Canales, T.W.; Smart, J.C.

    1988-01-29

    An expert system that automatically assesses security incidents is being developed at Lawrence Livermore National Laboratory. The expert system associates, classifies, and prioritizes monitored sensor events. The outcome of these processes is a dynamic representation of the state of Laboratory security in the form of security ''incidents''. A graphical representation of the incidents is integrated into a map-oriented console monitor that provides the operator with a comprehensive view of incidents and their locations. A prototype expert system has been developed using the OPS5 rule-based language. A large Ada-based program provides control of the map display system and interfaces to the various monitoring and access-control devices. In addition to the expert system operation, the issues and methods involved in integrating the OPS5-based incident-assessment system to the large Ada-based control program are discussed. 7 refs., 7 figs.

  8. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    SciTech Connect

    Shull, Doug

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  9. Lawrence Livermore National Security CFO Processes Functional Management Assessment

    SciTech Connect

    Sparks, A; Sampson, D; Thomas, B; Mendez, M

    2008-06-12

    The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing

  10. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  11. Contingency selection theory for steady-state security assessment of power systems

    SciTech Connect

    Halpin, T.F.

    1982-01-01

    This thesis presents the theory and method for systematically finding the performance index (PI) which is used in Automatic Contingency Selection (ACS) algorithms. The purpose of the ACS algorithm is to determine whether a contingency has an impact on the security of the power system (such as out-of-limit conditions in the post-contigency operation) or not, in a computationally efficient manner. Since this is a binary decision problem, then the choice of the PI is equivalent ot the selection of a decision function which measures the impact of each contingency on the system performance in terms of giving out-of-limit conditions. This thesis shows how to select the PI together with a threshold value J/sub th/ so as to minimize the probability of misclassifying the contingency. The main contribution of this thesis is that it gives the theoretical foundation for designing more effective ACS algorithms. It shows that the selection of the PI is based on a statistical decision criteria such as the Bayes Risk Criterion, since one needs to examine the risk involved in misclassifying the contingency. This approach is used to find the PI for monitoring both the line flow, bus voltage and generator VAR limits. It is shown that when formulating the problem in the space of voltage magnitudes and phase angles then the problem of finding the PI which satisfies a specific contingency selection criteria can be stated as a set imbedding and volume maximization problem. These theoretical results are applied to the problem of tuning the weighting coefficients in the currently used PI's for analyzing either the real power flow or node voltage magnitude problems in order ot guarantee proper classification of the contingencies in terms of minimizing the probabilities of missing critial contingencies and false alarms.

  12. Safeguards and Security Survey and Self-Assessment Planning, Conduct, and Reporting

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1217-2016 February 2016 DOE STANDARD SAFEGUARDS AND SECURITY SURVEY AND SELF-ASSESSMENT PLANNING, CONDUCT, AND REPORTING U.S. Department of Energy Washington, D.C. 20585 AREA SANS DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1217-2016 ii This Page Intentionally Left Blank DOE-STD-1217-2016 iii TABLE OF CONTENTS FOREWORD........................................................................................................................... vi 1.

  13. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  14. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  15. VOLTAGE REGULATOR

    DOEpatents

    Von Eschen, R.L.; Scheele, P.F.

    1962-04-24

    A transistorized voltage regulator which provides very close voitage regulation up to about 180 deg F is described. A diode in the positive line provides a constant voltage drop from the input to a regulating transistor emitter. An amplifier is coupled to the positive line through a resistor and is connected between a difference circuit and the regulating transistor base which is negative due to the difference in voltage drop across thc diode and the resistor so that a change in the regulator output causes the amplifier to increase or decrease the base voltage and current and incrcase or decrease the transistor impedance to return the regulator output to normal. (AEC)

  16. Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  17. Security Specialist

    Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  18. Multi-contingency preprocessing for security assessment using physical concepts and CQR with classifications

    SciTech Connect

    Chen, R.H.; Malik, O.P.; Hope, G.S. ); Jingde Gao; Shiying Wang; Niande Xiang )

    1993-08-01

    A new method for preprocessing the outage lists for an Expert System for Security Assessment of power systems is presented in this paper. This method uses disturbing capability, structure and location classifications and CQR with Classifications (CQRC). Because this method avoids the traditional enumerative methods such as Automatic Contingency Selection, the number of contingencies can be reduced very sharply with heuristic common sense and rules of CQRC before numerical computing. So the double contingency problem or extremely heavy cost of computing can be tackled successfully. The proposed method along with an Automatic Contingency Analysis and Classification technique can assess the classified contingencies with basic physical concepts and without network simplification, minimize the number of missing harmful contingencies efficiently and give a clear accurate output.

  19. A learning-pattern recognition system for static-line-loading security assessment of power system

    SciTech Connect

    Prasad, N.R.

    1989-01-01

    The methodologies explored in this dissertation address the topic static-line-loading security using a learning pattern recognition approach. A basic issue in the pattern recognition approach is to determine if, indeed, the patterns of power system behavior are separable in terms of secure and insecure classes. Class separability is studied from the viewpoint of both intraset clustering and interset dispersion using feature extraction methodologies. While interset dispersion is examined only to the extent of whether or not it exists, no specific attempts are made to optimize the dispersion through feature selection methodologies. The properties of pattern vectors to exhibit intraset clustering and interset dispersion are explored using two different techniques. These techniques are the Karhunen-Loeve Expansion Method which does not assume any specific statistical distribution for the patterns, and the Minimum Entropy Method which assumes patterns that exhibit Gaussian distributions. Although both methods are fundamentally based on the concept of entropy minimization, the transformational properties that yield clustering are distinctly different. The differences are due to assumptions made regarding the statistical distributions of patterns representing system behavior. The application of patterns based on engineering heuristics and a priori knowledge of the system behavior is shown to provide enhanced classification power in the pattern recognition system. Results for several test systems are documented. The feasibility of utilizing mathematical pattern recognition techniques as a primary information processing system for security assessment and a means to subsequently induce learning is demonstrated. As such, a framework for the development of decision making tools with subsequent inputs to rule-based expert systems is speculated in a learning environment.

  20. Communications and control for electric power systems: Power flow classification for static security assessment

    SciTech Connect

    Niebur, D.; Germond, A.

    1993-02-01

    This report investigates the classification of power system states using an artificial neural network model, Kohonen's self-organizing feature map. The ultimate goal of this classification is to assess power system static security in real-time. Kohonen's self-organizing feature map is an unsupervised neural network which maps N-dimensional input vectors to an array of M neurons. After learning, the synaptic weight vectors exhibit a topological organization which represents the relationship between the vectors of the training set. This learning is unsupervised, which means that the number and size of the classes are not specified beforehand. In the application developed in the paper, the input vectors used as the training set are generated by off-line load-flow simulations. The learning algorithm and the results of the organization are discussed.

  1. Communications and control for electric power systems: Power flow classification for static security assessment

    SciTech Connect

    Niebur, D.; Germond, A.

    1993-02-01

    This report investigates the classification of power system states using an artificial neural network model, Kohonen`s self-organizing feature map. The ultimate goal of this classification is to assess power system static security in real-time. Kohonen`s self-organizing feature map is an unsupervised neural network which maps N-dimensional input vectors to an array of M neurons. After learning, the synaptic weight vectors exhibit a topological organization which represents the relationship between the vectors of the training set. This learning is unsupervised, which means that the number and size of the classes are not specified beforehand. In the application developed in the paper, the input vectors used as the training set are generated by off-line load-flow simulations. The learning algorithm and the results of the organization are discussed.

  2. Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Section J Contract No. DE-AC06-09RL14728 Modification 280 Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment Revision Number: 0 Date: 04/11/2013 Start: 05/01/2013 Finish: 07/30/2013 1.0 DESCRIPTION The DOE Office of Environmental Management (EM) Headquarters Security System (HQSS) is installed at the EM Consolidated Business Center (CBC) in Cincinnati, OH and administered from DOE Headquarters in Washington, DC. HQSS has been running as a

  3. The Arctic as a test case for an assessment of climate impacts on national security.

    SciTech Connect

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside

  4. Security Specialist

    Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  5. CRAD, Packaging and Transfer of Hazardous Materials and Materials of National Security Interest Assessment Plan

    Energy.gov [DOE]

    Verify that packaging and transportation safety requirements of hazardous materials and materials of national security interest have been established and are in compliance with DOE Orders 461.1 and 460.1B

  6. Wide Area Security Region Final Report

    SciTech Connect

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed

  7. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  8. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    SciTech Connect

    Qojas, M.

    1999-03-01

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

  9. HIGH VOLTAGE GENERATOR

    DOEpatents

    Zito, G.V.

    1959-04-21

    This patent relates to high voltage supply circuits adapted for providing operating voltages for GeigerMueller counter tubes, and is especially directed to an arrangement for maintaining uniform voltage under changing conditions of operation. In the usual power supply arrangement for counter tubes the counter voltage is taken from across the power supply output capacitor. If the count rate exceeds the current delivering capaciiy of the capacitor, the capacitor voltage will drop, decreasing the counter voltage. The present invention provides a multivibrator which has its output voltage controlled by a signal proportional to the counting rate. As the counting rate increases beyond the current delivering capacity of the capacitor, the rectified voltage output from the multivibrator is increased to maintain uniform counter voltage.

  10. Eliminate Voltage Unbalance

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Voltage unbalance degrades the performance and shortens the life of a three-phase motor. Voltage unbalance at the motor terminals can cause current unbalance that is far out of ...

  11. Transmission Line Security Monitor

    ScienceCinema

    None

    2016-07-12

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  12. Transmission Line Security Monitor

    SciTech Connect

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  13. Anti-addiction drug ibogaine inhibits voltage-gated ionic currents: A study to assess the drug's cardiac ion channel profile

    SciTech Connect

    Koenig, Xaver; Kovar, Michael; Rubi, Lena; Mike, Agnes K.; Lukacs, Peter; Gawali, Vaibhavkumar S.; Todt, Hannes; Hilber, Karlheinz; Sandtner, Walter

    2013-12-01

    The plant alkaloid ibogaine has promising anti-addictive properties. Albeit not licenced as a therapeutic drug, and despite hints that ibogaine may perturb the heart rhythm, this alkaloid is used to treat drug addicts. We have recently reported that ibogaine inhibits human ERG (hERG) potassium channels at concentrations similar to the drugs affinity for several of its known brain targets. Thereby the drug may disturb the heart's electrophysiology. Here, to assess the drug's cardiac ion channel profile in more detail, we studied the effects of ibogaine and its congener 18-Methoxycoronaridine (18-MC) on various cardiac voltage-gated ion channels. We confirmed that heterologously expressed hERG currents are reduced by ibogaine in low micromolar concentrations. Moreover, at higher concentrations, the drug also reduced human Na{sub v}1.5 sodium and Ca{sub v}1.2 calcium currents. Ion currents were as well reduced by 18-MC, yet with diminished potency. Unexpectedly, although blocking hERG channels, ibogaine did not prolong the action potential (AP) in guinea pig cardiomyocytes at low micromolar concentrations. Higher concentrations (≥ 10 μM) even shortened the AP. These findings can be explained by the drug's calcium channel inhibition, which counteracts the AP-prolonging effect generated by hERG blockade. Implementation of ibogaine's inhibitory effects on human ion channels in a computer model of a ventricular cardiomyocyte, on the other hand, suggested that ibogaine does prolong the AP in the human heart. We conclude that therapeutic concentrations of ibogaine have the propensity to prolong the QT interval of the electrocardiogram in humans. In some cases this may lead to cardiac arrhythmias. - Highlights: • We study effects of anti-addiction drug ibogaine on ionic currents in cardiomyocytes. • We assess the cardiac ion channel profile of ibogaine. • Ibogaine inhibits hERG potassium, sodium and calcium channels. • Ibogaine’s effects on ion channels are a

  14. Automatic voltage imbalance detector

    DOEpatents

    Bobbett, Ronald E.; McCormick, J. Byron; Kerwin, William J.

