Sample records for energy security applying

  1. The security energy encryption in wireless power transfer

    NASA Astrophysics Data System (ADS)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  2. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  3. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  4. July 2015

    Science.gov Websites

    Science Programs Applied Energy Programs Civilian Nuclear Energy Programs Laboratory Directed Research Energy United States of America National Nuclear Security Administration Visit Blogger Join Us on key role in national security and nuclear deterrence in an increasingly dangerous and unstable world

  5. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  6. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  7. Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production

    USDA-ARS?s Scientific Manuscript database

    To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....

  8. 10 CFR 1044.03 - What definitions apply to this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false What definitions apply to this part? 1044.03 Section 1044.03 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 § 1044.03 What definitions apply to this part? The following...

  9. 10 CFR 1044.03 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false What definitions apply to this part? 1044.03 Section 1044.03 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 § 1044.03 What definitions apply to this part? The following...

  10. 10 CFR 1044.03 - What definitions apply to this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false What definitions apply to this part? 1044.03 Section 1044.03 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 § 1044.03 What definitions apply to this part? The following...

  11. 10 CFR 1044.03 - What definitions apply to this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false What definitions apply to this part? 1044.03 Section 1044.03 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SECURITY REQUIREMENTS FOR PROTECTED DISCLOSURES UNDER SECTION 3164 OF THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 § 1044.03 What definitions apply to this part? The following...

  12. Applying Acquisition Lessons Learned to Operational Energy Initiatives

    DTIC Science & Technology

    2013-03-01

    current and future platforms to meet the demands of Energy-Informed Operations. Endnotes 1 Charles F. Wald , and Tom Captain, Energy Security America’s...2013); Wald and Captain, Energy Security America’s Best Defense, 1. 3 The Army’s agile process involves seven phases and three decision points to...https://acc.dau.mil/adl/en- US/329976/file/47235/EVM_Report_to_Congress.pdf (accessed January 14, 2013). 22 Lisa Pracchia, “The AV-8B Team Learns Synergy

  13. Joint the Center for Applied Scientific Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gamblin, Todd; Bremer, Timo; Van Essen, Brian

    The Center for Applied Scientific Computing serves as Livermore Lab’s window to the broader computer science, computational physics, applied mathematics, and data science research communities. In collaboration with academic, industrial, and other government laboratory partners, we conduct world-class scientific research and development on problems critical to national security. CASC applies the power of high-performance computing and the efficiency of modern computational methods to the realms of stockpile stewardship, cyber and energy security, and knowledge discovery for intelligence applications.

  14. MPA-11: Materials Synthesis and Integrated Devices; Overview of an Applied Energy Group

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dattelbaum, Andrew Martin

    Our mission is to provide innovative and creative chemical synthesis and materials science solutions to solve materials problems across the LANL missions. Our group conducts basic and applied research in areas related to energy security as well as problems relevant to the Weapons Program.

  15. 77 FR 38275 - Secretary of Energy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... DEPARTMENT OF ENERGY Secretary of Energy Advisory Board AGENCY: Department of Energy, DoE. ACTION: Notice of open meeting. SUMMARY: This notice announces an open meeting of the Secretary of Energy [[Page... Secretary on the Department's basic and applied research, economic and national security policy, educational...

  16. 75 FR 82002 - Secretary of Energy Advisory Board Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... DEPARTMENT OF ENERGY Secretary of Energy Advisory Board Meeting AGENCY: Department of Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces an open meeting of the Secretary of Energy... recommendations to the Secretary on the Department's basic and applied research, economic and national security...

  17. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  18. Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership

    NASA Astrophysics Data System (ADS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.

  19. 10 CFR 824.2 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Applicability. 824.2 Section 824.2 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.2 Applicability. (a) General. These regulations apply to any person that has entered into a...

  20. 10 CFR 824.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Applicability. 824.2 Section 824.2 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.2 Applicability. (a) General. These regulations apply to any person that has entered into a...

  1. A possible new approach to understanding mental disorder.

    PubMed

    Sharples, P J

    2012-09-01

    The aetiology of mental disorders is not fully understood. This paper presents an analysis of the conceptual control process exploring the tools of conceptual application and the phases and the mechanism of the control process and seeks to show how the illness states of mental disorder naturally come to occur. Living occurs in a world of change. For living to occur some control is required and to exert control, to provide direction for the conceptual process, some interpretation of significance, some definition of need is also required. Such interpretation, monitoring significance in relation to the many aspects of change, forms the base on which living occurs. Change in human terms is intrinsically insecure and interpretation of significance is an interpretation of security, an interpretation of control in living. Conceptual control is a process applied to maintain security, to maintain a secure base for the interpretation of significance, it is a process applied to produce and hold a sense of control. Powering a process, producing and holding a sense of control, is an active process and so requires some form of energy. Human beings have a sense of that energy, something exhibited in terms such as full of energy, tired, exhausted. As energy is required to power the control process, accompanying the sense of energy is a sense of the ability to provide power, is a sense of the ability to hold and maintain control, is a sense of security. As available energy reduces there is difficulty holding the same sense of control, a person in the same setting comes to feel more insecure. This can result in a person experiencing mental disorder from mild to severe degree. Mild where conceptual process is applied to manage just one or a very few particular needs, severe and more general where the insecurity affects the base of interpretation. In this later case seeking to protect security can lead to mania, mood-incongruent delusions, schizophrenia. Failing ability to protect can lead to generalized anxiety disorder, mood-congruent delusions, different presentations and degrees of depression. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. US statutes for enforcement by security inspectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  3. The Department of Defense Statement on the Defense Energy Technology Program by Ruth M. Davis Deputy Under Secretary of Defense for Research and Advanced Technology before the Research and Development subcommittee of the Committee on Armed Services of the United States House of Representatives 96th Congress, First Session,

    DTIC Science & Technology

    1979-04-05

    political, economic , or military pressure - pressure applied by those who either have the ability to contro directly or can indirectly influence the flow...collective national security. The political and economic risks of foreign oil supply interruptions are very serious and very real to our national security...security. We must find energy alternatives - alternatives that are domestically controllable, technically feasible, and economically , environmentally, and

  4. A machine learning approach for predicting the relationship between energy resources and economic development

    NASA Astrophysics Data System (ADS)

    Cogoljević, Dušan; Alizamir, Meysam; Piljan, Ivan; Piljan, Tatjana; Prljić, Katarina; Zimonjić, Stefan

    2018-04-01

    The linkage between energy resources and economic development is a topic of great interest. Research in this area is also motivated by contemporary concerns about global climate change, carbon emissions fluctuating crude oil prices, and the security of energy supply. The purpose of this research is to develop and apply the machine learning approach to predict gross domestic product (GDP) based on the mix of energy resources. Our results indicate that GDP predictive accuracy can be improved slightly by applying a machine learning approach.

  5. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  6. The Stewardship Science Academic Alliance: A Model of Education for Fundamental and Applied Low-energy Nuclear Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cizewski, J.A., E-mail: cizewski@rutgers.edu

    The Stewardship Science Academic Alliances (SSAA) were inaugurated in 2002 by the National Nuclear Security Administration of the U. S. Department of Energy. The purpose is to enhance connections between NNSA laboratories and the activities of university scientists and their students in research areas important to NNSA, including low-energy nuclear science. This paper highlights some of the ways that the SSAA fosters education and training of graduate students and postdoctoral scholars in low-energy nuclear science, preparing them for careers in fundamental and applied research and development.

  7. 77 FR 64800 - Secretary of Energy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... reestablished to provide advice and recommendations to the Secretary on the Department's basic and applied research, economic and national security policy, educational issues, operational issues and other...

  8. Inventory of Safety-related Codes and Standards for Energy Storage Systems with some Experiences related to Approval and Acceptance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.

    The purpose of this document is to identify laws, rules, model codes, codes, standards, regulations, specifications (CSR) related to safety that could apply to stationary energy storage systems (ESS) and experiences to date securing approval of ESS in relation to CSR. This information is intended to assist in securing approval of ESS under current CSR and to identification of new CRS or revisions to existing CRS and necessary supporting research and documentation that can foster the deployment of safe ESS.

  9. Post-Cold War Science and Technology at Los Alamos

    NASA Astrophysics Data System (ADS)

    Browne, John C.

    2002-04-01

    Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.

  10. The Energy at ORNL

    ScienceCinema

    Haberl, Bianca; Shankar, Arjun; Hogle, Susan; Pierce, Eric; Chi, Miaofang; Davidson, Brian; Doughty, Ben; Elliott, Amy; Newby, Jason; Pandya, Tara; Lee, Ho Nyung; Wagner, Robert

    2018-06-13

    Scientists and engineers at Oak Ridge National Laboratory apply their expertise to the toughest challenges in energy, national security, and scientific discovery. They’re curious, passionate, and motivated, and they explain what drives them in this video from the lab’s annual Awards Night, Nov. 18, 2016.

  11. A Strategy for American Power: Energy, Climate and National Security

    DTIC Science & Technology

    2008-06-01

    principle applies to the suppliers of energy, particularly oil, since the United States gets...outlined four principles : • Human-induced climate change is real; • The consequences of climate change will be significant and will hit the poor...savings, in terms of higher macroeconomic output in times of energy price volatility, associated with the development of nuclear capacity in Japan.

  12. Physics and Its Multiple Roles in the International Atomic Energy Agency

    NASA Astrophysics Data System (ADS)

    Massey, Charles D.

    2017-01-01

    The IAEA is the world's centre for cooperation in the nuclear field. It was set up as the world's ``Atoms for Peace'' organization in 1957 within the United Nations family. The Agency works with its Member States and multiple partners worldwide to promote the safe, secure and peaceful use of nuclear technologies. Three main areas of work underpin the IAEA's mission: Safety and Security, Science and Technology, and Safeguards and Verification. To carry out its mission, the Agency is authorized to encourage and assist research on, and development and practical application of, atomic energy for peaceful uses throughout the world; foster the exchange of scientific and technical information on peaceful uses of atomic energy; and encourage the exchange of training of scientists and experts in the field of peaceful uses of atomic energy. Nowadays, nuclear physics and nuclear technology are applied in a great variety of social areas, such as power production, medical diagnosis and therapies, environmental protection, security control, material tests, food processing, waste treatments, agriculture and artifacts analysis. This presentation will cover the role and practical application of physics at the IAEA, and, in particular, focus on the role physics has, and will play, in nuclear security.

  13. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    DTIC Science & Technology

    2015-06-01

    15  2.  Social Free Energy .............................................................................16  III.  METHODOLOGY FOR THE REST OF THE...and living system theory that money can be used as a maker for entropy transfers in social and economic systems.12 Another is the idea of free energy ...from thermodynamics applied to social systems as social free energy . Social free energy is amount of energy beyond the amount needed to maintain the

  14. Research and Energy Efficiency: Selected Success Stories

    DOE R&D Accomplishments Database

    Garland, P. W.; Garland, R. W.

    1997-06-26

    Energy use and energy technology play critical roles in the U.S. economy and modern society. The Department of Energy (DOE) conducts civilian energy research and development (R&D) programs for the purpose of identifying promising technologies that promote energy security, energy efficiency, and renewable energy use. DOE-sponsored research ranges from basic investigation of phenomena all the way through development of applied technology in partnership with industry. DOE`s research programs are conducted in support of national strategic energy objectives, however austere financial times have dictated that R&D programs be measured in terms of cost vs. benefit. In some cases it is difficult to measure the return on investment for the basic "curiosity-driven" research, however many applied technology development programs have resulted in measurable commercial successes. The DOE has published summaries of their most successful applied technology energy R&D programs. In this paper, we will discuss five examples from the Building Technologies area of the DOE Energy Efficiency program. Each story will describe the technology, discuss the level of federal funding, and discuss the returns in terms of energy savings, cost savings, or national economic impacts.

  15. Selected text of Atomic Energy Act, Executive Orders and other laws of general interest to safeguards and security executives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three report set, BNL 52201 contains detailed information for use by executives. BNL 52202 is titled, U.S. Statutes of General Interest to Safeguards and Security Officers, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled, U.S.Statutes for Enforcement by Security Inspectors, and only contains statutes to be applied by uniformed security inspectors. These are a newly updated version of a set of documents of similar titles published in September 1988, which were an updated version of an original set of documents published in November 1983.

  16. ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marra, J.

    2010-09-29

    Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less

  17. 75 FR 181 - Notice of Determinations on the PURPA Standards Set Forth in the Energy Independence and Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-04

    ... consists of the intelligent electronic devices (IEDs) and communications between the devices for feedback... Equipment provisions in subsection C employ a rate of return perspective that applies to investor-owned...