    1984-01-01

    A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

  15. Use of Data Libraries for IAEA Nuclear Security Assessment Methodologies (NUSAM) [section 5.4

    SciTech Connect

    Shull, D.; Lane, M.

    2015-06-23

    Data libraries are essential for the characterization of the facility and provide the documented input which enables the facility assessment results and subsequent conclusions. Data Libraries are historical, verifiable, quantified, and applicable collections of testing data on different types of barriers, sensors, cameras, procedures, and/or personnel. Data libraries are developed and maintained as part of any assessment program or process. Data is collected during the initial stages of facility characterization to aid in the model and/or simulation development process. Data library values may also be developed through the use of state testing centers and/or site resources by testing different types of barriers, sensors, cameras, procedures, and/or personnel. If no data exists, subject matter expert opinion and manufacturer's specifications/ testing values can be the basis for initially assigning values, but are generally less reliable and lack appropriate confidence measures. The use of existing data libraries that have been developed by a state testing organization reduces the assessment costs by establishing standard delay, detection and assessment values for use by multiple sites or facilities where common barriers and alarms systems exist.

  16. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security

  17. Annex C. Data Libraries for IAEA Nuclear Security Assessment Methodologies (NUSAM)

    SciTech Connect

    Shull, D.; Lane, M.

    2015-06-23

    Data Libraries are a collection of experimental data for PP elements based on specific defeat mechanisms. The data can de related to probability of detection, assessment, or barrier delay times. The data libraries can be a manually tabulated list or an electronic menu values enbedded in a stand-alone database or in an assessment software program such as SAVI or EASI. Data library values are usually based on years of historical testing data for many forms of common and sometimes unique PPS systems. Most useful testing libraries include data from the most basic alarm sensors, doors, walls, and barriers to very sophisticated PP elements. Each PP element is tested using increasing levels of defeat techniques from hand tools, power tools, breaching tools, explosives, and vehicles, as applicable.

  18. Lab announces security changes

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  19. Security Policy

    Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  20. Nuclear Security Enterprise | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the application of science, technology, engineering, (ST&E) and manufacturing. In the next 20 years, the U.S. nuclear weapons stockpile will be sustained and modernized through vigorous surveillance, assessment, life extension and dismantlement efforts. In addition, progress will be made in modernizing the physical

  1. Optical voltage reference

    DOEpatents

    Rankin, R.; Kotter, D.

    1994-04-26

    An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

  2. Optical voltage reference

    DOEpatents

    Rankin, Richard; Kotter, Dale

    1994-01-01

    An optical voltage reference for providing an alternative to a battery source. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function.

  3. Voltage Control Technical Conference

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    1-08-Voltage-Control-Technical-Conference Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

  4. Eliminate Voltage Unbalance

    SciTech Connect

    Not Available

    2000-01-01

    This two-page abstract provides tips for plant managers on checking and monitoring motor voltage unbalance to improve performance and life-span of industrial motors.

  5. 2012 Annual Planning Summary for National Nuclear Security Administrat...

    Energy Saver

    National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

  6. Nuclear security

    SciTech Connect

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  7. Voltage verification unit

    DOEpatents

    Martin, Edward J.

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  8. Voltage balanced multilevel voltage source converter system

    DOEpatents

    Peng, F.Z.; Lai, J.S.

    1997-07-01

    Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

  9. Voltage balanced multilevel voltage source converter system

    DOEpatents

    Peng, Fang Zheng; Lai, Jih-Sheng

    1997-01-01

    A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

  10. Security | Argonne National Laboratory

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  11. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset

  12. Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy's corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that

  13. High voltage DC power supply

    DOEpatents

    Droege, T.F.

    1989-12-19

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

  14. High voltage DC power supply

    DOEpatents

    Droege, Thomas F.

    1989-01-01

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

  15. Security Officer

    Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  16. Water Security Toolkit

    Energy Science and Technology Software Center

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  17. Advanced Metering Infrastructure Security Considerations | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Energy Metering Infrastructure Security Considerations Advanced Metering Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to secure that implementation appropriately. We intend that utilities use this report to guide their planning, procurement, roll-out, and assessment of the security of Advanced Metering Infrastructure. Advanced Metering Infrastructure Security

  18. National Security and Cyber Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  19. High voltage pulse generator

    DOEpatents

    Fasching, George E.

    1977-03-08

    An improved high-voltage pulse generator has been provided which is especially useful in ultrasonic testing of rock core samples. An N number of capacitors are charged in parallel to V volts and at the proper instance are coupled in series to produce a high-voltage pulse of N times V volts. Rapid switching of the capacitors from the paralleled charging configuration to the series discharging configuration is accomplished by using silicon-controlled rectifiers which are chain self-triggered following the initial triggering of a first one of the rectifiers connected between the first and second of the plurality of charging capacitors. A timing and triggering circuit is provided to properly synchronize triggering pulses to the first SCR at a time when the charging voltage is not being applied to the parallel-connected charging capacitors. Alternate circuits are provided for controlling the application of the charging voltage from a charging circuit to be applied to the parallel capacitors which provides a selection of at least two different intervals in which the charging voltage is turned "off" to allow the SCR's connecting the capacitors in series to turn "off" before recharging begins. The high-voltage pulse-generating circuit including the N capacitors and corresponding SCR's which connect the capacitors in series when triggered "on" further includes diodes and series-connected inductors between the parallel-connected charging capacitors which allow sufficiently fast charging of the capacitors for a high pulse repetition rate and yet allow considerable control of the decay time of the high-voltage pulses from the pulse-generating circuit.

  20. Device for monitoring cell voltage

    DOEpatents

    Doepke, Matthias; Eisermann, Henning

    2012-08-21

    A device for monitoring a rechargeable battery having a number of electrically connected cells includes at least one current interruption switch for interrupting current flowing through at least one associated cell and a plurality of monitoring units for detecting cell voltage. Each monitoring unit is associated with a single cell and includes a reference voltage unit for producing a defined reference threshold voltage and a voltage comparison unit for comparing the reference threshold voltage with a partial cell voltage of the associated cell. The reference voltage unit is electrically supplied from the cell voltage of the associated cell. The voltage comparison unit is coupled to the at least one current interruption switch for interrupting the current of at least the current flowing through the associated cell, with a defined minimum difference between the reference threshold voltage and the partial cell voltage.

  1. Safety and Security Officer

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  2. Safety, Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  3. Security Perimeter

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  4. Electron launching voltage monitor

    DOEpatents

    Mendel, Clifford W.; Savage, Mark E.

    1992-01-01

    An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors.

  5. Voltage controlled current source

    DOEpatents

    Casne, Gregory M.

    1992-01-01

    A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

  6. High voltage coaxial switch

    DOEpatents

    Rink, John P.

    1983-07-19

    A coaxial high voltage, high current switch having a solid cylindrical cold cathode coaxially surrounded by a thin hollow cylindrical inner electrode and a larger hollow cylindrical outer electrode. A high voltage trigger between the cathode and the inner electrode causes electrons to be emitted from the cathode and flow to the inner electrode preferably through a vacuum. Some of the electrons penetrate the inner electrode and cause a volumetric discharge in the gas (which may be merely air) between the inner and outer electrodes. The discharge provides a low impedance path between a high voltage charge placed on the outer electrode and a load (which may be a high power laser) coupled to the inner electrode. For high repetition rate the gas between the inner and outer electrodes may be continuously exchanged or refreshed under pressure.

  7. High voltage coaxial switch

    DOEpatents

    Rink, J.P.

    1983-07-19

    A coaxial high voltage, high current switch having a solid cylindrical cold cathode coaxially surrounded by a thin hollow cylindrical inner electrode and a larger hollow cylindrical outer electrode. A high voltage trigger between the cathode and the inner electrode causes electrons to be emitted from the cathode and flow to the inner electrode preferably through a vacuum. Some of the electrons penetrate the inner electrode and cause a volumetric discharge in the gas (which may be merely air) between the inner and outer electrodes. The discharge provides a low impedance path between a high voltage charge placed on the outer electrode and a load (which may be a high power laser) coupled to the inner electrode. For high repetition rate the gas between the inner and outer electrodes may be continuously exchanged or refreshed under pressure. 3 figs.

  8. Electron launching voltage monitor

    DOEpatents

    Mendel, C.W.; Savage, M.E.

    1992-03-17

    An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors. 5 figs.

  9. High voltage variable diameter insulator

    DOEpatents

    Vanacek, D.L.; Pike, C.D.

    1982-07-13

    A high voltage feedthrough assembly having a tubular insulator extending between the ground plane ring and the high voltage ring. The insulator is made of Pyrex and decreases in diameter from the ground plane ring to the high voltage ring, producing equipotential lines almost perpendicular to the wall of the insulator to optimize the voltage-holding capability of the feedthrough assembly.

  10. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  11. Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  12. HIGH VOLTAGE GENERATOR

    DOEpatents

    Schwemin, A.J.

    1959-03-17

    A generator is presented for producing relatively large currents at high voltages. In general, the invention comprises a plurality of capacitors connected in series by a plurality of switches alternately disposed with the capacitors. The circuit is mounted for movement with respect to contact members and switch closure means so that a load device and power supply are connected across successive numbers of capacitors, while the other capacitors are successively charged with the same power supply.

  13. High voltage pulse conditioning

    DOEpatents

    Springfield, Ray M.; Wheat, Jr., Robert M.

    1990-01-01

    Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

  14. High Voltage Connector

    SciTech Connect

    Kurita, C.H.; /Fermilab

    1987-03-06

    The originally designed high voltage connectors were to be made of brass. However, if treated like a Bellevile spring with the initially given dimensions, the stresses of the connector when crimped were calculated to be much higher than the yield stress of brass. Since the flange and outer diameters of the connector are to remain small, it was necessary to alter the other dimensions and choice of material in order to bring down the stresses applied to the connector.

  15. HIGH VOLTAGE ION SOURCE

    DOEpatents

    Luce, J.S.

    1960-04-19

    A device is described for providing a source of molecular ions having a large output current and with an accelerated energy of the order of 600 kv. Ions are produced in an ion source which is provided with a water-cooled source grid of metal to effect maximum recombination of atomic ions to molecular ions. A very high accelerating voltage is applied to withdraw and accelerate the molecular ions from the source, and means are provided for dumping the excess electrons at the lowest possible potentials. An accelerating grid is placed adjacent to the source grid and a slotted, grounded accelerating electrode is placed adjacent to the accelerating grid. A potential of about 35 kv is maintained between the source grid and accelerating grid, and a potential of about 600 kv is maintained between the accelerating grid and accelerating electrode. In order to keep at a minimum the large number of oscillating electrons which are created when such high voltages are employed in the vicinity of a strong magnetic field, a plurality of high voltage cascaded shields are employed with a conventional electron dumping system being employed between each shield so as to dump the electrons at the lowest possible potential rather than at 600 kv.

  16. APPARATUS FOR REGULATING HIGH VOLTAGE

    DOEpatents

    Morrison, K.G.

    1951-03-20

    This patent describes a high-voltage regulator of the r-f type wherein the modulation of the r-f voltage is accomplished at a high level, resulting in good stabilization over a large range of load conditions.

  17. High voltage variable diameter insulator

    DOEpatents

    Vanecek, David L.; Pike, Chester D.

    1984-01-01

    A high voltage feedthrough assembly (10) having a tubular insulator (15) extending between the ground plane ring (16) and the high voltage ring (30). The insulator (15) is made of Pyrex and decreases in diameter from the ground plane ring (16) to the high voltage ring (30), producing equipotential lines almost perpendicular to the wall (27) of the insulator (15) to optimize the voltage-holding capability of the feedthrough assembly (10).

  18. Charge-pump voltage converter

    DOEpatents

    Brainard, John P.; Christenson, Todd R.

    2009-11-03

    A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

  19. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  20. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  1. Vehicle Technologies Office Merit Review 2015: Assessing the Outlook of US Oil Dependence Using Oil Security Metrics Model (OSMM)

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation given by Oak Ridge National Laboratory at 2015 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Office Annual Merit Review and Peer Evaluation Meeting about assessing the...

  2. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  3. Global security

    SciTech Connect

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  5. Global security

    ScienceCinema

    Lynch, Patrick

    2016-07-12

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  6. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  7. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and ...

  8. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  9. Los Alamos National Security, LLC Los Alamos National Laboratory...

    Office of Environmental Management (EM)

    Security, LLC Los Alamos National Laboratory (LANL) Voluntary Protection Program (VPP) Assessment Los Alamos National Security, LLC Los Alamos National Laboratory (LANL) Voluntary...

  10. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  11. 2011 Annual Planning Summary for Health, Safety and Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Health, Safety and Security (HSS) 2011 Annual Planning Summary for Health, Safety and Security (HSS) The ongoing and projected Environmental Assessments and Environmental Impact ...

  12. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    SciTech Connect

    NSTec Radioactive Waste

    2010-10-12

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products.

  13. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  14. High voltage feedthrough bushing

    DOEpatents

    Brucker, John P.

    1993-01-01

    A feedthrough bushing for a high voltage diode provides for using compression sealing for all sealing surfaces. A diode assembly includes a central conductor extending through the bushing and a grading ring assembly circumferentially surrounding and coaxial with the central conductor. A flexible conductive plate extends between and compressively seals against the central conductor and the grading ring assembly, wherein the flexibility of the plate allows inner and outer portions of the plate to axially translate for compression sealing against the central conductor and the grading ring assembly, respectively. The inner portion of the plate is bolted to the central conductor for affecting sealing. A compression beam is also bolted to the central conductor and engages the outer portion of the plate to urge the outer portion toward the grading ring assembly to obtain compression sealing therebetween.

  15. Enterprise Assessments Targeted Review of Work Planning and Control at the Nevada National Security Site … October 2015

    Energy Saver

    and Fire Protection Systems Follow-up Review at the Savannah River Site - January 2016 | Department of Energy Salt Waste Processing Facility Construction Quality and Fire Protection Systems Follow-up Review at the Savannah River Site - January 2016 Enterprise Assessments Salt Waste Processing Facility Construction Quality and Fire Protection Systems Follow-up Review at the Savannah River Site - January 2016 February 2016 Follow-up Review of the Salt Waste Processing Systems and Fire

  16. Assessment Documents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project July 9,...

  17. Nuclear Security Enterprise | National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  18. Monitoring Current, Voltage and Power

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Monitoring Current, Voltage and Power in Photovoltaic Systems Anton Driesse 1 , Joshua S. ... New Mexico Abstract - Accurate photovoltaic system performance monitoring is ...

  19. Voltage Vehicles | Open Energy Information

    OpenEI (Open Energy Information) [EERE & EIA]

    distributor specializing in the full spectrum of electric vehicles (EV) and full-performance alternative fuel vehicles (AFV). References: Voltage Vehicles1 This article is a...

  20. Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions

    SciTech Connect

    Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

    2009-07-01

    The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

  1. Security Conditions

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Computer Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  4. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  5. Security Rulemaking

    Office of Environmental Management (EM)

    Program (WP) | Department of Energy Securing Clean, Domestic, Affordable Energy with Wind (Fact Sheet), Wind Program (WP) Securing Clean, Domestic, Affordable Energy with Wind (Fact Sheet), Wind Program (WP) This fact sheet provides a brief description of the Wind Energy Market and describes the U.S. Department of Energy's Wind Program research and development efforts. eere_wind_water.pdf (499.36 KB) More Documents & Publications Offshore Wind Projects Wind Program Accomplishments Wind

  6. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  7. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  8. Voltage sensor and dielectric material

    DOEpatents

    Yakymyshyn, Christopher Paul; Yakymyshyn, Pamela Jane; Brubaker, Michael Allen

    2006-10-17

    A voltage sensor is described that consists of an arrangement of impedance elements. The sensor is optimized to provide an output ratio that is substantially immune to changes in voltage, temperature variations or aging. Also disclosed is a material with a large and stable dielectric constant. The dielectric constant can be tailored to vary with position or direction in the material.

  9. Temperature controlled high voltage regulator

    DOEpatents

    Chiaro, Jr., Peter J.; Schulze, Gerald K.

    2004-04-20

    A temperature controlled high voltage regulator for automatically adjusting the high voltage applied to a radiation detector is described. The regulator is a solid state device that is independent of the attached radiation detector, enabling the regulator to be used by various models of radiation detectors, such as gas flow proportional radiation detectors.

  10. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  11. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) About / Our Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory

  12. Cyber Security Evaluation Tool

    SciTech Connect

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  13. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  14. frmac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    frmac Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset available on request by the Department of Homeland Security (DHS) and state and local agencies to respond to a nuclear or radiological incident. The FRMAC is an interagency organization with representation... Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management

  15. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    SciTech Connect

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST`s wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots.

  16. Low voltage nonprimary explosive detonator

    DOEpatents

    Dinegar, Robert H.; Kirkham, John

    1982-01-01

    A low voltage, electrically actuated, nonprimary explosive detonator is disclosed wherein said detonation is achieved by means of an explosive train in which a deflagration-to-detonation transition is made to occur. The explosive train is confined within a cylindrical body and positioned adjacent to low voltage ignition means have electrical leads extending outwardly from the cylindrical confining body. Application of a low voltage current to the electrical leads ignites a self-sustained deflagration in a donor portion of the explosive train which then is made to undergo a transition to detonation further down the train.

  17. DOE - NNSA/NFO -- National Security Template

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Homeland Security > FRMAC NNSANFO Language Options U.S. DOENNSA - Nevada Field Office Federal Radiological Monitoring and Assessment Center (FRMAC) FRMAC Exercise Photo The ...

  18. October 2013 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    computational models and NNSA's Advanced Simulation and Computing (ASC) Program to assess the safety, security and effectiveness of the stockpile. An extraordinary set of science, ...

  19. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  20. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  1. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  2. Defense Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is

  3. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Security Conditions

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  5. Oak Ridge Reservation Needs Assessment

    Office of Energy Efficiency and Renewable Energy (EERE)

    Needs Assessment for former Oak Ridge National Laboratory and Y-12 Nuclear Security Complex production workers.

  6. A Matter of Quantum Voltages

    SciTech Connect

    Sellner, Bernhard; Kathmann, Shawn M.

    2014-11-14

    Voltages inside matter are relevant to crystallization, materials science, biology, catalysis, and aqueous chemistry. Electron holography is able to measure the variation of voltages in matter and modern supercomputers allow the calculation of quantum voltages with practically unlimited spatial and temporal resolution of bulk systems. Of particular interest is the Mean Inner Potential (Vo) - the spatial average of these voltages. Voltages are very sensitive to the distribution of electrons and provide metrics to understand interactions in condensed phases. In the present study, we find excellent agreement with measurements of Vo for vitrified water and salt crystals and demonstrate the impact of covalent and ionic bonding as well as intermolecular/atomic interactions. Furthermore, we predict Vo as well as the fluctuations of these voltages in aqueous NaCl electrolytes and characterize the changes in their behavior as the resolution increases below the size of atoms. This work was supported by the U.S. Department of Energy, Office of Basic Energy Sciences, Division of Chemical Sciences, Geosciences & Biosciences. Pacific Northwest National Laboratory (PNNL) is a multiprogram national laboratory operated for DOE by Battelle. This research used resources of the National Energy Research Scientific Computing Center, which is supported by the Office of Science of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231.

  7. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  8. 2012 Annual Planning Summary for Health, Safety and Security

    Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2012 and 2013 within Health, Safety and Security.

  9. 2013 Annual Planning Summary for the Office of Secure Transportation

    Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2013 and 2014 within the Office of Secure Transportation.

  10. NREL: Measurements and Characterization - Current Versus Voltage

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    of devices, including: open-circuit voltage (Voc), short-circuit current (Isc), fill factor (FF), maximum power output of the device (Pmax), voltage at maximum power...

  11. Electronic security device

    DOEpatents

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  12. Electronic security device

    DOEpatents

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  13. October 4, 2010: Robot on Security Patrol | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4, 2010: Robot on Security Patrol October 4, 2010: Robot on Security Patrol October 4, 2010: Robot on Security Patrol October 4, 2010 The Department's National Nuclear Security Administration (NNSA) announces that the Nevada National Security Site (NNSS) has brought the first of three Mobile Detection Assessment Response System robots online to improve security patrols at remote portions of NNSS. The robots operate at speeds of up to 20 miles per hour and can go for more than half a day of

  14. Energy Security Council

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  15. ENERGY SUPPLY SECURITY 2014

    Energy.gov [DOE] (indexed site)

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  16. Tag: Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Tag: Security Displaying 1 - 7 of 7... Category: Security Integrating Safeguards, Security, & Emergency Services at CNS Lindy Pyatt, Y-12 S&S Performance Assurance Issues Management, assists Gannon Tucker, the CNS SS&ES change control administrator based at Pantex, with consolidating security's document control. More... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these instructions. More...

  17. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  18. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  20. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  1. Global Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    sector. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  2. GAP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    GAP Environmental Assessment for Gap Material Plutonium - Transport, Receipt, and Processing The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), has prepared this Environmental Assessment for Gap Material Plutonium - Transport, Receipt, and Processing to evaluate the potential environmental impacts associated with transporting plutonium from foreign

  3. radioactivity | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    radioactivity Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the various ways the NNSS contributes to the department's and NNSA's missions, including radiological... San Francisco Bay Area Aerial Radiation Assessment Survey (SAN JOSE and SAN FRANCISCO, California) - A helicopter

  4. National Security Science July 2014

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    July 2014 Also in this issue What's in the U.S. Nuclear Stockpile? Secrecy and Surveillance: Threats to National Security? July 2014 Los Alamos National Laboratory Los Alamos National Laboratory This issue presents three very personal and timely perspectives on current national security topics. The first perspective regards the events leading up to the birth of the Stockpile Stewardship Program and follows with a personal assessment of the program's current health. As seen by Joe Martz, a Los

  5. Validating Cyber Security Requirements: A Case Study

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  6. Eliminate Voltage Unbalance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Voltage Unbalance Eliminate Voltage Unbalance Voltage unbalance degrades the performance and shortens the life of a three-phase motor. Voltage unbalance at the motor terminals can cause current unbalance that is far out of proportion to the voltage unbalance. Unbalanced currents lead to torque pulsations, increased vibrations and mechanical stresses, increased losses resulting in lower efficiency, and motor overheating, which reduces winding insulation life. This tip sheet provides suggested

  7. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  8. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  9. High voltage MOSFET switching circuit

    DOEpatents

    McEwan, T.E.

    1994-07-26

    The problem of source lead inductance in a MOSFET switching circuit is compensated for by adding an inductor to the gate circuit. The gate circuit inductor produces an inductive spike which counters the source lead inductive drop to produce a rectangular drive voltage waveform at the internal gate-source terminals of the MOSFET. 2 figs.

  10. High voltage MOSFET switching circuit

    DOEpatents

    McEwan, Thomas E.

    1994-01-01

    The problem of source lead inductance in a MOSFET switching circuit is compensated for by adding an inductor to the gate circuit. The gate circuit inductor produces an inductive spike which counters the source lead inductive drop to produce a rectangular drive voltage waveform at the internal gate-source terminals of the MOSFET.

  11. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    legacy of nuclear Waste Management Snl is the only national laboratory that has ... Some of these applications include: * Environmental assessment of proposed hlW repository ...