  18. FY2017 Analysis Annual Progress Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    During fiscal year 2017, the U.S. Department of Energy Vehicle Technologies Office (VTO) funded analysis projects supportive of VTO’s goals to pursue early stage research in vehicle and mobility system technologies to reduce petroleum dependence, increase energy reliability and security, improve transportation affordability, and promote economic growth. VTO analysis projects result in a foundation of data, analytical models, and applied analyses that provide insights into critical transportation energy problems and assist in research investment prioritization and portfolio planning.

  19. 22 CFR 9a.3 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.3 Scope. These regulations apply to all information and material classified... “Classification of Certain Information and Material Obtained From Advisory Bodies Created To Implement The...

  20. 22 CFR 9a.3 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.3 Scope. These regulations apply to all information and material classified... “Classification of Certain Information and Material Obtained From Advisory Bodies Created To Implement The...

  1. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tucker, R.A.

    This paper reports that properly applied, light sources and lighting systems not only enhance a building's attractiveness and usability, they also create a secure environment. An effectively lighted area can minimize pedestrian hazards and auto accidents. Good security lighting also eliminates the darkness that vandals, thieves, and felons thrive on. Unfortunately, lighting quality has sometimes been sacrificed for the sake of energy efficiency, and resulting savings offset by poor aesthetics and user dissatisfaction. However, trade-offs in quality and efficiency are not necessary, thanks to recent developments in light source technology.

  3. Laboratory Directed Research and Development FY2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, W; Sketchley, J; Kotta, P

    2012-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less

  4. Laboratory Directed Research and Development FY2010 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jackson, K J

    2011-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has at its core a primary national security mission - to ensure the safety, security, and reliability of the nation's nuclear weapons stockpile without nuclear testing, and to prevent and counter the spread and use of weapons of mass destruction: nuclear, chemical, and biological. The Laboratory uses the scientific and engineering expertise and facilities developed for its primary mission to pursue advanced technologies to meet other important national security needs - homeland defense, military operations, and missile defense, for example - that evolve in response to emerging threats. For broader nationalmore » needs, LLNL executes programs in energy security, climate change and long-term energy needs, environmental assessment and management, bioscience and technology to improve human health, and for breakthroughs in fundamental science and technology. With this multidisciplinary expertise, the Laboratory serves as a science and technology resource to the U.S. government and as a partner with industry and academia. This annual report discusses the following topics: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; (6) Engineering and Manufacturing Processes; (7) Materials Science and Technology; Mathematics and Computing Science; (8) Nuclear Science and Engineering; and (9) Physics.« less

  5. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  6. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  7. Water Resources: the Central Component of the WEF Nexus?

    NASA Astrophysics Data System (ADS)

    Ding, K.; Gunda, T.; Hornberger, G. M.

    2017-12-01

    Increasing population growth, consumption of natural resources, and deterioration of the environment coupled with climate change impacts (such as increased variability in precipitation) will challenge our abilities to provide water, energy and food (WEF) to the global populace. Less developed areas, such as the countries in Sub-Saharan Africa, are particularly vulnerable to such resource issues due to immature governance and management structures and strategies. We introduce an integrated approach to resource security analysis, which traditionally has focused on the WEF components separately and apply the methods to a suite of countries in Sub-Saharan Africa. Specifically, we evaluate the inter-connected nature of WEF securities by considering physical, demographic, socioeconomic, health, and institutional parameters related to each of the resource securities and by analyzing the relationships among the metrics. For example, reported food deficits for countries are strongly correlated with reported levels of access to safe drinking water. Multivariate statistical analyses are applied to identify relationships among resources and to develop indices that robustly and comprehensively capture the WEF nexus. Our results indicate that water plays the central role in the WEF nexus, due to its extensive use for both food and energy production in these countries. This approach provides a framework for analyzing the WEF nexus in other regions of the world.

  8. 10 CFR 810.10 - Grant of specific authorization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... “sensitive nuclear technology” as defined in § 810.3, the requirements of sections 127 and 128 of the Atomic... is required may apply for the authorization to the U.S. Department of Energy, National Nuclear Security Administration, Washington, DC 20585, Attention: Director, Nuclear Transfer and Supplier Policy...

  9. 10 CFR 810.10 - Grant of specific authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... “sensitive nuclear technology” as defined in § 810.3, the requirements of sections 127 and 128 of the Atomic... is required may apply for the authorization to the U.S. Department of Energy, National Nuclear Security Administration, Washington, DC 20585, Attention: Director, Nuclear Transfer and Supplier Policy...

  10. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.

  11. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less

  12. Energy System Integration Facility Secure Data Center | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides

  13. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    PubMed

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  14. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    NASA Astrophysics Data System (ADS)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  15. Assessment of the stability of a multimachine power system by the transient energy margin

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stanton, S.E.

    1982-01-01

    This reasearch develops a tool for the direct assessment of the transient stability of a multimachine electric power system that is subject to a large disturbance. The tool is the Transient Energy Margin. The transient of interest is the first swing (or inertial) transient. The Transient Energy Margin is computed by evaluating an energy function using the relevant unstable equilibrium point and the system states at the instant the disturbance is removed. In evaluating the function, a significant portion of the fault kinetic energy is identified as not contributing to system instability. The resulting energy value is a measure ofmore » the margin-of-safety for the disturbed system. A distinction is proposed between assessing system stability and assessing system security. The Transient Energy Margin is used first to assess the stability of the system. This profile ranks various distrubances to display the strengths and weaknesses of the system. A modified Transient Energy Margin is then proposed as an assessment of security; the transient energy margin profile is repeated to evaluate the system response in terms of the local minimum energy conditions approached by the critical trajectories. Both techniques are applied to a practical, 17 generator test system.« less

  16. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less

  17. How Lean the Machine: How Agile the Mind?

    ERIC Educational Resources Information Center

    Atkinson, Simon Reay; Goodger, Amanda; Caldwell, Nicholas; Hossain, Liaquat

    2012-01-01

    Purpose: Competition for resources appears to be increasing at a time of political, security (including energy, food and climate) and economic change; leading to potential collapse. The purpose of this conceptual paper is to examine the impact of policies exercised at the macro level on methods and processes applied at the micro level through, for…

  18. Potential for the Use of Energy Savings Performance Contracts to Reduce Energy Consumption and Provide Energy and Cost Savings in Non-Building Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Charles; Green, Andrew S.; Dahle, Douglas

    2013-08-01

    The findings of this study indicate that potential exists in non-building applications to save energy and costs. This potential could save billions of federal dollars, reduce reliance on fossil fuels, increase energy independence and security, and reduce greenhouse gas emissions. The Federal Government has nearly twenty years of experience with achieving similar energy cost reductions, and letting the energy costs savings pay for themselves, by applying energy savings performance contracts (ESPC) inits buildings. Currently, the application of ESPCs is limited by statute to federal buildings. This study indicates that ESPCs can be a compatible and effective contracting tool for achievingmore » savings in non-building applications.« less

  19. Determination of the ionization potentials of security-relevant substances with single photon ionization mass spectrometry using synchrotron radiation.

    PubMed

    Schramm, E; Mühlberger, F; Mitschke, S; Reichardt, G; Schulte-Ladbeck, R; Pütz, M; Zimmermann, R

    2008-02-01

    Several ionization potentials (IPs) of security relevant substances were determined with single photon ionization time of flight mass spectrometry (SPI-TOFMS) using monochromatized synchrotron radiation from the "Berliner Elektronenspeicherring-Gesellschaft für Synchrotronstrahlung" (BESSY). In detail, the IPs of nine explosives and related compounds, seven narcotics and narcotics precursors, and one chemical warfare agent (CWA) precursor were determined, whereas six IPs already known from the literature were verified correctly. From seven other substances, including one CWA precursor, the IP could not be determined as the molecule ion peak could not be detected. For these substances the appearance energy (AE) of a main fragment was determined. The analyzed security-relevant substances showed IPs significantly below the IPs of common matrix compounds such as nitrogen and oxygen. Therefore, it is possible to find photon energies in between, whereby the molecules of interest can be detected with SPI in very low concentrations due to the shielding of the matrix. All determined IPs except the one of the explosive EGDN were below 10.5 eV. Hence, laser-generated 118 nm photons can be applied for detecting almost all security-relevant substances by, e.g., SPI-TOFMS.

  20. Dynamic security contingency screening and ranking using neural networks.

    PubMed

    Mansour, Y; Vaahedi, E; El-Sharkawi, M A

    1997-01-01

    This paper summarizes BC Hydro's experience in applying neural networks to dynamic security contingency screening and ranking. The idea is to use the information on the prevailing operating condition and directly provide contingency screening and ranking using a trained neural network. To train the two neural networks for the large scale systems of BC Hydro and Hydro Quebec, in total 1691 detailed transient stability simulation were conducted, 1158 for BC Hydro system and 533 for the Hydro Quebec system. The simulation program was equipped with the energy margin calculation module (second kick) to measure the energy margin in each run. The first set of results showed poor performance for the neural networks in assessing the dynamic security. However a number of corrective measures improved the results significantly. These corrective measures included: 1) the effectiveness of output; 2) the number of outputs; 3) the type of features (static versus dynamic); 4) the number of features; 5) system partitioning; and 6) the ratio of training samples to features. The final results obtained using the large scale systems of BC Hydro and Hydro Quebec demonstrates a good potential for neural network in dynamic security assessment contingency screening and ranking.

  1. Research of carbon composite material for nonlinear finite element method

    NASA Astrophysics Data System (ADS)

    Kim, Jung Ho; Garg, Mohit; Kim, Ji Hoon

    2012-04-01

    Works on the absorption of collision energy in the structural members are carried out widely with various material and cross-sections. And, with ever increasing safety concerns, they are presently applied in various fields including railroad trains, air crafts and automobiles. In addition to this, problem of lighting structural members became important subject by control of exhaust gas emission, fuel economy and energy efficiency. CFRP(Carbon Fiber Reinforced Plastics) usually is applying the two primary structural members because of different result each design parameter as like stacking thickness, stacking angle, moisture absorption ect. We have to secure the data for applying primary structural members. But it always happens to test design parameters each for securing the data. So, it has much more money and time. We can reduce the money and the time, if can ensure the CFRP material properties each design parameters. In this study, we experiment the coupon test each tension, compression and shear using CFRP prepreg sheet and simulate non-linear analyze at the sources - test result, Caron longitudinal modulus and matrix poisson's ratio using GENOAMQC is specialized at Composite analysis. And then we predict the result that specimen manufacture changing stacking angle and experiment in such a way of test method using GENOA-MCQ.

  2. Updating energy security and environmental policy: Energy security theories revisited.

    PubMed

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Analysis of Marine Corps Renewable Energy Planning to Meet Installation Energy Security Requirements

    DTIC Science & Technology

    2013-12-03

    experimentation eventually gives way to the era of ferment . A few new technologies break through in the industry and are applied to a growing number of niche...experimentation and ferment eventually give way to an era of incremental change, where the industry down-selects to the most successful and efficient...clearly in the later part of the era of incremental change. Most renewables, however, are only just now moving into the second phase, the era of ferment

  4. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    PubMed Central

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  5. Sandia National Laboratories: Directed-energy tech receives funding to

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research

  6. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  7. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  8. 'Non-destructive' biocomputing security system based on gas-controlled biofuel cell and potentially used for intelligent medical diagnostics.

    PubMed

    Zhou, Ming; Zheng, Xiliang; Wang, Jin; Dong, Shaojun

    2011-02-01

    Biofuel cells (BFCs) based on enzymes and microbes are the promising future alternative sources of sustainable electrical energy under mild conditions (i.e. ambient temperature and neutral pH). By combining the adaptive behavior of BFCs self-regulating energy release with the versatility of biocomputing, we construct a novel gas-controlled biocomputing security system, which could be used as the potential implantable self-powered and 'smart' medical system with the logic diagnosis aim. We have demonstrated a biocomputing security system based on BFCs. Due to the unique 'RESET' reagent of N(2) applied in this work, the prepared biocomputing security system can be reset and cycled for a large number of times with no 'RESET' reagent-based 'waste'. This would be advantageous for the potential practical applications of such keypad lock as well as the development of biocomputing security devices. In order to validate the universality of the system and also to harvest energy directly from biofuels with enhanced power output, we replace the glucose with orange juice as the biofuel to operate BFCs-based biocomputing system, which also possesses the function of keypad lock. In addition, by introducing BFCs into the biocomputing security system, the adaptive behavior of the BFCs self-regulating the power release would be an immense advantage of such security keypad lock devices in potential self-powered implantable medical systems. The designed sequence gives the maximum power output and discriminate itself from the rest of the sequences. From this, we find that maximizing the dimensionless ratio of gap versus SD of the power output spectrum (a funnel in power outputs) gives the quantitative optimal design criterion. Therefore, our construction here may also provide a practical example and microscopic structural basis for mimicking the real biological network systems and bridge the gaps between the theoretical concepts and experiments important for biomolecular systems and synthetic biology.