  12. Security Notice | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  13. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  14. NERSC Computer Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  15. High voltage photovoltaic power converter

    DOEpatents

    Haigh, Ronald E.; Wojtczuk, Steve; Jacobson, Gerard F.; Hagans, Karla G.

    2001-01-01

    An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

  16. Cyber Security and Resilient Systems

    SciTech Connect

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  17. TRANSISTOR HIGH VOLTAGE POWER SUPPLY

    DOEpatents

    Driver, G.E.

    1958-07-15

    High voltage, direct current power supplies are described for use with battery powered nuclear detection equipment. The particular advantages of the power supply described, are increased efficiency and reduced size and welght brought about by the use of transistors in the circuit. An important feature resides tn the employment of a pair of transistors in an alternatefiring oscillator circuit having a coupling transformer and other circuit components which are used for interconnecting the various electrodes of the transistors.

  18. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  19. Enforcement Letter, Los Alamos National Security, LLC | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Energy Los Alamos National Security, LLC Enforcement Letter, Los Alamos National Security, LLC September 18, 2015 Security Enforcement Letter issued to Los Alamos National Security, LLC On September 18, 2015, the U.S. Department of Energy (DOE) Office of Enterprise Assessments' Office of Enforcement issued an Enforcement Letter (SEL-2015-02) to Los Alamos National Security, LLC relating to the unauthorized disclosure of classified information at the Los Alamos National Laboratory.

  20. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  1. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  2. Lessons about vulnerability assessments.

    SciTech Connect

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  3. National Nuclear Security Administration Los Alamos National

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Los Alamos National Security, LLC Fiscal Year 2014 Performance Evaluation Report (PER) NNSA Los Alamos Field Office Performance Period: October 2013 - September 2014 November 14, 2014 NA-LA November 14, 2014 Executive Summary This Performance Evaluation Report (PER) provides the assessment of Los Alamos National Security, LLC performance for the period of October 1, 2013 through September 30, 2014, as evaluated against the objectives defined in the Fiscal

  4. Sandia National Laboratories: National Security Missions: International

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Homeland and Nuclear Security: Cyber and Infrastructure Security Cyber and Infrastructure Security Cyber Infrastructure Image We assess physical and cyber vulnerabilities under a common risk-management framework. We conduct large-scale analyses to understand infrastructure interdependencies and guide efforts to improve resiliency. We develop technologies for preventing disruption and enhancing recovery in vital cyber systems. We are committed to working with U.S. government agencies to

  5. Integrated Safeguards and Security Management (ISSM) Policy

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-05-08

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  6. Incidents of Security Concern

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION ... Security; Office of Security Policy, GTNHS-51; 1000 Independence Ave., SW; Washington, DC ...

  7. Tag: security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    security Tag: security Displaying 1 - 10 of 13... Category: Employees & Retirees Tactical Response Force 1 graduation: a family reunion of sorts Family ties makes a fitting theme for Tactical Response Force 1 Class 3-16's graduation ceremony. More... Category: News Y-12 National Security Complex reopened Officials at the Y-12 National Security Complex have reopened the plant to employees following the early morning closure of Y-12 because of a law enforcement situation. More... Category:

  8. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security Meet a Machine: RPMs keep watch 24/7 to strengthen global nuclear security Ensuring that nuclear materials are not being illicitly moved is part of NNSA's core mission to reduce nuclear and radiological threats. However, since traditional security tools - such as metal detectors, X-ray scanners, and sniffer dogs - cannot measure radiation, frontline... U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA

  9. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where high-priority

  10. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    national security campus Kansas City National Security Campus volunteers help students with FIRST Robotics The FIRST Robotics competition in Kansas City, March 10-12, resembled a medieval battlefield as nearly 50 high school teams battled robot against robot to scale the opponent's defenses and capture their tower and flag. For the past 10 years, Kansas City National Security Campus employees have... Kansas City National Security Campus contractor and University of Kansas to collaborate on NNSA

  11. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  12. Advancing Global Nuclear Security

    Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  13. Information Technology Specialist (Security)

    Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  14. Personnel Security Specialist

    Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  19. BROADER National Security Missions

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  20. Personnel Security Activities

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  1. National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  2. AP1000 Design for Security

    SciTech Connect

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-07-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  3. Massachusetts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Massachusetts NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the

  4. arg | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    arg Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management Coordination HQ Emergency Management Team Responding to Emergencies Consequence Management First Responders Operations Render Safe Nuclear Forensics International... Accident Response Group NNSA's Accident Response Group (ARG) provides technical guidance and responds to U.S. nuclear weapons accidents. The team assists in assessing weapons damage and

  5. Environmental Security and Restoration | Argonne National Laboratory

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range

  6. Addressing Security and Reliability Concerns of Large Power Transformers |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy Services » Addressing Security and Reliability Concerns of Large Power Transformers Addressing Security and Reliability Concerns of Large Power Transformers Large power transformers (LPTs) are critical to the nation's power grid, with more than 90 percent of consumed power passing through high-voltage transformers at some point. LPTs, however, face a number of challenges that make them one of the most vulnerable components on the grid. They are expensive, difficult to

  7. Improve Motor Operation at Off-Design Voltages

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    These correspond to (but are about 4% lower than) standard service voltages. The voltage difference is established to allow for a reasonable line voltage drop between the ...

  8. Method for voltage-gated protein fractionation (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    Method for voltage-gated protein fractionation Title: Method for voltage-gated protein fractionation We report unique findings on the voltage dependence of protein exclusion from ...

  9. NOTICE: National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    47 1 April 2013 NOTICE: National Nuclear Security Administration ACTION: Finding of No Significant Impact; Environmental Assessment for the Transfer of the Kansas City Plant, Kansas City, Missouri (DOE/EA-1947) - Revision 1.0 DATE: June 29, 2016 1) CHANGED ACTION: Since the May 1, 2013 Finding of No Significant Impact (FONSI) and Environmental Assessment for the Transfer of the Kansas City Plant, Kansas City, Missouri (DOE/EA-1947; KCP EA), the proposed federal action has evolved and a decision

  10. boston | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    boston NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the... NNSA to conduct Aerial Radiation Assessment Survey over Boston Harbor BOSTON- A helicopter may be seen flying at low altitudes around Boston Harbor

  11. High voltage RF feedthrough bushing

    DOEpatents

    Grotz, Glenn F.

    1984-01-01

    Described is a multi-element, high voltage radio frequency bushing for trmitting RF energy to an antenna located in a vacuum container. The bushing includes a center conductor of complex geometrical shape, an outer coaxial shield conductor, and a thin-walled hollow truncated cone insulator disposed between central and outer conductors. The shape of the center conductor, which includes a reverse curvature portion formed of a radially inwardly directed shoulder and a convex portion, controls the uniformity of the axial surface gradient on the insulator cone. The outer shield has a first substantially cylindrical portion and a second radially inwardly extending truncated cone portion.

  12. VOLTAGE-CONTROLLED TRANSISTOR OSCILLATOR

    DOEpatents

    Scheele, P.F.

    1958-09-16

    This patent relates to transistor oscillators and in particular to those transistor oscillators whose frequencies vary according to controlling voltages. A principal feature of the disclosed transistor oscillator circuit resides in the temperature compensation of the frequency modulating stage by the use of a resistorthermistor network. The resistor-thermistor network components are selected to have the network resistance, which is in series with the modulator transistor emitter circuit, vary with temperature to compensate for variation in the parameters of the transistor due to temperature change.

  13. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  14. Low power, scalable multichannel high voltage controller

    DOEpatents

    Stamps, James Frederick; Crocker, Robert Ward; Yee, Daniel Dadwa; Dils, David Wright

    2008-03-25

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  15. Low power, scalable multichannel high voltage controller

    DOEpatents

    Stamps, James Frederick; Crocker, Robert Ward; Yee, Daniel Dadwa; Dils, David Wright

    2006-03-14

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  16. Environmental Assessment for the Transportation of Highly Enriched Uranium from the Russian Federation for the Y-12 National Security Complex and Finding of No Significant Impact

    SciTech Connect

    2004-01-01

    The United States (U.S.) Department of Energy (DOE) proposes to transport highly enriched uranium (HEU) from Russia to a secure storage facility in Oak Ridge, TN. This proposed action would allow the United States and Russia to accelerate the disposition of excess nuclear weapons materials in the interest of promoting nuclear disarmament, strengthening nonproliferation, and combating terrorism. The HEU would be used for a non-weapons purpose in the U.S. as fuel in research reactors performing solely peaceful missions.

  17. Personnel Security Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  18. Personnel Security Program Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  19. Office of Security Assistance

    Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  20. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  1. Office of Cyber Assessments | Department of Energy

    Energy Saver

    evaluation of the effectiveness of classified and unclassified computer security ... for assessing the security of DOE classified and unclassified networks through ...

  2. High voltage feed through bushing

    DOEpatents

    Brucker, J.P.

    1993-04-06

    A feed through bushing for a high voltage diode provides for using compression sealing for all sealing surfaces. A diode assembly includes a central conductor extending through the bushing and a grading ring assembly circumferentially surrounding and coaxial with the central conductor. A flexible conductive plate extends between and compressively seals against the central conductor and the grading ring assembly, wherein the flexibility of the plate allows inner and outer portions of the plate to axially translate for compression sealing against the central conductor and the grading ring assembly, respectively. The inner portion of the plate is bolted to the central conductor for affecting sealing. A compression beam is also bolted to the central conductor and engages the outer portion of the plate to urge the outer portion toward the grading ring assembly to obtain compression sealing therebetween.

  3. High voltage load resistor array

    DOEpatents

    Lehmann, Monty Ray

    2005-01-18

    A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

  4. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  5. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  6. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Summit Team members receive DOE Secretary Awards for nuclear security efforts This month NNSA team members received honors as part of the Secretary's Awards Program. The program, designed to recognize service and contributions of Department of Energy (DOE) employees to mission in benefit of the Nation, is comprised of several award types. The Secretary's Honor... U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future

  7. Wind Power Plant Voltage Stability Evaluation: Preprint

    SciTech Connect

    Muljadi, E.; Zhang, Y. C.

    2014-09-01

    Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

  8. Index of Energy Security Risk | Open Energy Information

    OpenEI (Open Energy Information) [EERE & EIA]

    for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website:...

  9. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  10. Evaluation of the Los Alamos National Security Emergency Operations...

    Office of Environmental Management (EM)

    and Emergency Management Evaluations Activity Report for the Evaluation of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment...

  11. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  12. Personnel Security Program | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    several key program areas including Defense, Nuclear Nonproliferation, Naval ... & Classification (OPFCC) is part of the NNSA, Office of Defense Nuclear Security. ...

  13. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. ...

  14. Secure Storage | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  15. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  16. International Nuclear Security | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    world-wide to improve the security of proliferation-sensitive materials, particularly ... Related Topics nopnproliferation R&D proliferation detection Related News Radiological ...

  17. PCS Security Technology Evaluation Tool

    Energy Science and Technology Software Center

    2007-01-30

    P-STET assists in the security technology decision making process from a costlbeneflt perspective. It aids in addressing such questions as whether to acquire and deploy new security technology, to re-configure an existing product or system, or to maintain status quo. P-STET offers both a qualitative and quantitative option. P-STET is most efficient when tailored to an organization’s security cost/benefit environment. It then serves as both a guide to show what types of security questions shouldmore » be addressed and as a means to analyze the data gathered from the questions to make an informed decision. The quantitative option provides a straightforward way to express costs/benefits in terms of dollars. It relies on the organization to quantify benefits or cost avoidances, and, therefore, best serves as a guide to ensure various cost and benefit angles are evaluated. The qualitative option allows the organization to assess costs by levels with respect to security and PCS budgets, operational impacts, and opportunity costs. Benefits are represented in terms of improvements to the organization’s operations and are also assessed by levels with respect to some benchmark such as compliance with best practices. Results are displayed graphically using radar charts, allowing the user to make a more intuitive decision. The shaded area of each chart represents the overall cost and benefit of the security investment. A good investment is denoted when the ratio of benefit shaded area to cost shaded area is large.« less

  18. Group 3: Humidity, Temperature, and Voltage (Presentation)

    SciTech Connect

    Wohlgemuth, J.