  9. Energy Security: Emerging Challenges and Opportunities

    DTIC Science & Technology

    2010-08-01

    46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy

  10. Transparent and Flexible Self-Charging Power Film and Its Application in a Sliding Unlock System in Touchpad Technology.

    PubMed

    Luo, Jianjun; Tang, Wei; Fan, Feng Ru; Liu, Chaofeng; Pang, Yaokun; Cao, Guozhong; Wang, Zhong Lin

    2016-08-23

    Portable and wearable personal electronics and smart security systems are accelerating the development of transparent, flexible, and thin-film electronic devices. Here, we report a transparent and flexible self-charging power film (SCPF) that functions either as a power generator integrated with an energy storage unit or as a self-powered information input matrix. The SCPF possesses the capability of harvesting mechanical energy from finger motions, based on the coupling between the contact electrification and electrostatic induction effects, and meanwhile storing the generated energy. Under the fast finger sliding, the film can be charged from 0 to 2.5 V within 2094 s and discharge at 1 μA for approximately 1630 s. Furthermore, the film is able to identify personal characteristics during a sliding motion by recording the electric signals related to the person's individual bioelectricity, applied pressing force, sliding speed, and so on, which shows its potential applications in security systems in touchpad technology.

  11. A brief indicator of household energy security: associations with food security, child health, and child development in US infants and toddlers.

    PubMed

    Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B

    2008-10-01

    Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.

  12. Energy Independence and Security Act of 2007

    EPA Pesticide Factsheets

    This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.

  13. Laboratory-Directed Research and Development 2016 Summary Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pillai, Rekha Sukamar; Jacobson, Julie Ann

    The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclearmore » Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world’s energy future and secure our critical infrastructure. Operating since 1949, INL is the nation’s leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL’s research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy, enable clean energy deployment, and secure and modernize critical infrastructure. INL’s research, development, and demonstration capabilities, its resources, and its unique geography enable integration of scientific discovery, innovation, engineering, operations, and controls into complex large-scale testbeds for discovery, innovation, and demonstration of transformational clean energy and security concepts. These attributes strengthen INL’s leadership as a demonstration laboratory. As a national resource, INL also applies its capabilities and skills to the specific needs of other federal agencies and customers through DOE’s Strategic Partnership Program.« less

  14. Renewable Energy Laboratory Development for Biofuels Advanced Combustion Studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soloiu, Valentin A.

    2012-03-31

    The research advanced fundamental science and applied engineering for increasing the efficiency of internal combustion engines and meeting emissions regulations with biofuels. The project developed a laboratory with new experiments and allowed investigation of new fuels and their combustion and emissions. This project supports a sustainable domestic biofuels and automotive industry creating economic opportunities across the nation, reducing the dependence on foreign oil, and enhancing U.S. energy security. The one year period of research developed fundamental knowledge and applied technology in advanced combustion, emissions and biofuels formulation to increase vehicle's efficiency. Biofuels combustion was investigated in a Compression Ignition Directmore » Injection (DI) to develop idling strategies with biofuels and an Indirect Diesel Injection (IDI) intended for auxiliary power unit.« less

  15. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  16. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  17. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  18. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  19. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  20. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jacobs, R

    The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less

  2. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, R. K.; Peters, Scott

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  3. Cryptographic Key Management and Critical Risk Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  4. NASA Applied Sciences Program

    NASA Technical Reports Server (NTRS)

    Frederick, Martin

    2006-01-01

    This presentation highlights the NASA Applied Sciences Program. The goal of the program is to extend the results of scientific research and knowledge beyond the science community to contribute to NASA's partners' applications of national priority, such as agricultural efficiency, energy management and Homeland Security. Another purpose of the program's scientific research is to increase knowledge of the Earth-Sun system to enable improved predictions of climate, weather, and natural hazards. The program primarily optimizes benefits for citizens by contributing to partnering on applications that are used by state, local and tribal governments.

  5. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  6. 31 CFR 344.2 - What general provisions apply to SLGS securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... securities? 344.2 Section 344.2 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES... securities? (a) What other regulations apply to SLGS securities? SLGS securities are subject to: (1) The...

  7. Idaho National Laboratory Research & Development Impacts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stricker, Nicole

    Technological advances that drive economic growth require both public and private investment. The U.S. Department of Energy’s national laboratories play a crucial role by conducting the type of research, testing and evaluation that is beyond the scope of regulators, academia or industry. Examples of such work from the past year can be found in these pages. Idaho National Laboratory’s engineering and applied science expertise helps deploy new technologies for nuclear energy, national security and new energy resources. Unique infrastructure, nuclear material inventory and vast expertise converge at INL, the nation’s nuclear energy laboratory. Productive partnerships with academia, industry and governmentmore » agencies deliver high-impact outcomes. This edition of INL’s Impacts magazine highlights national and regional leadership efforts, growing capabilities, notable collaborations, and technology innovations. Please take a few minutes to learn more about the critical resources and transformative research at one of the nation’s premier applied science laboratories.« less

  8. EU energy policies achievement by industries in decentralized areas

    NASA Astrophysics Data System (ADS)

    Destro, Nicola; Stoppato, Anna; Benato, Alberto; Schiro, Fabio

    2017-11-01

    Energy Roadmap outlined by the European Commission sets out several routes for a more sustainable, competitive and secure energy system in 2050. All the outlined scenarios consider energy efficiency, renewable energy, nuclear energy and carbon capture and storage. In this paper, more attention has been devoted to the energy efficiency issue, by the identification of new micro and small networks opportunity fed by hybrid plants in the North-East of Italy. National energy balance and national transmission system operator data allowed to collect industrial energy consumptions data on the investigated area. Applying industrial statistics to the local energy needs allows to collect a dataset including consumption information by factory and by company structure (size and employees) for each industrial sector highlighting the factory density in the area. Preliminary outcomes from the model address to the exploitation of local by-product for energy purposes.

  9. Modeling Primary Atomization of Liquid Fuels using a Multiphase DNS/LES Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arienti, Marco; Oefelein, Joe; Doisneau, Francois

    2016-08-01

    As part of a Laboratory Directed Research and Development project, we are developing a modeling-and-simulation capability to study fuel direct injection in automotive engines. Predicting mixing and combustion at realistic conditions remains a challenging objective of energy science. And it is a research priority in Sandia’s mission-critical area of energy security, being also relevant to many flows in defense and climate. High-performance computing applied to this non-linear multi-scale problem is key to engine calculations with increased scientific reliability.

  10. Reconciling food security and bioenergy: priorities for action

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.

    Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less

  11. Reconciling food security and bioenergy: priorities for action

    DOE PAGES

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.; ...

    2016-06-14

    Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less

  12. Why food in health security (FIHS)?

    PubMed

    Wahlqvist, Mark L

    2009-01-01

    Health is intrinsic to human security (HumS) although it is somewhat anthropocentric and about our own psychosocial and biomedical status more than various external threats. The 1994 United Nations Development Program definition of HumS includes economic, food, environmental, personal, community and political security with freedom from fear and want. Environmental factors are critical for health security (HealS), especially with widespread socio-economic difficulty, and health systems less affordable or accessible. The nexus between nutritionally-related disorders and infectious disease is the most pervasive world health problem. Most if not all of the Millennium Development Goals are food-linked. Maternal nutrition has life-long health effects on the yet-to-be born child. The mix of essential nutrient deprivation and energy imbalance is rife across many societies. Food systems require deeper understanding and governance to overcome these food-related health risks which are matters of food security (FoodS). Nutritionally-related Disability Adjusted Life Years (DALYS) are improving markedly in many parts of the world, along with poverty and hunger reduction and health system advances. But recent economic, energy, food, water, climate change and health crises along with conflict are limiting. It is time for international and regional understanding of how households and communities can collectively manage these threats in affordable and sustainable ways. There is untapped problem-solving capacity at the international local level if supported by combined food--health systems expertise, innovation, infrastructure and governance. Principles of equity and ethics must apply. The Food in Health Security (FIHS) roundtable aims to develop a Network to facilitate this process.

  13. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  14. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  15. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  16. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  17. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  18. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Deductions... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual...

  19. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Deductions... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual...

  20. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Deductions... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual...

  1. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Deductions... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual...

  2. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  3. 76 FR 65508 - Extension of the Public Comment Period for the Draft Site-Wide Environmental Impact Statement for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...

  4. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  5. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  6. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  7. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  8. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  9. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  10. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  11. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  12. Developing Intelligent System Dynamic Management Instruments on Water-Food-Energy Nexus in Response to Urbanization

    NASA Astrophysics Data System (ADS)

    Tsai, W. P.; Chang, F. J.; Lur, H. S.; Fan, C. H.; Hu, M. C.; Huang, T. L.

    2016-12-01

    Water, food and energy are the most essential natural resources needed to sustain life. Water-Food-Energy Nexus (WFE Nexus) has nowadays caught global attention upon natural resources scarcity and their interdependency. In the past decades, Taiwan's integrative development has undergone drastic changes due to population growth, urbanization and excessive utilization of natural resources. The research intends to carry out interdisciplinary studies on WFE Nexus based on data collection and analysis as well as technology innovation, with a mission to develop a comprehensive solution to configure the synergistic utilization of WFE resources in an equal and secure manner for building intelligent dynamic green cities. This study aims to establish the WFE Nexus through interdisciplinary research. This study will probe the appropriate and secure resources distribution and coopetition relationship by applying and developing techniques of artificial intelligence, system dynamics, life cycle assessment, and synergy management under data mining, system analysis and scenario analysis. The issues of synergy effects, economic benefits and sustainable social development will be evaluated as well. First, we will apply the system dynamics to identify the interdependency indicators of WFE Nexus in response to urbanization and build the dynamic relationship among food production, irrigation water resource and energy consumption. Then, we conduct comparative studies of WFE Nexus between the urbanization and the un-urbanization area (basin) to provide a referential guide for optimal resource-policy nexus management. We expect to the proposed solutions can help achieve the main goals of the research, which is the promotion of human well-being and moving toward sustainable green economy and prosperous society.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.

    Catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The catalysis research carried out at the DOE National Laboratories ranges from very fundamental catalysis science, funded by DOE's Office of Basic Energy Sciences (BES), to applied research and development (R&D)more » in areas such as biomass conversion to fuels and chemicals, fuel cells, and vehicle emission control with primary funding from DOE's Office of Energy Efficiency and Renewable Energy.« less

  14. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  15. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  16. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  17. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  18. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duren, Mike; Aldridge, Hal; Abercrombie, Robert K

    2013-01-01

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution andmore » management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.« less

  19. Impact of Clean Energy R&D on the U.S. Power Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Donohoo-Vallett, Paul; Mai, Trieu; Mowers, Matthew

    The U.S. government, along with other governments, private corporations and organizations, invests significantly in research, development, demonstration and deployment (RDD&D) activities in clean energy technologies, in part to achieve the goal of a clean, secure, and reliable energy system. While specific outcomes and breakthroughs resulting from RDD&D investment are unpredictable, it can be instructive to explore the potential impacts of clean energy RDD&D activities in the power sector and to place those impacts in the context of current and anticipated market trends. This analysis builds on and leverages analysis by the U.S. Department of Energy (DOE) titled “Energy CO 2more » Emissions Impacts of Clean Energy Technology Innovation and Policy” (DOE 2017). Similar to DOE (2017), we explore how additional improvements in cost and performance of clean energy technologies could impact the future U.S. energy system; however, unlike the economy-wide modeling used in DOE (2017) our analysis is focused solely on the electricity sector and applies a different and more highly spatially-resolved electric sector model. More specifically, we apply a scenario analysis approach to explore how assumed further advancements in clean electricity technologies would impact power sector generation mix, electricity system costs, and power sector carbon dioxide (CO 2) emissions.« less

  20. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badwan, Faris M.; Demuth, Scott F

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less

  1. 31 CFR 344.5 - What other provisions apply to subscriptions for Time Deposit securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.5 What other provisions apply to subscriptions for Time Deposit securities? (a) When is my subscription due... subscriptions for Time Deposit securities? 344.5 Section 344.5 Money and Finance: Treasury Regulations Relating...

  2. 31 CFR 344.5 - What other provisions apply to subscriptions for Time Deposit securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.5 What other provisions apply to subscriptions for Time Deposit securities? (a) When is my subscription due... subscriptions for Time Deposit securities? 344.5 Section 344.5 Money and Finance: Treasury Regulations Relating...

  3. 31 CFR 344.5 - What other provisions apply to subscriptions for Time Deposit securities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.5 What other provisions apply to subscriptions for Time Deposit securities? (a) When is my subscription due... subscriptions for Time Deposit securities? 344.5 Section 344.5 Money and Finance: Treasury Regulations Relating...

  4. 31 CFR 344.5 - What other provisions apply to subscriptions for Time Deposit securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.5 What other provisions apply to subscriptions for Time Deposit securities? (a) When is my subscription due... subscriptions for Time Deposit securities? 344.5 Section 344.5 Money and Finance: Treasury Regulations Relating...

  5. 31 CFR 344.5 - What other provisions apply to subscriptions for Time Deposit securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SERVICE U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.5 What other provisions apply to subscriptions for Time Deposit securities? (a) When is my subscription due... subscriptions for Time Deposit securities? 344.5 Section 344.5 Money and Finance: Treasury Regulations Relating...

  6. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...

  7. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  8. Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now

    Science.gov Websites

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  9. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  10. Trip report on IAEA Training Workshop on Implementation of Integrated Management Systems for Research Reactors (T3-TR-45496).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pratt, Richard J.

    2013-11-01

    From 17-21 June 2013, Sandia National Laboratories, Technical Area-V (SNL TA-V) represented the United States Department of Energy/National Nuclear Security Administration (DOE/NNSA) at the International Atomic Energy Agency (IAEA) Training Workshop (T3-TR-45486). This report gives a breakdown of the IAEA regulatory structure for those unfamiliar, and the lessons learned and observations that apply to SNL TA-V that were obtained from the workshop. The Safety Report Series, IAEA workshop final report, and SNL TA-V presentation are included as attachments.

  11. Treatment wetlands in decentralised approaches for linking sanitation to energy and food security.

    PubMed

    Langergraber, Guenter; Masi, Fabio

    2018-02-01

    Treatment wetlands (TWs) are engineered systems that mimic the processes in natural wetlands with the purpose of treating contaminated water. Being a simple and robust technology, TWs are applied worldwide to treat various types of water. Besides treated water for reuse, TWs can be used in resources-oriented sanitation systems for recovering nutrients and carbon, as well as for growing biomass for energy production. Additionally, TWs provide a large number of ecosystem services. Integrating green infrastructure into urban developments can thus facilitate circular economy approaches and has positive impacts on environment, economy and health.

  12. Improving Energy Security for Air Force Installations

    NASA Astrophysics Data System (ADS)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  13. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  14. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  15. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  16. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  17. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  18. China’s Energy Security: The Grand Hedging Strategy

    DTIC Science & Technology

    2010-05-01

    spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s

  19. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts

  20. Towards a Standard for Highly Secure SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlson, R.

    1998-09-25

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less

  1. Energy Structure and Energy Security under Climate Mitigation Scenarios in China

    PubMed Central

    Matsumoto, Ken’ichi

    2015-01-01

    This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094

  2. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    NASA Astrophysics Data System (ADS)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  3. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  4. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  5. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  6. 24 CFR 891.435 - Security deposits.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security deposits. 891.435 Section... Security deposits. This section shall apply to capital advances under the Section 202 Program and the... subpart E of this part, the requirements in § 891.635 also apply. (a) Collection of security deposits. At...

  7. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 151.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool of... a finite time period. Asset-backed security includes any rights or other assets designed to ensure...

  8. 49 CFR 1515.3 - Terms used in this part.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... Applicant means an individual who has applied for one of the security threat assessments identified in 49... for the security threat assessment but TSA later determined that the individual poses a security.... Security threat assessment means the threat assessment for which the applicant has applied, as described in...

  9. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  10. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  11. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  12. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  13. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  14. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  15. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  16. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  17. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  18. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  19. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  20. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  1. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  2. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  3. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  4. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  5. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...

  6. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...

  7. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  8. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  9. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  10. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  11. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  12. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  13. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  14. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  15. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less

  17. Promoting International Energy Security: Volume 4, The Gulf of Guinea

    DTIC Science & Technology

    2012-01-01

    Politicians, both federal and state, routinely 2 For a recent and concise review of stability in Nigeria, see Nigeria: Assessing Risks to Stability (Lewis...Export Customer for ATR 42MP,” Defense News, December 10, 2009. Lewis, Peter M., Nigeria: Assessing Risks to Stability, Washington, D.C.: Center for...especially the risks that U.S.-provided military capabilities might be applied to local civilian populations. While there are signs of improved governance

  18. Leveraging success: applying Interagency Lessons learned to the Joint Air Delivered Nuclear Weapons Acquisition Process

    DTIC Science & Technology

    Effective coordination and communication between the Department of Energy (DOE) and the Department of Defense (DoD) is necessary to ensure that the... nuclear weapons stockpile remains safe, secure, and effective without nuclear testing. The science-based Stockpile Sustainment Program (SSP) is the...method used to sustain and maintain the nuclear stockpile throughout the weapons life cycle. A comprehensive review was conducted of the joint

  19. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...

  20. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...

  1. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 551.40 What definitions apply to this part? Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool... cash within a finite time period. Asset-backed security includes any rights or other assets designed to...

  2. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  3. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  4. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  5. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  6. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  7. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  8. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  9. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  10. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  11. Introduction

    NASA Astrophysics Data System (ADS)

    2014-12-01

    This special issue of Applied Surface Science is a compilation of papers inspired by the symposium on "Surface/Interfaces Characterization and Renewable Energy" held at the 2013 MRS Fall Meeting. Practical uses of renewable energy are one of the greatest technical challenges today. The symposium explored a number of surface and interface-related questions relevant to this overarching theme. Topics from fuel cells to photovoltaics, from water splitting to fundamental and practical issues in charge generation and storage were discussed. The work presented included the use of novel experimental spectroscopic and microscopic analytical techniques, theoretical and computational understanding of interfacial phenomena, characterization of intricate behavior of charged species, as well as molecules and molecular fragments at surfaces and interfaces. It emphasized fundamental understanding of underlying processes, as well as practical devices design and applications of surface and interfacial phenomena related to renewable energy. These subjects are complicated by the transport of photons, electrons, ions, heat, and almost any other form of energy. Given the current concerns of climate change, energy independence and national security, this work is important and of interest to the field of Applied Surface Science. The sixteen papers published in this special issue have all been refereed.

  12. 3 CFR - The Energy Independence and Security Act of 2007

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...

  13. The pivotal and paradoxical role of phosphorus in a resilient water-energy-food security nexus

    USDA-ARS?s Scientific Manuscript database

    We make the case that phosphorus (P) is inextricably linked to an increasingly fragile, interconnected and interdependent ‘nexus’ of water, energy, and food security. While there are many other drivers that influence water, energy, and food security, P plays a unique and under-recognized role within...

  14. Physical parameters collection based on wireless senor network

    NASA Astrophysics Data System (ADS)

    Chen, Xin; Wu, Hong; Ji, Lei

    2013-12-01

    With the development of sensor technology, wireless senor network has been applied in the medical, military, entertainment field and our daily life. But the existing available wireless senor networks applied in human monitoring system still have some problems, such as big power consumption, low security and so on. To improve senor network applied in health monitoring system, the paper introduces a star wireless senor networks based on msp430 and DSP. We design a low-cost heart-rate monitor senor node. The communication between senor node and sink node is realized according to the newest protocol proposed by the IEEE 802.15.6 Task Group. This wireless senor network will be more energy-efficient and faster compared to traditional senor networks.

  15. Security Science as an Applied Science?

    ERIC Educational Resources Information Center

    Smith, Clifton

    2001-01-01

    Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)

  16. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Irene Farnham

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurancemore » Project Plan, Nevada Test Site, Nevada, Revision 4.« less

  17. Towards a more holistic sustainability assessment framework for agro-bioenergy systems — A review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arodudu, Oludunsin, E-mail: Oludunsin.Arodudu@zalf.de; Potsdam University, Institute of Earth and Environmental Sciences, Karl-Liebknecht-Straße 24-25, 14476 Potsdam, Golm; Helming, Katharina

    The use of life cycle assessment (LCA) as a sustainability assessment tool for agro-bioenergy system usually has an industrial agriculture bias. Furthermore, LCA generally has often been criticized for being a decision maker tool which may not consider decision takers perceptions. They are lacking in spatial and temporal depth, and unable to assess sufficiently some environmental impact categories such as biodiversity, land use etc. and most economic and social impact categories, e.g. food security, water security, energy security. This study explored tools, methodologies and frameworks that can be deployed individually, as well as in combination with each other for bridgingmore » these methodological gaps in application to agro-bioenergy systems. Integrating agronomic options, e.g. alternative farm power, tillage, seed sowing options, fertilizer, pesticide, irrigation into the boundaries of LCAs for agro-bioenergy systems will not only provide an alternative agro-ecological perspective to previous LCAs, but will also lead to the derivation of indicators for assessment of some social and economic impact categories. Deploying life cycle thinking approaches such as energy return on energy invested-EROEI, human appropriation of net primary production-HANPP, net greenhouse gas or carbon balance-NCB, water footprint individually and in combination with each other will also lead to further derivation of indicators suitable for assessing relevant environmental, social and economic impact categories. Also, applying spatio-temporal simulation models has a potential for improving the spatial and temporal depths of LCA analysis.« less

  18. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  19. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  20. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  1. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  2. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  3. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  4. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  5. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  6. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  7. NREL: News - New Energy Systems Enhance National Security

    Science.gov Websites

    resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy

  8. Urbanization, Extreme Climate Hazards and Food, Energy Water Security

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, P.; Davidson, D.; McPhearson, T.

    2016-12-01

    Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?

  9. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    PubMed

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  10. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    PubMed Central

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. PMID:28850104

  11. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    PubMed

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.

  12. Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges

    DTIC Science & Technology

    2010-07-01

    the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity

  13. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  14. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  15. Water security for productive economies: Applying an assessment framework in southern Africa

    NASA Astrophysics Data System (ADS)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-08-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.

  16. 75 FR 63867 - DTE Energy; Enrico Fermi Atomic Power Plant Unit 1, Exemption From Certain Security Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...

  17. 75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  18. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  19. 76 FR 37343 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-27

    ... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...

  20. Application of Multipurpose Cadastre to Evaluate Energy Security of Land Parcel (Case Study: Gedung A and Gedung B, Institut Teknologi Sumatra)

    NASA Astrophysics Data System (ADS)

    Alif, S. M.; Nugroho, A. P.; Leksono, B. E.

    2018-03-01

    Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.

  1. Energy Security Strategies: An Analysis of Tanzania and Mozambique

    DTIC Science & Technology

    2016-06-01

    prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall

  2. Global renewable energy-based electricity generation and smart grid system for energy security.

    PubMed

    Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  3. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    PubMed Central

    Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201

  4. Water-Energy-Food Nexus in Asia-Pacific Ring of Fire

    NASA Astrophysics Data System (ADS)

    Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.

    2013-12-01

    Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.

  5. Final LDRD Report: Using Linkography of Cyber Attack Patterns to Inform Honeytoken Placement.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mitchell, Robert; Jarocki, John Charles; Fisher, Andrew N

    The war to establish cyber supremacy continues, and the literature is crowded with strictly technical cyber security measures. We present the results of a three year LDRD project using Linkography, a methodology new to the field of cyber security, we establish the foundation neces- sary to track and profile the microbehavior of humans attacking cyber systems. We also propose ways to leverage this understanding to influence and deceive these attackers. We studied the sci- ence of linkography, applied it to the cyber security domain, implemented a software package to manage linkographs, generated the preprocessing blocks necessary to ingest raw data,more » produced machine learning models, created ontology refinement algorithms and prototyped a web applica- tion for researchers and practitioners to apply linkography. Machine learning produced some of our key results: We trained and validated multinomial classifiers with a real world data set and predicted the attacker's next category of action with 86 to 98% accuracy; dimension reduction techniques indicated that the linkography-based features were among the most powerful. We also discovered ontology refinement algorithms that advanced the state of the art in linkography in general and cyber security in particular. We conclude that linkography is a viable tool for cyber security; we look forward to expanding our work to other data sources and using our prediction results to enable adversary deception techniques. Acknowledgements Thanks to Phil Bennett, Michael Bernard, Jeffrey Bigg, Marshall Daniels, Tyler Dean, David Dug- gan, Carson Kent, Josh Maine, Marci McBride, Nick Peterson, Katie Rodhouse, Asael Sorenson, Roger Suppona, Scott Watson and David Zage. We acknowledge support for this work by the LDRD Program at Sandia National Laboratories. Sandia National Laboratories is a multi-mission laboratory operated by Sandia Corporation for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This page intentionally left blank.« less

  6. A multi-criteria analysis of options for energy recovery from municipal solid waste in India and the UK.

    PubMed

    Yap, H Y; Nixon, J D

    2015-12-01

    Energy recovery from municipal solid waste plays a key role in sustainable waste management and energy security. However, there are numerous technologies that vary in suitability for different economic and social climates. This study sets out to develop and apply a multi-criteria decision making methodology that can be used to evaluate the trade-offs between the benefits, opportunities, costs and risks of alternative energy from waste technologies in both developed and developing countries. The technologies considered are mass burn incineration, refuse derived fuel incineration, gasification, anaerobic digestion and landfill gas recovery. By incorporating qualitative and quantitative assessments, a preference ranking of the alternative technologies is produced. The effect of variations in decision criteria weightings are analysed in a sensitivity analysis. The methodology is applied principally to compare and assess energy recovery from waste options in the UK and India. These two countries have been selected as they could both benefit from further development of their waste-to-energy strategies, but have different technical and socio-economic challenges to consider. It is concluded that gasification is the preferred technology for the UK, whereas anaerobic digestion is the preferred technology for India. We believe that the presented methodology will be of particular value for waste-to-energy decision-makers in both developed and developing countries. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images

    PubMed Central

    Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy

    2015-01-01

    X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935

  8. 78 FR 57922 - American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...