    2013-05-01

    Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  19. Using safety tools to improve security

    SciTech Connect

    Pond, D. J.

    2003-01-01

    Human error assessment and other safety analysis tools reveal that worker errors contributing to or resulting in accidents are often the consequence of ineffective system conditions, process features, or individual employee characteristics. At Los Alamos National Laboratory (LANL), a team of security, safety, human error, and organizational experts considered whether the system-induced human errors that make accidents more likely could also be contributing factors to security incidents. Because our review of more than 100 such incidents suggests they can and do, LANL has adapted error assessment tools and reduction techniques for application to security tasks and operations. Safety professionals--especially those with human error assessment and mitigation expertise--have the knowledge and skills needed to apply these tools in enhancing security in their own organizations.

  20. Security - DOE Directives, Delegations, and Requirements

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security by Website Administrator Back

  1. Security Communications Protocol Ad Hoc Working Group | Department of

    Office of Environmental Management (EM)

    Securing Wide Area Measurement Systems Securing Wide Area Measurement Systems This report documents an assessment of wide area measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. With emphasis on cyber security, this report also addresses other categories of risk and vulnerability including equipment reliability, data

  2. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Securing Wide Area Measurement Systems Securing Wide Area Measurement Systems This report documents an assessment of wide area measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. With emphasis on cyber security, this report also addresses other categories of risk and vulnerability including equipment reliability, data

  3. Enforcement Letter, National Security Technologies, LLC | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Energy February 22, 2016 Worker Safety and Health Enforcement Letter issued to National Security Technologies, LLC On February 22, 2016, the U.S. Department of Energy Office of Enterprise Assessments' Office of Enforcement issued an Enforcement Letter (WEL-2016-01) to National Security Technologies, LLC for deficiencies associated with the improper storage of hazardous chemicals that caused a fire in a waste drum at the Nevada National Security Site. Enforcement Letter, National Security

  4. Enforcement Regulations and Directives - Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified Information Security Violations 10 C.F.R Part 1016 - Safeguarding of Restricted Data 10 C.F.R Part 1045 - Nuclear Classification and Declassification DOE Directives and NNSA Policy Letters Enforceable under 10 C.F.R. Part 824

  5. Cyber security best practices for the nuclear industry

    SciTech Connect

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  6. Mr. James L. Holt President National Security Technologies, LLC

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    22, 2016 Mr. James L. Holt President National Security Technologies, LLC P.O. Box 98521, NSF001 Las Vegas, Nevada 89193-8521 WEL-2016-01 Dear Mr. Holt: The Office of Enterprise Assessments' Office of Enforcement has completed an evaluation of a chemical waste drum fire at the National Nuclear Security Administration's Nevada National Security Site (NNSS) on June 24, 2015, as reported by National Security Technologies, LLC (NSTec) into the Department of Energy's (DOE) Noncompliance Tracking

  7. NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for

  8. V-008: Debian Security Advisory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply,

  9. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy Administrator for Defense Nuclear Nonproliferation (DNN), David Huizenga, participated in a ceremony commemorating the transition of a radiation detection system at the Port of Yangshan to the General

  10. Independent Oversight Review, Nevada Site Office and National Security Technologies, LLC- November 2011

    Energy.gov [DOE]

    Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment

  11. Wide-range voltage modulation

    SciTech Connect

    Rust, K.R.; Wilson, J.M.

    1992-06-01

    The Superconducting Super Collider`s Medium Energy Booster Abort (MEBA) kicker modulator will supply a current pulse to the abort magnets which deflect the proton beam from the MEB ring into a designated beam stop. The abort kicker will be used extensively during testing of the Low Energy Booster (LEB) and the MEB rings. When the Collider is in full operation, the MEBA kicker modulator will abort the MEB beam in the event of a malfunction during the filling process. The modulator must generate a 14-{mu}s wide pulse with a rise time of less than 1 {mu}s, including the delay and jitter times. It must also be able to deliver a current pulse to the magnet proportional to the beam energy at any time during ramp-up of the accelerator. Tracking the beam energy, which increases from 12 GeV at injection to 200 GeV at extraction, requires the modulator to operate over a wide range of voltages (4 kV to 80 kV). A vacuum spark gap and a thyratron have been chosen for test and evaluation as candidate switches for the abort modulator. Modulator design, switching time delay, jitter and pre-fire data are presented.

  12. Voltage regulation in linear induction accelerators

    DOEpatents

    Parsons, William M.

    1992-01-01

    Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

  13. Voltage regulation in linear induction accelerators

    DOEpatents

    Parsons, W.M.

    1992-12-29

    Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

  14. Nevada National Security Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  15. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  16. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  17. Office of Information Security

    Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  18. Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  19. Flexible method for monitoring fuel cell voltage

    DOEpatents

    Mowery, Kenneth D.; Ripley, Eugene V.

    2002-01-01

    A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

  20. Non-contact current and voltage sensor

    DOEpatents

    Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

    2014-03-25

    A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

  1. Corona and Motor Voltage Interim Report

    SciTech Connect

    Hsu, J.S.

    2005-05-06

    It has been suggested that to meet the FreedomCAR objectives for cost, size, weight, efficiency, and reliability higher buss voltages be utilized in HEV and FC automotive applications. The reasoning is that since electric power is equal to the product of voltage and current for a given power a higher voltage and lower current would result in smaller cable and inverter switching components. Consequently, the system can be lighter and smaller. On the other hand, higher voltages are known to require better and thicker electrical insulation that reduce the available slot area for motor windings. One cause of slow insulation breakdown is corona that gradually erodes the insulation and shortens the life expectancy of the motor. This study reports on the results of a study on corona initiating voltages for mush-wound and bobbin-wound stators. A unique testing method is illustrated.

  2. Voltage controlled spintronic devices for logic applications

    DOEpatents

    You, Chun-Yeol; Bader, Samuel D.

    2001-01-01

    A reprogrammable logic gate comprising first and second voltage-controlled rotation transistors. Each transistor comprises three ferromagnetic layers with a spacer and insulating layer between the first and second ferromagnetic layers and an additional insulating layer between the second and third ferromagnetic layers. The third ferromagnetic layer of each transistor is connected to each other, and a constant external voltage source is applied to the second ferromagnetic layer of the first transistor. As input voltages are applied to the first ferromagnetic layer of each transistor, the relative directions of magnetization of the ferromagnetic layers and the magnitude of the external voltage determines the output voltage of the gate. By altering these parameters, the logic gate is capable of behaving as AND, OR, NAND, or NOR gates.

  3. Global Security 2009

    Office of Environmental Management (EM)

    ... Management *Data Loss Prevention *Audit ability *OI & CS Technology Platforms *Big Data *Analytics *Monitoring *Cyber Security *Intelligence *Hyper Innovation Global ...

  4. Personnel Security Program Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  5. National Security Science Archive

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    NSS Archive National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Archive National Security Science magazine showcases the importance, breadth, and depth of the Laboratory's scientific and technical work that is used to solve key challenges to U.S. national security. NSS April 2016 April 2016 viewer | web | print NSS July 2014 July 2015 viewer | web | print NSS July 2014 December 2014 viewer | web | print NSS July 2014 July 2014 viewer | web

  6. radiation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    radiation NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through March 24, the

  7. helicopter | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    helicopter NNSA to Conduct Aerial Radiation Monitoring Survey Over Philadelphia July 18-20 Philadelphia - On July 18 through July 20, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Philadelphia to measure naturally occurring background radiation in support of the Democratic National... NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department

  8. Security of databases

    SciTech Connect

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  9. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  10. Headquarters Facilities Master Security Plan - Chapter 10, Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Awareness Program | Department of Energy 0, Security Awareness Program Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program 2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program This chapter covers all the security awareness briefings conducted at HQ. The following security briefings are required for all HQ Federal employees and contractors: an Initial Security Briefing, which is given when a new employee starts work; the

  11. Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection

    DOEpatents

    Wood, Charles B.

    1992-01-01

    A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

  12. Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection

    DOEpatents

    Wood, C.B.

    1992-12-15

    A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

  13. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. Tag: global security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    global security Tag: global security Displaying 1 - 10 of 23... Category: Global Security Additive Manufacturing Y-12's machining expertise complements our ability to produce additive manufacturing tooling and components. More... Category: Global Security Technologies and Research Capabilities We're furthering research and development of additive manufacturing in national security applications. More... Category: Global Security Alarm Response Training Academy celebrates an anniversary Alarm

  15. Safety and Security Enforcement Coordinator Handbook

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK APRIL 2015 Office of Enforcement Office of Enterprise Assessments U.S. Department of Energy Table of Contents Ensure use of the current version of this document by checking the Office of Enterprise Assessments website at: http://energy.gov/ea/services/enforcement/enforcement-program-and- process-guidance-and-information Acronyms

  16. Electro-optical voltage sensor head

    DOEpatents

    Woods, Gregory K.

    1998-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  17. Electro-optical voltage sensor head

    DOEpatents

    Woods, G.K.

    1998-03-24

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 6 figs.

  18. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  19. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  20. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  1. Sandia Energy - Installation Energy Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  2. Cyber Security Requirements for Risk Management

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  3. Situated Usability Testing for Security Systems

    SciTech Connect

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  4. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  5. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  6. Electro-optic high voltage sensor

    DOEpatents

    Davidson, James R.; Seifert, Gary D.

    2003-09-16

    A small sized electro-optic voltage sensor capable of accurate measurement of high voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation. A polarization beam displacer separates the input beam into two beams with orthogonal linear polarizations and causes one linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels effect elliptically polarizes the beam as it travels through the crystal. A reflector redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization. The system may include a detector for converting the output beams into electrical signals and a signal processor for determining the voltage based on an analysis of the output beams.

  7. High-voltage-compatible, fully depleted CCDs

    SciTech Connect

    Holland, Stephen E.; Bebek, Chris J.; Dawson, Kyle S.; Emes, JohnE.; Fabricius, Max H.; Fairfield, Jessaym A.; Groom, Don E.; Karcher, A.; Kolbe, William F.; Palaio, Nick P.; Roe, Natalie A.; Wang, Guobin

    2006-05-15

    We describe charge-coupled device (CCD) developmentactivities at the Lawrence Berkeley National Laboratory (LBNL).Back-illuminated CCDs fabricated on 200-300 mu m thick, fully depleted,high-resistivity silicon substrates are produced in partnership with acommercial CCD foundry.The CCDs are fully depleted by the application ofa substrate bias voltage. Spatial resolution considerations requireoperation of thick, fully depleted CCDs at high substrate bias voltages.We have developed CCDs that are compatible with substrate bias voltagesof at least 200V. This improves spatial resolution for a given thickness,and allows for full depletion of thicker CCDs than previously considered.We have demonstrated full depletion of 650-675 mu m thick CCDs, withpotential applications in direct x-ray detection. In this work we discussthe issues related to high-voltage operation of fully depleted CCDs, aswell as experimental results on high-voltage-compatible CCDs.

  8. Low voltage arc formation in railguns

    DOEpatents

    Hawke, Ronald S.

    1987-01-01

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  9. Low voltage arc formation in railguns

    DOEpatents

    Hawke, R.S.

    1985-08-05

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  10. Low voltage arc formation in railguns

    DOEpatents

    Hawke, R.S.