  9. Sandia National Laboratories: National Security Programs

    Science.gov Websites

    policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We

  10. 10 CFR 1015.210 - Liquidation of collateral.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...

  11. 31 CFR 306.111 - Procedure for applying for relief.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or... some other person, the capacity in which he represents the owner. (b) The identity of the security by...

  12. 31 CFR 306.111 - Procedure for applying for relief.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or defacement of a... person, the capacity in which he represents the owner. (b) The identity of the security by title of loan...

  13. Modeling the Voltage Dependence of Electrochemical Reactions at Solid-Solid and Solid-Liquid Interfaces in Batteries

    NASA Astrophysics Data System (ADS)

    Leung, Kevin

    2015-03-01

    Electrochemical reactions at electrode/electrolyte interfaces are critically dependent on the total electrochemical potential or voltage. In this presentation, we briefly review ab initio molecular dynamics (AIMD)-based estimate of voltages on graphite basal and edge planes, and then apply similar concepts to solid-solid interfaces relevant to lithium ion and Li-air batteries. Thin solid films on electrode surfaces, whether naturally occuring during power cycling (e.g., undesirable lithium carbonate on Li-air cathodes) or are artificially introduced, can undergo electrochemical reactions as the applied voltage varies. Here the onset of oxidation of lithium carbonate and other oxide thin films on model gold electrode surfaces is correlated with the electronic structure in the presence/absence of solvent molecules. Our predictions help determine whether oxidation first occurs at the electrode-thin film or electrolyte-thin film interface. Finally, we will critically compare the voltage estimate methodology used in the fuel cell community with the lithium cohesive energy calibration method broadly applied in the battery community, and discuss why they may yield different predictions. This work was supported by Nanostructures for Electrical Energy Storage (NEES), an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DESC0001160. Sandia National Laboratories is a multiprogram laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Deparment of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  14. 3 CFR - Blue Ribbon Commission on America's Nuclear Future

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...

  15. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    ERIC Educational Resources Information Center

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  16. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    DTIC Science & Technology

    2013-11-12

    information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and

  17. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    NASA Astrophysics Data System (ADS)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  18. A Fast lattice-based polynomial digital signature system for m-commerce

    NASA Astrophysics Data System (ADS)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  19. Ensuring the Reliable Operation of the Power Grid: State-Based and Distributed Approaches to Scheduling Energy and Contingency Reserves

    NASA Astrophysics Data System (ADS)

    Prada, Jose Fernando

    Keeping a contingency reserve in power systems is necessary to preserve the security of real-time operations. This work studies two different approaches to the optimal allocation of energy and reserves in the day-ahead generation scheduling process. Part I presents a stochastic security-constrained unit commitment model to co-optimize energy and the locational reserves required to respond to a set of uncertain generation contingencies, using a novel state-based formulation. The model is applied in an offer-based electricity market to allocate contingency reserves throughout the power grid, in order to comply with the N-1 security criterion under transmission congestion. The objective is to minimize expected dispatch and reserve costs, together with post contingency corrective redispatch costs, modeling the probability of generation failure and associated post contingency states. The characteristics of the scheduling problem are exploited to formulate a computationally efficient method, consistent with established operational practices. We simulated the distribution of locational contingency reserves on the IEEE RTS96 system and compared the results with the conventional deterministic method. We found that assigning locational spinning reserves can guarantee an N-1 secure dispatch accounting for transmission congestion at a reasonable extra cost. The simulations also showed little value of allocating downward reserves but sizable operating savings from co-optimizing locational nonspinning reserves. Overall, the results indicate the computational tractability of the proposed method. Part II presents a distributed generation scheduling model to optimally allocate energy and spinning reserves among competing generators in a day-ahead market. The model is based on the coordination between individual generators and a market entity. The proposed method uses forecasting, augmented pricing and locational signals to induce efficient commitment of generators based on firm posted prices. It is price-based but does not rely on multiple iterations, minimizes information exchange and simplifies the market clearing process. Simulations of the distributed method performed on a six-bus test system showed that, using an appropriate set of prices, it is possible to emulate the results of a conventional centralized solution, without need of providing make-whole payments to generators. Likewise, they showed that the distributed method can accommodate transactions with different products and complex security constraints.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zygarlicke, C J; Schmidt, D D; Olson, E S

    Biomass utilization is one solution to our nation’s addiction to oil and fossil fuels. What is needed now is applied fundamental research that will cause economic technology development for the utilization of the diverse biomass resources in the United States. This Energy & Environmental Research Center (EERC) applied fundamental research project contributes to the development of economical biomass utilization for energy, transportation fuels, and marketable chemicals using biorefinery methods that include thermochemical and fermentation processes. The fundamental and basic applied research supports the broad scientific objectives of the U.S. Department of Energy (DOE) Biomass Program, especially in the area ofmore » developing alternative renewable biofuels, sustainable bioenergy, technologies that reduce greenhouse gas emissions, and environmental remediation. Its deliverables include 1) identifying and understanding environmental consequences of energy production from biomass, including the impacts on greenhouse gas production, carbon emission abatement, and utilization of waste biomass residues and 2) developing biology-based solutions that address DOE and national needs related to waste cleanup, hydrogen production from renewable biomass, biological and chemical processes for energy and fuel production, and environmental stewardship. This project serves the public purpose of encouraging good environmental stewardship by developing biomass-refining technologies that can dramatically increase domestic energy production to counter current trends of rising dependence upon petroleum imports. Decreasing the nation’s reliance on foreign oil and energy will enhance national security, the economy of rural communities, and future competitiveness. Although renewable energy has many forms, such as wind and solar, biomass is the only renewable energy source that can be governed through agricultural methods and that has an energy density that can realistically compete with, or even replace, petroleum and other fossil fuels in the near future. It is a primary domestic, sustainable, renewable energy resource that can supply liquid transportation fuels, chemicals, and energy that are currently produced from fossil sources, and it is a sustainable resource for a hydrogen-based economy in the future.« less

  1. Science & Technology Review October/November 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orme, C.; Meissner, C.; Kotta, P. A.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  2. Science & Technology Review January/February 2018

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duoss, E. B.; Meissner, C. N.; Kotta, P. R.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  3. NNDC Stand: Activities and Services of the National Nuclear Data Center

    NASA Astrophysics Data System (ADS)

    Pritychenko, B.; Arcilla, R.; Burrows, T. W.; Dunford, C. L.; Herman, M. W.; McLane, V.; Obložinský, P.; Sonzogni, A. A.; Tuli, J. K.; Winchell, D. F.

    2005-05-01

    The National Nuclear Data Center (NNDC) collects, evaluates, and disseminates nuclear physics data for basic nuclear research, applied nuclear technologies including energy, shielding, medical and homeland security. In 2004, to answer the needs of nuclear data users community, NNDC completed a project to modernize data storage and management of its databases and began offering new nuclear data Web services. The principles of database and Web application development as well as related nuclear reaction and structure database services are briefly described.

  4. Science & Technology Review January/February 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orme, C. A.; Meissner, C. N.; Kotta, P. R.

    2016-01-18

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  5. Science & Technology Review June 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogt, Ramona L.; Chinn, Ken B.; Kotta, Paul

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  6. Science & Technology Review January/February 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogt, R. L.; Meissner, C. N.; Kotta, P. R.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  7. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security

  8. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  9. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  10. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  11. Marking the enemy, marking the other : the intersection of national security and diversity.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, G. D.

    2001-01-01

    In recent years, Los Alamos National Laboratory (LANL) has alternately been criticized for being too cozy with foreign scientists and too quick to scapegoat or profile workers with foreign ancestries. In the wake of the investigation of alleged espionage that focused on Taiwanese-born American nuclear scientist Wen Ho Lee, political leaders and the news media questioned the Lab's commitment to security and the wisdom of its close collaborations with foreign scientists. Wen Ho Lee was of course an American citizen and not a foreign scientist, and many of his supporters felt that his Asian ancestry made him too convenient ofmore » a target in a case focused on Chinese espionage. Thus, charges of racial profiling and scapegoating were also aimed at the Lab, the Department of Energy, and the Federal Bureau of Investigation. In the wake of the controversy some Asian American groups have been encouraging a boycott of the national laboratories run by the Department of Energy, and at Los Alamos, the number of Asian Americans applying for jobs, post docs, and student positions is substantially down.« less

  12. 2013 SRNL LDRD Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McWhorter, S.

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation inmore » National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.« less

  13. 78 FR 31997 - Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...

  14. 76 FR 30326 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...

  15. Transportation Energy Security and Climate Change Mitigation Act of 2007

    DOT National Transportation Integrated Search

    2008-09-29

    The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Joan F.

    The US Department of Energy’s (DOE’s) Oak Ridge Reservation (ORR) is located in Roane and Anderson counties in East Tennessee, about 40 km (25 miles) from Knoxville. ORR is one of DOE’s most unique and complex sites. It encompasses three major facilities and thousands of employees that perform every mission in the DOE portfolio—energy research, environmental restoration, national security, nuclear fuel supply, reindustrialization, science education, basic and applied research in areas important to US security, and technology transfer. ORR was established in the early 1940s as part of the Manhattan Project for the purposes of enriching uranium and pioneering methodsmore » for producing and separating plutonium. Today, scientists at the Oak Ridge National Laboratory (ORNL), DOE’s largest multipurpose national laboratory, conduct world-leading research in advanced materials, alternative fuels, climate change, and supercomputing. The Y-12 National Security Complex (Y-12 or Y-12 Complex) is vital to maintaining the safety, security, and effectiveness of the US nuclear weapons stockpile and reducing the global threat posed by nuclear proliferation and terrorism. The East Tennessee Technology Park (ETTP), a former uranium enrichment complex, is being transitioned to a clean, revitalized industrial park.« less

  17. Lessons Learned from Comprehensive Energy and Water Evaluations at U.S. Army Campus Installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodward, James C.; Dahowski, Robert T.

    The U.S. Department of Energy’s Pacific Northwest National Laboratory has engaged in a multi-year collaboration with the U.S. Army to support comprehensive energy and water evaluations at large Army campus installations. Initiated to help the Army achieve compliance with facility evaluation requirements dictated by the Energy Independence and Security Act of 2007, this effort has resulted in the evaluation of 530 buildings at 14 installations across the U.S., and the identification of annual savings potential of over 212 billion Btu of energy and 29 million gallons of water. This paper highlights the nature of the evaluation process applied at thesemore » Army installations and discusses a number of key findings that can be considered for ongoing and future evaluations at Army and other federal agency facilities, particularly those buildings within campus settings.« less

  18. Pore-scale simulation of calcium carbonate precipitation and dissolution under highly supersaturated conditions in a microfludic pore network

    NASA Astrophysics Data System (ADS)

    Yoon, H.; Dewers, T. A.; Valocchi, A. J.; Werth, C. J.