    1987-11-17

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

  11. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  12. Assessing

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Assessing dental disease in minutes Understanding climate change Keeping watch on the world SPRING 2007 S A N D I A T E C H N O L O G Y A Q UA RT E R LY R E S E A R C H & D E V E LO P M E N T MAG A Z I N E - VO LUM E 9 , N O. 1 Sandia Technology (ISSN: 1547-5190) is a quarterly maga- zine published by Sandia National Laboratories. Sandia is a multiprogram engineering and science laboratory operated by Sandia Corporation, a Lockheed Martin company, for the Department of Energy. With main

  13. Assessment

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Assessment of the Surveillance Program of the High-Level Waste Storage Tanks at Hanford :.~I LALI i~E REJ 163 ROOM 1t 4 F77L.~ ~ -_77 .:earmn OfEeg Asitn Sertr fo niomn 4 z. r _________ rment of the Surveilance Prograrn of the High-Level Storage- Tanks at Hanford P. E WOOD Robert J. Catln, Deputy Directat - Office of Environmental Compliance and Overview Office of Environment MARCH 1980 Report to the U.S. Departrent of Energy Assistant Secretary for Environment Washkngon, DC C March 27, 1980

  14. System for increasing corona inception voltage of insulating oils

    DOEpatents

    Rohwein, Gerald J.

    1998-01-01

    The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil.

  15. Application of Automated Controls for Voltage and Reactive Power...

    Energy.gov [DOE] (indexed site)

    ... As feeder loads increase, LTCs can increase voltage levels to account for the larger voltage drop along the feeder caused by the higher load. Voltage regulators can also increase ...

  16. Constant voltage electro-slag remelting control

    DOEpatents

    Schlienger, M.E.

    1996-10-22

    A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an electrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable. 1 fig.

  17. Constant voltage electro-slag remelting control

    SciTech Connect

    Schlienger, Max E.

    1996-01-01

    A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an eletrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable.

  18. Joint voltages resulting from lightning currents.

    SciTech Connect

    Johnson, William Arthur; Warne, Larry Kevin; Merewether, Kimball O.; Chen, Kenneth C.

    2007-03-01

    Simple formulas are given for the interior voltages appearing across bolted joints from exterior lightning currents. External slot and bolt inductances as well as internal slot and bolt diffusion effects are included. Both linear and ferromagnetic wall materials are considered. A useful simplification of the slot current distribution into linear stripline and cylindrical parts (near the bolts) allows the nonlinear voltages to be estimated in closed form.

  19. Spark gap with low breakdown voltage jitter

    DOEpatents

    Rohwein, Gerald J.; Roose, Lars D.

    1996-01-01

    Novel spark gap devices and electrodes are disclosed. The novel spark gap devices and electrodes are suitable for use in a variety of spark gap device applications. The shape of the electrodes gives rise to local field enhancements and reduces breakdown voltage jitter. Breakdown voltage jitter of approximately 5% has been measured in spark gaps according the invention. Novel electrode geometries and materials are disclosed.

  20. Spark gap with low breakdown voltage jitter

    DOEpatents

    Rohwein, G.J.; Roose, L.D.

    1996-04-23

    Novel spark gap devices and electrodes are disclosed. The novel spark gap devices and electrodes are suitable for use in a variety of spark gap device applications. The shape of the electrodes gives rise to local field enhancements and reduces breakdown voltage jitter. Breakdown voltage jitter of approximately 5% has been measured in spark gaps according the invention. Novel electrode geometries and materials are disclosed. 13 figs.

  1. Group 3: Humidity, Temperature, and Voltage

    Energy.gov [DOE]

    This PowerPoint presentation, focused on humidity, temperature and voltage testing, was originally presented by John Wohlgemuth at the NREL 2013 PV Module Reliability Workshop on Feb. 26-27, 2013 in Denver, CO. It summarizes the activities of a working group chartered to develop accelerated stress tests that can be used as comparative predictors of module life versus stresses associated with humidity, temperature and voltage.

  2. 2013 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada; Review of the Performance Assessments and Composite Analyses

    SciTech Connect

    Shott, Gregory

    2014-03-01

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2013. This annual summary report presents data and conclusions from the FY 2013 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2013 include the following: • Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2013 • Evaluation of new or revised waste streams by special analysis • Development of version 4.115 of the Area 5 RWMS GoldSim PA/CA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2013 review of operations

  3. High-voltage miniature igniter development

    SciTech Connect

    Willkens, C.A.; Axelson, S.R.; Bateman, L.S.; Croucher, D.D.

    1996-09-01

    In 1988, Norton introduced its line of low-voltage 12- and 24-V miniature igniters made from a patented ceramic/intermetallic material. These igniters demonstrated superior strength and speed in a compact low-wattage assembly for gas-fired ignition. High-voltage igniters are being developed to complete the family of igniters for gas-fired ignition. These igniters have extremely low power requirements in the range of 50--100 W, are designed to operate at line voltages of 120 V, and are leading to designs for operation up to 230 V. These were developed using compositional and dimensional changes to the low voltage igniters. The 120 V igniter has exceeded 200,000 cycles in life testing and has been submitted for agency approval. These igniters are also undergoing field testing in various demanding gas-fired appliances. The evolution of the low-voltage igniter into the high-voltage model, as well as performance and material development issues are discussed.

  4. MEDIUM VOLTAGE INTEGRATED DRIVE AND MOTOR | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    MEDIUM VOLTAGE INTEGRATED DRIVE AND MOTOR MEDIUM VOLTAGE INTEGRATED DRIVE AND MOTOR Calnetix Technologies - Cerritos, CA This project will focus on integrating a high voltage SiC device with advanced high-speed machine technology, medium voltage stators, high efficiency magnetic bearings and sensor high frequency drive technology that can work directly with high voltages, switch at high frequencies for low machine losses, and do so very efficiently. The new medium voltage motors are expected to

  5. Modular high voltage power supply for chemical analysis

    DOEpatents

    Stamps, James F.; Yee, Daniel D.

    2007-01-09

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  6. Modular high voltage power supply for chemical analysis

    DOEpatents

    Stamps, James F.; Yee, Daniel D.

    2010-05-04

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  7. Modular high voltage power supply for chemical analysis

    DOEpatents

    Stamps, James F.; Yee, Daniel D.

    2008-07-15

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  8. Effects of moisture on the life of power plant cables: Part 1, Medium-voltage cables; Part 2, Low-voltage cables. Final report

    SciTech Connect

    Toman, G.J.; Morris, G.W.; Holzman, P.

    1994-08-01

    Motivated by the concern that in-service moisture may decrease the useful life of medium and low-voltage electrical cables in power plants, EPRI investigators surveyed plant operators, examined cable failure experience, and assessed the need to develop unproved life prediction techniques. The survey revealed that only 34 medium-voltage cable failures have occurred in the more than 1000 plant-years of experience represented. In addition, moisture effects such as voltage-induced water-freeing have not been the primary cause of the failures but are one contributor among several, including manufacturing defects, installation damage, and inadvertent damage to cable by field equipment the study concludes that medium-voltage cables are rehable and there is insufficient interest on the part of surveyed utilities to warrant further R&D on cable condition evaluation techniques at this time. In addition, moisture-related degradation is not a significant concern for low-voltage cables. This two-part report discusses,the limitations of existing cable field testing techniques and highlights measures for maximizing the useful life of medium- and low-voltage power plant cables.

  9. Headquarters Facilities Master Security Plan - Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy , Physical Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security 2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security This chapter covers the procedures adopted by HQ to implement directives governing the physical protection of U.S security interests. These procedures include control of employee and visitor access to HQ buildings, detection and control of dangerous devices, issuance of security badges to HQ

  10. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  11. National Security, Weapons Science

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Safety National Security & Safety In the video above, three veterans discuss how the skills they learned in the service are helping them advance energy security and grow the clean energy economy. The veterans shared their experiences at a Champions of Change event at the White House. | Video by Matty Greene, Energy Department. The Energy Department plays an important and multifaceted role in protecting national security. In addition to our work to increase nuclear nonproliferation and ensure

  12. Energy Security/Resiliency

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security/Resiliency Energy Security is "having assured access to reliable supplies of energy and the ability to protect and deliver sufficient energy to meet mission essential requirements" - FY2012, National Defense Authorization Act (NDAA) Resiliency is "the ability to anticipate, prepare for, and adapt to changing conditions and withstand, respond to, and recover rapidly from disruptions" - E.O. 13653 Key elements of Energy Security/Resiliency Planning Energy

  13. National Security Science

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Science National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear weapons and in science for national and global security April 2016 july 2015 The Hurt-Locker School Explosive Results Questing for the Holy Grail of High Explosives Learning from (Near) Disaster A Safer Liftoff Shake, Rattle, and Roll Manhattan Project National Historical Park Strategic Deterrent Forces Charting a

  14. ,"Geographic Area",,,"Voltage",,,"Capacity ","In-Service",,"Electrical...

    Energy Information Administration (EIA) (indexed site)

    ...,"Voltage",,,"Capacity ","In-Service",,"Electrical Connection Locations",,"Line ...,"Voltage",,,"Capacity ","In-Service",,"Electrical Connection Locations",,"Line ...

  15. Electrochemical Characterization of Voltage Fade in LMR-NMC cells...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Characterization of Voltage Fade in LMR-NMC cells Electrochemical Characterization of Voltage Fade in LMR-NMC cells 2013 DOE Hydrogen and Fuel Cells Program and Vehicle ...

  16. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Citation Details In-Document Search Title: High-Voltage Solid Polymer Batteries for Electric ...

  17. VPhase plc formerly Energetix Voltage Control | Open Energy Informatio...

    OpenEI (Open Energy Information) [EERE & EIA]

    VPhase plc formerly Energetix Voltage Control Jump to: navigation, search Name: VPhase plc formerly Energetix Voltage Control Place: Capenhurst, United Kingdom Zip: CH1 6EH...

  18. Multilevel cascade voltage source inverter with seperate DC sources...

    Office of Scientific and Technical Information (OSTI)

    Multilevel cascade voltage source inverter with seperate DC sources Citation Details In-Document Search Title: Multilevel cascade voltage source inverter with seperate DC sources ...

  19. Towards First Principles prediction of Voltage Dependences of...

    Office of Scientific and Technical Information (OSTI)

    Towards First Principles prediction of Voltage Dependences of ElectrolyteElectrolyte ... Title: Towards First Principles prediction of Voltage Dependences of Electrolyte...

  20. Multilevel cascade voltage source inverter with seperate DC sources...

    Office of Scientific and Technical Information (OSTI)

    Multilevel cascade voltage source inverter with seperate DC sources Citation Details In-Document Search Title: Multilevel cascade voltage source inverter with seperate DC sources A ...

  1. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Energy.gov [DOE] (indexed site)

    More Documents & Publications High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Vehicle Technologies Office Merit Review 2014: High-Voltage Solid Polymer Batteries ...

  2. Voltage Quench Dynamics of a Kondo System (Journal Article) ...

    Office of Scientific and Technical Information (OSTI)

    Voltage Quench Dynamics of a Kondo System This content will become publicly available on January 18, 2017 Prev Next Title: Voltage Quench Dynamics of a Kondo System Authors: ...

  3. SecuritySmart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  4. National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  5. Sandia Energy - Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  6. Oil Security Metrics Model

    SciTech Connect

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  7. Cyber and Physical Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  8. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  9. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  10. Supervisory Industrial Security Specialist

    Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  11. Sandia Energy - Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  12. Cyber Security Architecture Guidelines

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  13. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  14. Provision of mobile and man-portable radiation detection equipment;
  15. Regional cooperation on safeguards...

  16. National Security Education Center

    SciTech Connect

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  17. Supervisory Security Specialist

    Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  18. Security | Department of Energy

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... that establishes the policies and procedures for a Human Reliability Program (HRP) in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). ...

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  20. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  21. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  22. Security Administration Production Office,

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  1. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  2. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  3. Enterprise Assessments Targeted Review, Work Planning and Control...