    2011-12-01

    Dissolved CO2 during geological CO2 storage may react with minerals in fractured rocks or confined aquifers and cause mineral precipitation. The overall rate of reaction can be affected by coupled processes among hydrodynamics, transport, and reactions at pore-scale. Pore-scale models of coupled fluid flow, reactive transport, and CaCO3 precipitation and dissolution are applied to account for transient experimental results of CaCO3 precipitation and dissolution under highly supersaturated conditions in a microfluidic pore network (i.e., micromodel). Pore-scale experiments in the micromodel are used as a basis for understanding coupled physics of systems perturbed by geological CO2 injection. In the micromodel, precipitation is induced by transverse mixing along the centerline in pore bodies. Overall, the pore-scale model qualitatively captured the governing physics of reactions such as precipitate morphology, precipitation rate, and maximum precipitation area in first few pore spaces. In particular, we found that proper estimation of the effective diffusion coefficient and the reactive surface area is necessary to adequately simulate precipitation and dissolution rates. As the model domain increases, the effect of flow patterns affected by precipitation on the overall reaction rate also increases. The model is also applied to account for the effect of different reaction rate laws on mineral precipitation and dissolution at pore-scale. Reaction rate laws tested include the linear rate law, nonlinear power law, and newly-developed rate law based on in-situ measurements at nano scale in the literature. Progress on novel methods for upscaling pore-scale models for reactive transport are discussed, and are being applied to mineral precipitation patterns observed in natural analogues. H.Y. and T. D. were supported as part of the Center for Frontiers of Subsurface Energy Security, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001114. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  19. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy

  20. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  1. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  2. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  3. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  4. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  5. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...

  6. 6 CFR Appendix A to Part 21 - Activities to Which This Part Applies

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...

  7. 6 CFR Appendix A to Part 21 - Activities to Which This Part Applies

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...

  8. 6 CFR Appendix A to Part 21 - Activities to Which This Part Applies

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...

  9. 6 CFR Appendix A to Part 21 - Activities to Which This Part Applies

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...

  10. 6 CFR Appendix A to Part 21 - Activities to Which This Part Applies

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Activities to Which This Part Applies A Appendix A to Part 21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL...

  11. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  12. Applied Mathematics at the U.S. Department of Energy: Past, Present and a View to the Future

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, D L; Bell, J; Estep, D

    2008-02-15

    Over the past half-century, the Applied Mathematics program in the U.S. Department of Energy's Office of Advanced Scientific Computing Research has made significant, enduring advances in applied mathematics that have been essential enablers of modern computational science. Motivated by the scientific needs of the Department of Energy and its predecessors, advances have been made in mathematical modeling, numerical analysis of differential equations, optimization theory, mesh generation for complex geometries, adaptive algorithms and other important mathematical areas. High-performance mathematical software libraries developed through this program have contributed as much or more to the performance of modern scientific computer codes as themore » high-performance computers on which these codes run. The combination of these mathematical advances and the resulting software has enabled high-performance computers to be used for scientific discovery in ways that could only be imagined at the program's inception. Our nation, and indeed our world, face great challenges that must be addressed in coming years, and many of these will be addressed through the development of scientific understanding and engineering advances yet to be discovered. The U.S. Department of Energy (DOE) will play an essential role in providing science-based solutions to many of these problems, particularly those that involve the energy, environmental and national security needs of the country. As the capability of high-performance computers continues to increase, the types of questions that can be answered by applying this huge computational power become more varied and more complex. It will be essential that we find new ways to develop and apply the mathematics necessary to enable the new scientific and engineering discoveries that are needed. In August 2007, a panel of experts in applied, computational and statistical mathematics met for a day and a half in Berkeley, California to understand the mathematical developments required to meet the future science and engineering needs of the DOE. It is important to emphasize that the panelists were not asked to speculate only on advances that might be made in their own research specialties. Instead, the guidance this panel was given was to consider the broad science and engineering challenges that the DOE faces and identify the corresponding advances that must occur across the field of mathematics for these challenges to be successfully addressed. As preparation for the meeting, each panelist was asked to review strategic planning and other informational documents available for one or more of the DOE Program Offices, including the Offices of Science, Nuclear Energy, Fossil Energy, Environmental Management, Legacy Management, Energy Efficiency & Renewable Energy, Electricity Delivery & Energy Reliability and Civilian Radioactive Waste Management as well as the National Nuclear Security Administration. The panelists reported on science and engineering needs for each of these offices, and then discussed and identified mathematical advances that will be required if these challenges are to be met. A review of DOE challenges in energy, the environment and national security brings to light a broad and varied array of questions that the DOE must answer in the coming years. A representative subset of such questions includes: (1) Can we predict the operating characteristics of a clean coal power plant? (2) How stable is the plasma containment in a tokamak? (3) How quickly is climate change occurring and what are the uncertainties in the predicted time scales? (4) How quickly can an introduced bio-weapon contaminate the agricultural environment in the US? (5) How do we modify models of the atmosphere and clouds to incorporate newly collected data of possibly of new types? (6) How quickly can the United States recover if part of the power grid became inoperable? (7) What are optimal locations and communication protocols for sensing devices in a remote-sensing network? (8) How can new materials be designed with a specified desirable set of properties? In comparing and contrasting these and other questions of importance to DOE, the panel found that while the scientific breadth of the requirements is enormous, a central theme emerges: Scientists are being asked to identify or provide technology, or to give expert analysis to inform policy-makers that requires the scientific understanding of increasingly complex physical and engineered systems. In addition, as the complexity of the systems of interest increases, neither experimental observation nor mathematical and computational modeling alone can access all components of the system over the entire range of scales or conditions needed to provide the required scientific understanding.« less

  13. Strategic Response to Energy-Related Security Threats in the US Department of Defense

    DTIC Science & Technology

    2014-10-15

    generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis

  14. Lithofacies and Diagenetic Controls on Formation-scale Mechanical, Transport, and Sealing Behavior of Caprocks: A Case Study of the Morrow shale and Thirteen Finger Limestone, Farnsworth Unit, Texas

    NASA Astrophysics Data System (ADS)

    Trujillo, N. A.; Heath, J. E.; Mozley, P.; Dewers, T. A.; Cather, M.

    2016-12-01

    Assessment of caprock sealing behavior for secure CO2 storage is a multiscale endeavor. Sealing behavior arises from the nano-scale capillarity of pore throats, but sealing lithologies alone do not guarantee an effective seal since bypass systems, such as connected, conductive fractures can compromise the integrity of the seal. We apply pore-to-formation-scale data to characterize the multiscale caprock sealing behavior of the Morrow shale and Thirteen Finger Limestone. This work is part of the Southwest Regional Partnership on Carbon Sequestration's Phase III project at the Farnsworth Unit, Texas. The caprock formations overlie the Morrow sandstone, the target for enhanced oil recovery and injection of over one million metric tons of anthropogenically-sourced CO2. Methods include: focused ion beam-scanning electron microscopy; laser scanning confocal microscopy; electron and optical petrography; multi-stress path mechanical testing and constitutive modeling; core examinations of sedimentary structures and fractures; and a noble gas profile for formation-scale transport of the sealing lihologies and the reservoir. We develop relationships between diagenetic characteristics of lithofacies to mechanical and petrophysical measurements of the caprocks. The results are applied as part of a caprock sealing behavior performance assessment. Funding for this project is provided by the U.S. Department of Energy's National Energy Technology Laboratory through the Southwest Regional Partnership on Carbon Sequestration (SWP) under Award No. DE-FC26-05NT42591. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  15. 78 FR 40131 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-03

    ... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...

  16. 77 FR 35366 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...

  17. Integrated modeling approach for optimal management of water, energy and food security nexus

    NASA Astrophysics Data System (ADS)

    Zhang, Xiaodong; Vesselinov, Velimir V.

    2017-03-01

    Water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-period socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. The obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.

  18. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    PubMed

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  19. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    PubMed Central

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  20. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  1. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  2. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted...

  3. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  4. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  5. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  6. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  7. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  8. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  9. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  10. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  11. Assurance of energy efficiency and data security for ECG transmission in BASNs.

    PubMed

    Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa

    2012-04-01

    With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less

  13. Instrumentation, Control, and Intelligent Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-09-01

    Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less

  14. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  15. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  16. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  17. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  18. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  19. The Energy and Security Nexus: A Strategic Dilemma

    DTIC Science & Technology

    2011-07-15

    substantial natural gas reserves which can be exploited if we solve problems associated with hydraulic fracturing and competition over water. Other parts of...between energy, water, and security. Sometimes water is diverted to produce energy as in the case of hydropower, hydraulic fracturing , irrigation of

  20. 77 FR 65602 - Chimera Energy Corporation; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Chimera Energy Corporation; Order of... lack of current and accurate information concerning the securities of Chimera Energy Corporation (``Chimera'') because of questions regarding the accuracy of statements by Chimera in press releases to...

  1. 20 CFR 416.1141 - When the presumed value rule applies.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ....1141 Section 416.1141 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1141 When the presumed value rule applies. The presumed value rule applies whenever we must count in-kind support and...

  2. 20 CFR 416.1141 - When the presumed value rule applies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....1141 Section 416.1141 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416.1141 When the presumed value rule applies. The presumed value rule applies whenever we must count in-kind support and...

  3. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations

    PubMed Central

    Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830

  4. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations.

    PubMed

    Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.

  5. 76 FR 30325 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ..., 2011. For the Department of Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for [[Page 30326

  6. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  7. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  8. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  9. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  10. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  11. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  12. 76 FR 45548 - Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-29

    ... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...

  13. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  14. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  15. Using a water-food-energy nexus approach for optimal irrigation management during drought events in Nebraska

    NASA Astrophysics Data System (ADS)

    Campana, P. E.; Zhang, J.; Yao, T.; Melton, F. S.; Yan, J.

    2017-12-01

    Climate change and drought have severe impacts on the agricultural sector affecting crop yields, water availability, and energy consumption for irrigation. Monitoring, assessing and mitigating the effects of climate change and drought on the agricultural and energy sectors are fundamental challenges that require investigation for water, food, and energy security issues. Using an integrated water-food-energy nexus approach, this study is developing a comprehensive drought management system through integration of real-time drought monitoring with real-time irrigation management. The spatially explicit model developed, GIS-OptiCE, can be used for simulation, multi-criteria optimization and generation of forecasts to support irrigation management. To demonstrate the value of the approach, the model has been applied to one major corn region in Nebraska to study the effects of the 2012 drought on crop yield and irrigation water/energy requirements as compared to a wet year such as 2009. The water-food-energy interrelationships evaluated show that significant water volumes and energy are required to halt the negative effects of drought on the crop yield. The multi-criteria optimization problem applied in this study indicates that the optimal solutions of irrigation do not necessarily correspond to those that would produce the maximum crop yields, depending on both water and economic constraints. In particular, crop pricing forecasts are extremely important to define the optimal irrigation management strategy. The model developed shows great potential in precision agriculture by providing near real-time data products including information on evapotranspiration, irrigation volumes, energy requirements, predicted crop growth, and nutrient requirements.

  16. Energy Relations in Russia: Administration, Politics and Security

    ERIC Educational Resources Information Center

    Makarychev, Andrey

    2005-01-01

    This chapter analyses energy relations through a prism of three interlinked concepts: administration, politics and security. This triad describes the basic approaches to questions about technical, politicised and securitised energy. These three concepts are logically linked to one another and represent an elementary matrix; a prism through which…

  17. 10 CFR 824.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Purpose and scope. 824.1 Section 824.1 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... Act relating to the security or safeguarding of Restricted Data or other classified information, shall...

  18. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  19. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  20. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  1. 77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Amended Record of Decision. SUMMARY: The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) is...

  2. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  3. 78 FR 8682 - Americas Energy Company-AECo; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Americas Energy Company--AECo; Order of... lack of current and accurate information concerning the securities of Americas Energy Company-AECo (``Americas'') because Americas has not filed any periodic reports since the period ended September 30, 2011...

  4. Hydrogen Production from Nuclear Energy

    NASA Astrophysics Data System (ADS)

    Walters, Leon; Wade, Dave

    2003-07-01

    During the past decade the interest in hydrogen as transportation fuel has greatly escalated. This heighten interest is partly related to concerns surrounding local and regional air pollution from the combustion of fossil fuels along with carbon dioxide emissions adding to the enhanced greenhouse effect. More recently there has been a great sensitivity to the vulnerability of our oil supply. Thus, energy security and environmental concerns have driven the interest in hydrogen as the clean and secure alternative to fossil fuels. Remarkable advances in fuel-cell technology have made hydrogen fueled transportation a near-term possibility. However, copious quantities of hydrogen must be generated in a manner independent of fossil fuels if environmental benefits and energy security are to be achieved. The renewable technologies, wind, solar, and geothermal, although important contributors, simply do not comprise the energy density required to deliver enough hydrogen to displace much of the fossil transportation fuels. Nuclear energy is the only primary energy source that can generate enough hydrogen in an energy secure and environmentally benign fashion. Methods of production of hydrogen from nuclear energy, the relative cost of hydrogen, and possible transition schemes to a nuclear-hydrogen economy will be presented.