    Energy Saver

    Work Planning and Control at the Nevada National Security Site - October 2015 Enterprise Assessments Targeted Review, Work Planning and Control at the Nevada National Security Site ...

  4. Enterprise Assessments Targeted Review of the Fire Protection...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    National Security Complex and Pantex Plant - October 2015 Enterprise Assessments Targeted Review of the Fire Protection Program at Y-12 National Security Complex and Pantex Plant - ...

  5. Computer security plan development using an expert system

    SciTech Connect

    Hunteman, W.J. ); Evans, R.; Brownstein, M.; Chapman, L. )

    1990-01-01

    The Computer Security Plan Assistant (SPA) is an expert system for reviewing Department of Energy (DOE) Automated Data Processing (ADP) Security Plans. DOE computer security policies require ADP security plans to be periodically reviewed and updated by all DOE sites. SPA is written in XI-Plus, an expert system shell. SPA was developed by BDM International, Inc., under sponsorship by the DOE Center for Computer Security at Los Alamos National Laboratory. SPA runs on an IBM or compatible personal computer. It presents a series of questions about the ADP security plan being reviewed. The SPA user references the ADP Security Plan and answers the questions. The SPA user reviews each section of the security plan, in any order, until all sections have been reviewed. The SPA user can stop the review process after any section and restart later. A Security Plan Review Report is available after the review of each section of the Security Plan. The Security Plan Review Report gives the user a written assessment of the completeness of the ADP Security Plan. SPA is being tested at Los Alamos and will soon be available to the DOE community.

  6. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  7. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  8. Information Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  9. CIOs Uncensored: Security Smarts.

    SciTech Connect

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  10. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  11. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  12. Information Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  13. High voltage testing for the Majorana Demonstrator

    DOE PAGES [OSTI]

    Abgrall, N.; Arnquist, I. J.; Avignone, III, F. T.; Barabash, A. S.; Bertrand, F. E.; Bradley, A. W.; Brudanin, V.; Busch, M.; Buuck, M.; Byram, D.; et al

    2016-04-04

    The Majorana Collaboration is constructing the Majorana Demonstrator, an ultra-low background, 44-kg modular high-purity Ge (HPGe) detector array to search for neutrinoless double-beta decay in 76Ge. The phenomenon of surface micro-discharge induced by high-voltage has been studied in the context of the Majorana Demonstrator. This effect can damage the front-end electronics or mimic detector signals. To ensure the correct performance, every high-voltage cable and feedthrough must be capable of supplying HPGe detector operating voltages as high as 5 kV without exhibiting discharge. R&D measurements were carried out to understand the testing system and determine the optimum design configuration of themore » high-voltage path, including different improvements of the cable layout and feedthrough flange model selection. Every cable and feedthrough to be used at the Majorana Demonstrator was characterized and the micro-discharge effects during the Majorana Demonstrator commissioning phase were studied. Furthermore, a stable configuration has been achieved, and the cables and connectors can supply HPGe detector operating voltages without exhibiting discharge.« less

  14. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  15. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  16. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  17. Sandia National Laboratories: National Security Missions: Defense Systems

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  18. Intelligent mobile security systems

    SciTech Connect

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  19. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  20. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  1. Design of a physical security perimeter fencing system.

    SciTech Connect

    Mack, Thomas Kimball; Ross, Michael P.; Lin, Han Wei

    2010-10-01

    Design of a physical security perimeter fencing system requires that security designers provide effective detection, delay, and response functionalities with minimal nuisance alarms. In addition, the designers must take into considerations the security fence system life cycle cost (equipment and grounds maintenance), complexity of the terrain, safety, and environmental conditions (location of where the security fence will be installed). Often, these factors drive the security designers to design a perimeter intrusion detection and assessment system (PIDAS) that includes: (1) larger than desired footprint, (2) one or more animal control fences to minimize the nuisance alarm rate (NAR), and (3) clear zones and an isolation zone to facilitate intrusion detection and assessment by keeping the fence lines clear of vegetation, trash, and other objects that could impede the security system's performance. This paper presents a two-tier PIDAS design that focuses on effective performance specifically in high probability of detection and low NAR that minimizes cost and the footprint of the system.

  2. Principles of ground relaying for high voltage and extra high voltage transmission lines

    SciTech Connect

    Griffin, C.H.

    1983-02-01

    This paper is a tutorial discussion of the basic principles of ground relaying for high voltage and extra high voltage transmission lines. Three different HV configurations are considered: Long lines, lines with a weak mid-point station, and mutually-coupled lines. Application criteria for EHV circuits are also discussed, and specific setting calculations are included where appropriate.

  3. ESR melting under constant voltage conditions

    SciTech Connect

    Schlienger, M.E.

    1997-02-01

    Typical industrial ESR melting practice includes operation at a constant current. This constant current operation is achieved through the use of a power supply whose output provides this constant current characteristic. Analysis of this melting mode indicates that the ESR process under conditions of constant current is inherently unstable. Analysis also indicates that ESR melting under the condition of a constant applied voltage yields a process which is inherently stable. This paper reviews the process stability arguments for both constant current and constant voltage operation. Explanations are given as to why there is a difference between the two modes of operation. Finally, constant voltage process considerations such as melt rate control, response to electrode anomalies and impact on solidification will be discussed.

  4. Compact high voltage solid state switch

    DOEpatents

    Glidden, Steven C.

    2003-09-23

    A compact, solid state, high voltage switch capable of high conduction current with a high rate of current risetime (high di/dt) that can be used to replace thyratrons in existing and new applications. The switch has multiple thyristors packaged in a single enclosure. Each thyristor has its own gate drive circuit that circuit obtains its energy from the energy that is being switched in the main circuit. The gate drives are triggered with a low voltage, low current pulse isolated by a small inexpensive transformer. The gate circuits can also be triggered with an optical signal, eliminating the trigger transformer altogether. This approach makes it easier to connect many thyristors in series to obtain the hold off voltages of greater than 80 kV.

  5. Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics

    SciTech Connect

    Liu, E.; Bebic, J.

    2008-02-01

    This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

  6. National Security Technology Center | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Global Security / Security and Training / National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities section, which includes a printable fact sheet, for more about what we can do and how we can accomplish it. For specific examples of security devices currently in development or already deployed, explore the new technologies section. Several of our innovative technologies have received recent media coverage focusing on

  7. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  8. Headquarters Facilities Master Security Plan - Chapter 7, Surveys and

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Reviews | Department of Energy 7, Surveys and Reviews Headquarters Facilities Master Security Plan - Chapter 7, Surveys and Reviews 2016 Headquarters Facilities Master Security Plan - Chapter 7, Surveys and Reviews This chapter covers the HQ Security Survey Program, which has two primary functions. First, survey team members assist HQ program elements in establishing, maintaining, and deactivating their LAs, VTRs, and TLAs. Second, the survey team conducts an annual assessment of how well

  9. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  10. Electronic circuit for measuring series connected electrochemical cell voltages

    DOEpatents

    Ashtiani, Cyrus N.; Stuart, Thomas A.

    2000-01-01

    An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

  11. Tag: Global Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  12. Office of Radiological Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  13. Y-12 National Security Campus | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  14. Safeguards and Security and Cyber Security RM | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. Safeguards and Security and Cyber Security RM (2.31 MB) More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 Standard Review Plan -

  15. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Saver

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  16. Experimental validation of a high voltage pulse measurement method.

    SciTech Connect

    Cular, Stefan; Patel, Nishant Bhupendra; Branch, Darren W.

    2013-09-01

    This report describes X-cut lithium niobates (LiNbO3) utilization for voltage sensing by monitoring the acoustic wave propagation changes through LiNbO3 resulting from applied voltage. Direct current (DC), alternating current (AC) and pulsed voltage signals were applied to the crystal. Voltage induced shift in acoustic wave propagation time scaled quadratically for DC and AC voltages and linearly for pulsed voltages. The measured values ranged from 10 - 273 ps and 189 ps 2 ns for DC and non-DC voltages, respectively. Data suggests LiNbO3 has a frequency sensitive response to voltage. If voltage source error is eliminated through physical modeling from the uncertainty budget, the sensors U95 estimated combined uncertainty could decrease to ~0.025% for DC, AC, and pulsed voltage measurements.

  17. Departmental Cyber Security Management Policy

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  18. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  19. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  20. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  1. Security Enforcement Documents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Enforcement Documents Security Enforcement Documents Documents Available for Download September 8, 2016 Enforcement Letter, Sandia Corporation Security Enforcement Letter issued to Sandia Corporation regarding two classified information security incidents September 23, 2015 Enforcement Letter, Los Alamos National Security, LLC Security Enforcement Letter issued to Los Alamos National Security, LLC July 31, 2015 Final Notice of Violation, Los Alamos National Security, LLC Security

  2. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  3. Voluntary Protection Program Onsite Review, National Security...

    Energy.gov [DOE] (indexed site)

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  4. PIA - Richland Personal Security Clearance Record | Department...

    Energy Saver

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  5. Office of Cyber Assessments - Report Titles | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Cyber Assessments - Report Titles Office of Cyber Assessments - Report Titles 2016 Independent Assessment of the Cyber Security Program at the Special Technologies Laboratory Field Intelligence Element, March 2016 (OUO) Independent Assessment of the Classified Cyber Security Program at the Pantex Plant, April 2016 (OUO) Independent Assessment of the Cyber Security Program at the Pantex Plant Field Intelligence Element, April 2016 (OUO) Independent Assessment of the Cyber Security Program of the

  6. Sacramento Area Voltage Support Draft Environmental Impact Statement

    SciTech Connect

    N /A

    2002-11-15

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  7. Sacramento Area Voltage Support Final Environmental Impact Statement

    SciTech Connect

    N /A

    2003-09-19

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  8. 2012 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    SciTech Connect

    Shott, G.

    2013-03-18

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2012. This annual summary report presents data and conclusions from the FY 2012 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2012 include the following: Release of a special analysis for the Area 3 RWMS assessing the continuing validity of the PA and CA; Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2012; Evaluation of new or revised waste streams by special analysis; and Development of version 4.114 of the Area 5 RWMS GoldSim PA model. The Area 3 RWMS has been in inactive status since

  9. PRIVACY/SECURITY NOTICE

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  10. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  11. Safeguards and Security Inspection and Assessment Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1992-06-23

    Cancels DOE O 5630.12. Parargaph 7c(6), 7c(7), 7c(8)(a), and 7g (8)(f) are canceled by DOE O 231.1 dated 9-30-1995.

  12. Predictive Dynamic Security Assessment through Advanced Computing...

    Office of Scientific and Technical Information (OSTI)

    Resource Type: Conference Resource Relation: Conference: IEEE PES General Meeting, Conference & Exposition, July 27-31, 2014, National Harbor, MD, 1-5 Publisher: IEEE, Piscataway, ...

  13. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  14. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  15. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  16. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  17. Smart-Grid Security Issues

    SciTech Connect

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  18. About SRNL - Directorates - National Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  19. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  20. Accomplishments | National Nuclear Security Administration |...

    National Nuclear Security Administration (NNSA)

    ... In FY 2009, ASC released improved codes to support stockpile stewardship and other nuclear security missions, including secure transportation, NSE infrastructure, and nuclear ...

  1. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  2. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  3. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  4. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  5. Los Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  6. Electro-optic voltage sensor for sensing voltage in an E-field

    DOEpatents

    Woods, G.K.; Renak, T.W.

    1999-04-06

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 18 figs.

  7. Electro-optic voltage sensor for sensing voltage in an E-field

    DOEpatents

    Woods, Gregory K.; Renak, Todd W.