  5. Science and Technology Review April/May 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nikolic, R J

    2011-03-03

    At Lawrence Livermore National Laboratory, the focus is on science and technology research to ensure the nation's security. That expertise is also applied to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight time a year to communicate, to a broad audience, the Laboratory's scientific and technological accomplishments in fulfilling its primary missions. The publication's goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. In this issue for April/May 2011, the features are 'Dealing with the Nonlinear Battlefield' andmore » 'From Video to Knowledge.' Research highlights are 'Kinetic Models Predict Biofuel Efficiency,' Going Deep with MEGa-Rays' and 'Energy on Demand.'« less

  6. Threat detection of liquid explosives and precursors from their x-ray scattering pattern using energy dispersive detector technology

    NASA Astrophysics Data System (ADS)

    Kehres, Jan; Lyksborg, Mark; Olsen, Ulrik L.

    2017-09-01

    Energy dispersive X-ray diffraction (EDXRD) can be applied for identification of liquid threats in luggage scanning in security applications. To define the instrumental design, the framework for data reduction and analysis and test the performance of the threat detection in various scenarios, a flexible laboratory EDXRD test setup was build. A data set of overall 570 EDXRD spectra has been acquired for training and testing of threat identification algorithms. The EDXRD data was acquired with limited count statistics and at multiple detector angles and merged after correction and normalization. Initial testing of the threat detection algorithms with this data set indicate the feasibility of detection levels of > 95 % true positive with < 6 % false positive alarms.

  7. Office of Educational Programs 2009 Summer Internship Symposium and Poster Session

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    White,K.; Morris, M.; Osiecki, C.

    2009-08-06

    Brookhaven National Laboratory offers college and pre-college faculty and students many opportunities to participate in Laboratory educational programs. The programs administered by the Office of Educational Programs are primarily funded by the U.S. Department of Energy, Brookhaven Science Associates, and other federal and non-federal agencies. Faculty and student research participation is welcomed in physical and life sciences, computer science and engineering, as well as in a variety of applied research areas relating to alternative energy, conservation, environmental technology, and national security. Visit our website at http://www.bnl.gov/education for application deadlines and more details. Following is a description of the programs managedmore » by the Office of Educational Programs.« less

  8. Resilience of natural gas networks during conflicts, crises and disruptions.

    PubMed

    Carvalho, Rui; Buzna, Lubos; Bono, Flavio; Masera, Marcelo; Arrowsmith, David K; Helbing, Dirk

    2014-01-01

    Human conflict, geopolitical crises, terrorist attacks, and natural disasters can turn large parts of energy distribution networks offline. Europe's current gas supply network is largely dependent on deliveries from Russia and North Africa, creating vulnerabilities to social and political instabilities. During crises, less delivery may mean greater congestion, as the pipeline network is used in ways it has not been designed for. Given the importance of the security of natural gas supply, we develop a model to handle network congestion on various geographical scales. We offer a resilient response strategy to energy shortages and quantify its effectiveness for a variety of relevant scenarios. In essence, Europe's gas supply can be made robust even to major supply disruptions, if a fair distribution strategy is applied.

  9. 15 CFR 700.20 - Use of priority ratings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities for Energy Programs § 700.20 Use of... maintenance of energy facilities. ...

  10. Fuel Cycle Technologies 2014 Achievement Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong, Bonnie C.

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less

  11. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.

    PubMed

    Zhang, Guomei; Sun, Hao

    2016-12-16

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.

  12. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks

    PubMed Central

    Zhang, Guomei; Sun, Hao

    2016-01-01

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282

  13. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  14. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

    PubMed Central

    Hu, Hequn; Liao, Xuewen

    2017-01-01

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540

  15. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    DTIC Science & Technology

    2015-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...December 2015 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...the programs. While acknowledging the expanding role of the programs, the findings indicate a need for reforms in the export -control mechanisms

  16. Advantages and Disadvantages of the National Security Personnel System as Compared to the General Schedule Personnel System

    DTIC Science & Technology

    2005-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT Advantages and Disadvantages of the National Security...Applied Project 4. TITLE AND SUBTITLE: Advantages and Disadvantages of the National Security Personnel System as Compared to the General...compare and contrast the advantages and disadvantages of the new personnel system (NSPS) versus the General Schedule (GS) personnel system currently

  17. NEVADA TEST SITE WASTE ACCEPTANCE CRITERIA, JUNE 2006

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    U.S. DEPARTMENT OF ENERGY, NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site (NTS) will accept low-level radioactive (LLW) and mixed waste (MW) for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NTS Area 3 and Area 5 Radioactive Waste Management Complex (RWMC) for storage or disposal.

  18. Nevada Test Site Waste Acceptance Criteria

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site (NTS) will accept low-level radioactive (LLW) and mixed waste (MW) for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NTS Area 3 and Area 5 Radioactive Waste Management Complex (RWMC) for storage or disposal.

  19. Cohesive model applied to fracture propagation in Indiana Limestone

    NASA Astrophysics Data System (ADS)

    Dewers, T. A.; Rinehart, A. J.; Bishop, J. E.

    2014-12-01

    We apply a cohesive fracture (CF) model to results of short-rod (SR), notched 3-point-bend (N3PB) tests, and Brazil tests in Indiana Limestone. Calibration and validation of the model are performed within a commercial finite element modeling platform. By using a linear traction-displacement softening response for a defined fracture-opening displacement (w1) following peak tensile stress (σcrit), the CF model numerically lumps different spatially distributed inelastic processes occurring at and around fracture tips into a thin zone within an elastic domain. Both the SR and the N3PB test specimen geometries use a notch partway through the sample to control the location of fracture propagation. We develop a mesh for both the SR and N3PB geometries with a narrow cohesive zone in the center of notches. From the Brazil tests, we find a tensile splitting stress (σsplit) of 5.9 MPa. We use a σsplit as the peak tensile stress (σcrit) for all simulations. The Young's modulus (E) and the critical crack opening distance (w1) of the CF model are calibrated against the SR data. The model successfully captures the elastic, yield, peak, and initial and late failure behavior and compares favorably against the N3PB tests. Differences in force-displacement and crack propagation are primarily caused by: more mixed-mode (shear and opening) crack propagation in N3PB than in SR tests, causing a higher peak; and transition from compression (high E) to tension (low E) in a larger volume of the N3PB sample than in the SR geometry. This material is based upon work supported as part of the Center for Frontiers of Subsurface Energy Security, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001114. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  20. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  1. 31 CFR 306.96 - Nontransferable securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.96.... SECURITIES Attorneys in Fact § 306.96 Nontransferable securities. The provisions of this subpart shall apply to nontransferable securities, subject only to the limitations imposed by the terms of the particular...

  2. 31 CFR 306.96 - Nontransferable securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.96.... SECURITIES Attorneys in Fact § 306.96 Nontransferable securities. The provisions of this subpart shall apply to nontransferable securities, subject only to the limitations imposed by the terms of the particular...

  3. 31 CFR 306.96 - Nontransferable securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.96.... SECURITIES Attorneys in Fact § 306.96 Nontransferable securities. The provisions of this subpart shall apply to nontransferable securities, subject only to the limitations imposed by the terms of the particular...

  4. 31 CFR 306.96 - Nontransferable securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.96.... SECURITIES Attorneys in Fact § 306.96 Nontransferable securities. The provisions of this subpart shall apply to nontransferable securities, subject only to the limitations imposed by the terms of the particular...

  5. 32 CFR 154.42 - Evaluation of personnel security information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  6. The climate change and energy security nexus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategicmore » Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.« less

  7. Systematic implementation of spectral CT with a photon counting detector for liquid security inspection

    NASA Astrophysics Data System (ADS)

    Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li

    2018-06-01

    X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.

  8. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide andmore » the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.« less

  9. Arctic Climate Systems Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ivey, Mark D.; Robinson, David G.; Boslough, Mark B.

    2015-03-01

    This study began with a challenge from program area managers at Sandia National Laboratories to technical staff in the energy, climate, and infrastructure security areas: apply a systems-level perspective to existing science and technology program areas in order to determine technology gaps, identify new technical capabilities at Sandia that could be applied to these areas, and identify opportunities for innovation. The Arctic was selected as one of these areas for systems level analyses, and this report documents the results. In this study, an emphasis was placed on the arctic atmosphere since Sandia has been active in atmospheric research in themore » Arctic since 1997. This study begins with a discussion of the challenges and benefits of analyzing the Arctic as a system. It goes on to discuss current and future needs of the defense, scientific, energy, and intelligence communities for more comprehensive data products related to the Arctic; assess the current state of atmospheric measurement resources available for the Arctic; and explain how the capabilities at Sandia National Laboratories can be used to address the identified technological, data, and modeling needs of the defense, scientific, energy, and intelligence communities for Arctic support.« less

  10. The Design Process of Physical Security as Applied to a U.S. Border Point of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1998-10-26

    This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.

  11. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  12. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  13. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  14. 76 FR 77578 - In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-13

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...

  15. 77 FR 5865 - American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...

  16. U.S. Energy Security -- The Campaign We Must Win

    DTIC Science & Technology

    2009-03-23

    population.2 Our industry, commerce, transportation and economic livelihood require the uninterrupted supply of energy. In all its forms, energy underpins...mitigate our vulnerability to unstable oil prices. Rising global demand and competition threatens our ability to secure long term economical access... economically while strengthening our enemies. This research paper addresses the effectiveness of U.S. energy policy and proposes a new approach that seeks to

  17. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ... field are encouraged to apply: Port Operations Management/Port Authorities. Maritime Security Operations and Training. Marine Salvage Operations. Maritime Security Related Academics/Public Policy. Marine Facilities and Terminals Security Management. Vessel Owners/Operators. Maritime Labor. International and...

  18. 17 CFR 250.40 - Exemption of certain acquisitions from nonaffiliates.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... acquisition of any voting securities or securities convertible into voting securities if after giving effect...)(1) shall not apply to the acquisition of securities of a company whose principal business is the... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain...

  19. 31 CFR 344.10 - What are Special Zero Interest securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero.... The provisions of subpart B of this part (Time Deposit securities) apply except as specified in... zero interest securities available after October 28, 1996, are zero interest Time Deposit securities...

  20. 31 CFR 344.10 - What are Special Zero Interest securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero.... The provisions of subpart B of this part (Time Deposit securities) apply except as specified in... zero interest securities available after October 28, 1996, are zero interest Time Deposit securities...

  1. 31 CFR 344.10 - What are Special Zero Interest securities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero.... The provisions of subpart B of this part (Time Deposit securities) apply except as specified in... zero interest securities available after October 28, 1996, are zero interest Time Deposit securities...

  2. Impact of Training and Mentoring Activities Which are Given to The Level of Interest And Capability Industrial Target Group In Adopting SNI ISO 50001

    NASA Astrophysics Data System (ADS)

    Apriyanti, Dwi; Nugrahanto, Aris Ida; Shrestha, Sanjaya

    2018-02-01

    Energy consumption in the industrial sector in Indonesia is increasing as a result of population and economic growth. The government is aware of this and seeks the answer to improve industrial competitiveness and increase energy security through energy efficiency programs. Some industries have implemented energy efficiency programs as ad-hoc, but have not applied systematically, so the results are not optimal. Through the cooperation of the Ministry of Energy and Mineral Resources (ESDM) with the United Nations Industrial Development Organization (UNIDO), there has been training and mentoring activities for industry on Energy Management System (EnMS) based on SNI ISO 50001. Based on the results of identification through survey conducted to 226 industry that has attended the training and 64 industries that have been trained and received assistance, obtained data that 45% of industries have fully adopted EnMS SNI ISO 50001, 17% industry has adopted a part of EnMS SNI ISO 50001 and 38% industry does not adopt EnMS SNI ISO 50001 altogether.

  3. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  4. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  5. Department of the Navy Transformation Plan FY 2014-2016

    DTIC Science & Technology

    2014-01-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our

  6. Pressure evolution of electrical transport in the 3D topological insulator (Bi,Sb)2(Te,Se)3

    NASA Astrophysics Data System (ADS)

    Jeffries, Jason; Butch, N. P.; Vohra, Y. K.; Weir, S. T.

    2014-03-01

    The group V-VI compounds--like Bi2Se3, Sb2Te3, or Bi2Te3--have been widely studied in recent years for their bulk topological properties. The high-Z members of this series form with the same crystal structure, and are therefore amenable to isostructural substitution studies. It is possible to tune the Bi-Sb and Te-Se ratios such that the material exhibits insulating behavior, thus providing an excellent platform for understanding how a topological insulator evolves with applied pressure. We report our observations of the pressure-dependent electrical transport and compare that behavior with other binary V-VI compounds under pressure. Lawrence Livermore National Laboratory is operated by Lawrence Livermore National Security, LLC, for the U.S. Department of Energy, National Nuclear Security Administration under Contract DE-AC52-07NA27344.

  7. National and International Security Applications of Cryogenic Detectors—Mostly Nuclear Safeguards

    NASA Astrophysics Data System (ADS)

    Rabin, Michael W.