    1999-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  8. Cold War | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Cold War Paying tribute to our atomic veterans Glenn Podonsky, director of the U.S. Department of Energy's Office of Enterprise Assessment, pays tribute to the atomic veterans who worked at the Nevada National Security Site and other sites across the enterprise during the Cold War. He also introduced the video tribute below from Energy

  9. Office of Security and Safety Performance Assurance

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2006-04-19

    Designated as the DOE official responsible for enforcement of 10 CFR Part 824 pertaining to assessment of civil penalties for classified information security violations and DOE official responsible to perform the duties set forth in 22 CFR 62.11 and 41.63 pertaining to the Exchange Visitor's program.

  10. Group 3: Humidity, Temperature and Voltage (Presentation)

    SciTech Connect

    Wohlgemuth, J.

    2013-09-01

    This is a summary of the work of Group 3 of the International PV QA Task Force. Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  11. Voltage control on a train system

    DOEpatents

    Gordon, Susanna P.; Evans, John A.

    2004-01-20

    The present invention provides methods for preventing low train voltages and managing interference, thereby improving the efficiency, reliability, and passenger comfort associated with commuter trains. An algorithm implementing neural network technology is used to predict low voltages before they occur. Once voltages are predicted, then multiple trains can be controlled to prevent low voltage events. Further, algorithms for managing inference are presented in the present invention. Different types of interference problems are addressed in the present invention such as "Interference During Acceleration", "Interference Near Station Stops", and "Interference During Delay Recovery." Managing such interference avoids unnecessary brake/acceleration cycles during acceleration, immediately before station stops, and after substantial delays. Algorithms are demonstrated to avoid oscillatory brake/acceleration cycles due to interference and to smooth the trajectories of closely following trains. This is achieved by maintaining sufficient following distances to avoid unnecessary braking/accelerating. These methods generate smooth train trajectories, making for a more comfortable ride, and improve train motor reliability by avoiding unnecessary mode-changes between propulsion and braking. These algorithms can also have a favorable impact on traction power system requirements and energy consumption.

  12. High voltage pulse generator. [Patent application

    DOEpatents

    Fasching, G.E.

    1975-06-12

    An improved high-voltage pulse generator is described which is especially useful in ultrasonic testing of rock core samples. An N number of capacitors are charged in parallel to V volts and at the proper instance are coupled in series to produce a high-voltage pulse of N times V volts. Rapid switching of the capacitors from the paralleled charging configuration to the series discharging configuration is accomplished by using silicon-controlled rectifiers which are chain self-triggered following the initial triggering of the first rectifier connected between the first and second capacitors. A timing and triggering circuit is provided to properly synchronize triggering pulses to the first SCR at a time when the charging voltage is not being applied to the parallel-connected charging capacitors. The output voltage can be readily increased by adding additional charging networks. The circuit allows the peak level of the output to be easily varied over a wide range by using a variable autotransformer in the charging circuit.

  13. Engineering | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Engineering NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and performance of the current and future U.S. nuclear weapons stockpile. It also provides the solid and sustained engineering basis for stockpile certification and assessments that are needed throughout the entire lifecycle of each weapon. NNSA develops capabilities to assess and improve the engineering components of both the non-nuclear and nuclear

  14. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  15. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  16. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits...

  17. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  18. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  19. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  20. Requirements for security signalling

    SciTech Connect

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  1. Operations Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  2. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  3. Cognitive Computing for Security.

    SciTech Connect

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  4. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  5. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  6. Energy Security Council

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  7. Application of Newton's optimal power flow in voltage/reactive power control

    SciTech Connect

    Bjelogrlic, M.; Babic, B.S. ); Calovic, M.S. ); Ristanovic, P. )

    1990-11-01

    This paper considers an application of Newton's optimal power flow to the solution of the secondary voltage/reactive power control in transmission networks. An efficient computer program based on the latest achievements in the sparse matrix/vector techniques has been developed for this purpose. It is characterized by good robustness, accuracy and speed. A combined objective function appropriate for various system load levels with suitable constraints, for treatment of the power system security and economy is also proposed. For the real-time voltage/reactive power control, a suboptimal power flow procedure has been derived by using the reduced set of control variables. This procedure is based on the sensitivity theory applied to the determination of zones for the secondary voltage/reactive power control and corresponding reduced set of regulating sources, whose reactive outputs represent control variables in the optimal power flow program. As a result, the optimal power flow program output becomes a schedule to be used by operators in the process of the real-time voltage/reactive power control in both normal and emergency operating states.

  8. Electro-optic high voltage sensor

    DOEpatents

    Davidson, James R.; Seifert, Gary D.

    2002-01-01

    A small sized electro-optic voltage sensor capable of accurate measurement of high levels of voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation into the sensor. A polarization beam displacer serves as a filter to separate the input beam into two beams with orthogonal linear polarizations. The beam displacer is oriented in such a way as to rotate the linearly polarized beams such that they enter a Pockels crystal having at a preferred angle of 45 degrees. The beam displacer is therefore capable of causing a linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels electro-optic effect induces a differential phase shift on the major and minor axes of the input beam as it travels through the Pockels crystal, which causes the input beam to be elliptically polarized. A reflecting prism redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization representing the major and minor axes. The system may include a detector for converting the output beams into electrical signals, and a signal processor for determining the voltage based on an analysis of the output beams. The output beams are amplitude modulated by the frequency of the electric field and the amplitude of the output beams is proportional to the magnitude of the electric field, which is related to the voltage being measured.

  9. 2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    SciTech Connect

    NSTec Environmental Management

    2012-03-20

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of

  10. Data port security lock

    DOEpatents

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  11. Incidents of Security Concern

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  12. Secure Sensor Platform

    Energy Science and Technology Software Center

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  13. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  14. NNSA orders security enhancements

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    NNSA orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to stop at the East and West Jemez Road "Vehicle Access Portals" (VAPs) for a vehicle check. December 21, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience,

  15. Office of Enterprise Assessments Assessment of Nuclear Reactor...

    Energy Saver

    Nuclear Reactor Facility Operations at Nevada National Security Site September 2016 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health ...

  16. Well Logging Security Initiatives | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  17. Public key infrastructure for DOE security research

    SciTech Connect

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  18. Enterprise Assessments Targeted Review of the Safety System Management of the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility – December 2015

    Office of Energy Efficiency and Renewable Energy (EERE)

    Targeted Review of the Safety System Management of the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility

  19. Optimal Voltage Regulation for Unbalanced Distribution Networks Considering Distributed Energy Resources

    SciTech Connect

    Xu, Yan; Tomsovic, Kevin

    2015-01-01

    With increasing penetration of distributed generation in the distribution networks (DN), the secure and optimal operation of DN has become an important concern. In this paper, an iterative quadratic constrained quadratic programming model to minimize voltage deviations and maximize distributed energy resource (DER) active power output in a three phase unbalanced distribution system is developed. The optimization model is based on the linearized sensitivity coefficients between controlled variables (e.g., node voltages) and control variables (e.g., real and reactive power injections of DERs). To avoid the oscillation of solution when it is close to the optimum, a golden search method is introduced to control the step size. Numerical simulations on modified IEEE 13 nodes test feeders show the efficiency of the proposed model. Compared to the results solved by heuristic search (harmony algorithm), the proposed model converges quickly to the global optimum.

  20. Nevada National Security Site Underground Test Area (UGTA) Tour |

    Office of Environmental Management (EM)

    Department of Energy Tour Nevada National Security Site Underground Test Area (UGTA) Tour Tour Booklet from the Nevada National Security Site Underground Test Area (UGTA) Tour on December 10, 2014 at the Performance and Risk Assessment (P&RA) Community of Practice (CoP) Annual Technical Exchange Meeting. Photos - December 10, 2014 Site Tour of the Nevada National Security Site for participants of the 2014 P&RA CoP Technical Exchange Meeting. Nevada National Security Site Underground

  1. Preventing Delayed Voltage Recovery with Voltage-Regulating Distributed Energy Resources

    SciTech Connect

    Adhikari, Sarina; Li, Fangxing; Li, Huijuan; Xu, Yan; Kueck, John D; Rizy, D Tom

    2009-01-01

    With the large use of residential air conditioner (A/C) motors during the summer peaks, the potential of motor stalling events have increased in the recent years. The stalled motor loads have been found to be the most important cause of delayed voltage recovery following severe system disturbances, such as a subtransmission fault. The proper modeling of the stalled motors is a very important factor in identifying the effect of these motors in voltage recovery after the fault. This paper presents a methodology for modeling the stalled low inertia induction motors based on a sample utility system and a small primary distribution circuit. The prevention of the stalling of motors plays an important role in maintaining the voltage profile of the system after system disturbances. Distributed Energy Resource (DER) is used to prevent the motor stalling events so that the delayed voltage recovery of the system may be avoided.

  2. Security and Training | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  3. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  4. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  5. Office of Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero,

  6. Broader National Security Missions | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  7. Office of Heath, Safety and Security Now Two New Offices

    Energy.gov [DOE]

    To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

  8. Independent Activity Report, Office of Secure Transportation- March 2011

    Energy.gov [DOE]

    Report for the Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protection Action Recommendation Cards for the Office of Secure Transportation [HIAR-OST-2011-03-04

  9. Distribution System Voltage Regulation by Distributed Energy Resources

    SciTech Connect

    Ceylan, Oguzhan; Liu, Guodong; Xu, Yan; Tomsovic, Kevin

    2014-01-01

    This paper proposes a control method to regulate voltages in 3 phase unbalanced electrical distribution systems. A constrained optimization problem to minimize voltage deviations and maximize distributed energy resource (DER) active power output is solved by harmony search algorithm. IEEE 13 Bus Distribution Test System was modified to test three different cases: a) only voltage regulator controlled system b) only DER controlled system and c) both voltage regulator and DER controlled system. The simulation results show that systems with both voltage regulators and DER control provide better voltage profile.

  10. High voltage supply for neutron tubes in well logging applications

    DOEpatents

    Humphreys, D. Russell

    1989-01-01

    A high voltage supply is provided for a neutron tube used in well logging. The "biased pulse" supply of the invention combines DC and "full pulse" techniques and produces a target voltage comprising a substantial negative DC bias component on which is superimposed a pulse whose negative peak provides the desired negative voltage level for the neutron tube. The target voltage is preferably generated using voltage doubling techniques and employing a voltage source which generates bipolar pulse pairs having an amplitude corresponding to the DC bias level.

  11. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  12. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  13. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  14. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  15. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  16. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  17. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  18. LOW VOLTAGE 14 Mev NEUTRON SOURCE

    DOEpatents

    Little, R.N. Jr.; Graves, E.R.

    1959-09-29

    An apparatus yielding high-energy neutrons at the rate of 10/sup 8/ or more per second by the D,T or D,D reactions is described. The deuterium gas filling is ionized by electrons emitted from a filament, and the resulting ions are focused into a beam and accelerated against a fixed target. The apparatus is built in accordance with the relationship V/sub s/ = A--B log pd, where V/sub s/ is the sparking voltage, p the gas pressure, and d the gap length between the high voltage electrodes. Typical parameters to obtain the high neutron yields are 55 to 80 kv, 0.5 to 7.0 ma beam current, 5 to 12 microns D/sub 2/, and a gap length of 1 centimeter.

  19. High voltage electric substation performance in earthquakes

    SciTech Connect

    Eidinger, J.; Ostrom, D.; Matsuda, E.

    1995-12-31

    This paper examines the performance of several types of high voltage substation equipment in past earthquakes. Damage data is provided in chart form. This data is then developed into a tool for estimating the performance of a substation subjected to an earthquake. First, suggests are made about the development of equipment class fragility curves that represent the expected earthquake performance of different voltages and types of equipment. Second, suggestions are made about how damage to individual pieces of equipment at a substation likely affects the post-earthquake performance of the substation as a whole. Finally, estimates are provided as to how quickly a substation, at various levels of damage, can be restored to operational service after the earthquake.

  20. Electrical system architecture having high voltage bus

    DOEpatents

    Hoff, Brian Douglas; Akasam, Sivaprasad

    2011-03-22

    An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.