    2009-12-01

    As with science, so with security—in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma-ray, neutron, and alpha-particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invisible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  8. 78 FR 5438 - Proposed Agency Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Proposed Agency Information Collection AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Notice and... techniques or other forms of information technology. DATES: Comments regarding this proposed information...

  9. Spectral unfolding of fast neutron energy distributions

    NASA Astrophysics Data System (ADS)

    Mosby, Michelle; Jackman, Kevin; Engle, Jonathan

    2015-10-01

    The characterization of the energy distribution of a neutron flux is difficult in experiments with constrained geometry where techniques such as time of flight cannot be used to resolve the distribution. The measurement of neutron fluxes in reactors, which often present similar challenges, has been accomplished using radioactivation foils as an indirect probe. Spectral unfolding codes use statistical methods to adjust MCNP predictions of neutron energy distributions using quantified radioactive residuals produced in these foils. We have applied a modification of this established neutron flux characterization technique to experimentally characterize the neutron flux in the critical assemblies at the Nevada National Security Site (NNSS) and the spallation neutron flux at the Isotope Production Facility (IPF) at Los Alamos National Laboratory (LANL). Results of the unfolding procedure are presented and compared with a priori MCNP predictions, and the implications for measurements using the neutron fluxes at these facilities are discussed.

  10. Lane-changing behavior and its effect on energy dissipation using full velocity difference model

    NASA Astrophysics Data System (ADS)

    Wang, Jian; Ding, Jian-Xun; Shi, Qin; Kühne, Reinhart D.

    2016-07-01

    In real urban traffic, roadways are usually multilane with lane-specific velocity limits. Most previous researches are derived from single-lane car-following theory which in the past years has been extensively investigated and applied. In this paper, we extend the continuous single-lane car-following model (full velocity difference model) to simulate the three-lane-changing behavior on an urban roadway which consists of three lanes. To meet incentive and security requirements, a comprehensive lane-changing rule set is constructed, taking safety distance and velocity difference into consideration and setting lane-specific speed restriction for each lane. We also investigate the effect of lane-changing behavior on distribution of cars, velocity, headway, fundamental diagram of traffic and energy dissipation. Simulation results have demonstrated asymmetric lane-changing “attraction” on changeable lane-specific speed-limited roadway, which leads to dramatically increasing energy dissipation.

  11. Integrated Modeling Approach for Optimal Management of Water, Energy and Food Security Nexus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Xiaodong; Vesselinov, Velimir Valentinov

    We report that water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-periodmore » socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. Lastly, the obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.« less

  12. Integrated Modeling Approach for Optimal Management of Water, Energy and Food Security Nexus

    DOE PAGES

    Zhang, Xiaodong; Vesselinov, Velimir Valentinov

    2016-12-28

    We report that water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-periodmore » socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. Lastly, the obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.« less

  13. Use of simulation to optimize the pinhole diameter and mask thickness for an x-ray backscatter imaging system

    NASA Astrophysics Data System (ADS)

    Vella, A.; Munoz, Andre; Healy, Matthew J. F.; Lane, David; Lockley, D.

    2017-08-01

    The PENELOPE Monte Carlo simulation code was used to determine the optimum thickness and aperture diameter of a pinhole mask for X-ray backscatter imaging in a security application. The mask material needs to be thick enough to absorb most X-rays, and the pinhole must be wide enough for sufficient field of view whilst narrow enough for sufficient image spatial resolution. The model consisted of a fixed geometry test object, various masks with and without pinholes, and a 1040 x 1340 pixels' area detector inside a lead lined camera housing. The photon energy distribution incident upon masks was flat up to selected energy limits. This artificial source was used to avoid the optimisation being specific to any particular X-ray source technology. The pixelated detector was modelled by digitising the surface area represented by the PENELOPE phase space file and integrating the energies of the photons impacting within each pixel; a MATLAB code was written for this. The image contrast, signal to background ratio, spatial resolution, and collimation effect were calculated at the simulated detector as a function of pinhole diameter and various thicknesses of mask made of tungsten, tungsten/epoxy composite or bismuth alloy. A process of elimination was applied to identify suitable masks for a viable X-ray backscattering security application.

  14. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  15. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  16. Engage States on Energy Assurance and Energy Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kara Colton; John Ratliff; Sue Gander

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less

  17. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Training and qualification for security skills and... SECURITY INTERESTS Protective Force Personnel § 1046.15 Training and qualification for security skills and... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  18. Idaho National Laboratory 2015-2023 Ten-Year Site Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheryl Morton; Elizabeth Connell; Bill Buyers

    2013-09-01

    This Idaho National Laboratory (INL) Ten-Year Site Plan (TYSP) describes the strategy for accomplishing the long-term objective of sustaining the INL infrastructure to meet the Department of Energy Office of Nuclear Energy (DOE-NE) mission: to promote nuclear power as a resource capable of making major contributions in meeting the nation’s energy supply, environmental and energy security needs. This TYSP provides the strategy for INL to accomplish its mission by: (1) linking R&D mission goals to core capabilities and infrastructure requirements; (2) establishing a ten-year end-state vision for INL facility complexes; (3) identifying and prioritizing infrastructure needs and capability gaps; (4)more » establishing maintenance and repair strategies that allow for sustainment of mission-critical (MC) facilities; and (5) applying sustainability principles to each decision and action. The TYSP serves as the infrastructure-planning baseline for INL; and, though budget formulation documents are informed by the TYSP, it is not itself a budget document.« less

  19. Different types of maximum power point tracking techniques for renewable energy systems: A survey

    NASA Astrophysics Data System (ADS)

    Khan, Mohammad Junaid; Shukla, Praveen; Mustafa, Rashid; Chatterji, S.; Mathew, Lini

    2016-03-01

    Global demand for electricity is increasing while production of energy from fossil fuels is declining and therefore the obvious choice of the clean energy source that is abundant and could provide security for development future is energy from the sun. In this paper, the characteristic of the supply voltage of the photovoltaic generator is nonlinear and exhibits multiple peaks, including many local peaks and a global peak in non-uniform irradiance. To keep global peak, MPPT is the important component of photovoltaic systems. Although many review articles discussed conventional techniques such as P & O, incremental conductance, the correlation ripple control and very few attempts have been made with intelligent MPPT techniques. This document also discusses different algorithms based on fuzzy logic, Ant Colony Optimization, Genetic Algorithm, artificial neural networks, Particle Swarm Optimization Algorithm Firefly, Extremum seeking control method and hybrid methods applied to the monitoring of maximum value of power at point in systems of photovoltaic under changing conditions of irradiance.

  20. High tonnage forest biomass production systems from southern pine energy plantations

    Treesearch

    P. Jernigan; T. Gallagher; Dana Mitchell; L. Teeter

    2011-01-01

    The topic of declining fossil fuels and the absolute need for renewable energy sources is very evident in today’s society. The utilization of bio-fuels is necessary to meet goals set forth in the Energy Independence and Security Act of 2007. Included in the act are standards in which bio-fuels will play a major role in ensuring national energy security and the...

  1. The European Union’s Energy Security Challenges

    DTIC Science & Technology

    2007-01-26

    NATO’s summit in Riga, Latvia in November 2006. Members of the Democratic Leadership in the 110th Congress have signaled their intention to introduce...cooperation through the development of international energy partnerships. Members of the Democratic Leadership in the 110th Congress have signaled their...surrounding global energy supply and demand persist, energy security issues are likely to gain importance in the 110th Congress. Members of the Democratic

  2. MACCIS 2.0 - An Architecture Description Framework for Technical Infostructures and Their Enterprise Environment

    DTIC Science & Technology

    2004-06-01

    Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect

  3. System Dynamics Modeling of Households' Electricity Consumption and Cost-Income Ratio: a Case Study of Latvia

    NASA Astrophysics Data System (ADS)

    Bariss, Uldis; Bazbauers, Gatis; Blumberga, Andra; Blumberga, Dagnija

    2017-11-01

    Increased energy efficiency of the building sector is high on the list of priorities for energy policy since better energy efficiency would help to reduce impact on climate change and increase security of energy supply. One aim of the present study was to find a relative effect of growth of demand for energy services due to changes in income, energy consumption per unit of demand due to technological development, changes in electricity price and household income on household electricity consumption in Latvia. The method applied included system dynamics modeling and data from a household survey regarding the relationship between electricity saving activities and the electricity cost-income ratio. The results revealed that, in direct contrast to the expected, a potential reduction of the electricity consumption is rather insensitive to electricity price and electricity cost-income ratio, and that the efficiency of technologies could be the main drivers for future electricity savings. The results suggest that support to advancement of technologies and faster replacement of inefficient ones rather than influencing the energy price could be effective energy policy measures. The model, developed in the study could be used in similar assessments in other countries.

  4. 76 FR 65768 - ADS Media Group, Inc., American Enterprise Development Corp., and Arcland Energy Corp.; Order of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...

  5. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  6. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  7. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  8. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  9. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  10. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  11. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  12. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  13. Repair process and a repaired component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roberts, III, Herbert Chidsey; Simpson, Stanley F.

    Matrix composite component repair processes are disclosed. The matrix composite repair process includes applying a repair material to a matrix composite component, securing the repair material to the matrix composite component with an external securing mechanism and curing the repair material to bond the repair material to the matrix composite component during the securing by the external securing mechanism. The matrix composite component is selected from the group consisting of a ceramic matrix composite, a polymer matrix composite, and a metal matrix composite. In another embodiment, the repair process includes applying a partially-cured repair material to a matrix composite component,more » and curing the repair material to bond the repair material to the matrix composite component, an external securing mechanism securing the repair material throughout a curing period, In another embodiment, the external securing mechanism is consumed or decomposed during the repair process.« less

  14. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    ERIC Educational Resources Information Center

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  15. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  16. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  17. Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)

    DTIC Science & Technology

    2009-01-01

    Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  18. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...

  19. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...

  20. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

    PubMed

    Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M

    2017-09-04

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.

  1. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

    PubMed

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-09-28

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.

  2. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model

    PubMed Central

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-01-01

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042

  3. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  4. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  5. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  6. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  7. American Security and the International Energy Situation. Volume 1. Introduction and Summary

    DTIC Science & Technology

    1975-04-15

    Financial Security 28 Timely Energy Supply Enhancement 31 Prospects for a Price Break M Concluding Remarks ’♦S II. World Energy Interdependence...likely to experience as the level of social and political chaos rises under the pressures of economic contraction, financial hemorrhage, and pervasive...and Consolidated Edison’s punned storage facility planned for Storm King). Often, energy projects are delayed from the very beginning by vocal

  8. Resilience of Natural Gas Networks during Conflicts, Crises and Disruptions

    PubMed Central

    Carvalho, Rui; Buzna, Lubos; Bono, Flavio; Masera, Marcelo; Arrowsmith, David K.; Helbing, Dirk

    2014-01-01

    Human conflict, geopolitical crises, terrorist attacks, and natural disasters can turn large parts of energy distribution networks offline. Europe's current gas supply network is largely dependent on deliveries from Russia and North Africa, creating vulnerabilities to social and political instabilities. During crises, less delivery may mean greater congestion, as the pipeline network is used in ways it has not been designed for. Given the importance of the security of natural gas supply, we develop a model to handle network congestion on various geographical scales. We offer a resilient response strategy to energy shortages and quantify its effectiveness for a variety of relevant scenarios. In essence, Europe's gas supply can be made robust even to major supply disruptions, if a fair distribution strategy is applied. PMID:24621655

  9. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  10. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  11. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  12. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  13. 78 FR 56264 - Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc., South Texas Oil Co., and Synova Healthcare Group, Inc... concerning the securities of Four Rivers BioEnergy, Inc. because it has not filed any periodic reports since...

  14. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...

  15. 12 CFR 223.24 - What valuation principles apply to extensions of credit secured by affiliate securities?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... paragraphs (f)(1) and (5) of § 223.42. (c) Exclusion of eligible affiliated mutual fund securities—(1) The exclusion. Eligible affiliated mutual fund securities are not considered to be securities issued by an... extension of credit will be used to purchase the eligible affiliated mutual fund securities collateral or...

  16. 12 CFR 223.24 - What valuation principles apply to extensions of credit secured by affiliate securities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... paragraphs (f)(1) and (5) of § 223.42. (c) Exclusion of eligible affiliated mutual fund securities—(1) The exclusion. Eligible affiliated mutual fund securities are not considered to be securities issued by an... extension of credit will be used to purchase the eligible affiliated mutual fund securities collateral or...

  17. 8 CFR 103.12 - Definition of the term “lawfully present” aliens for purposes of applying for Title II Social...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... aliens for purposes of applying for Title II Social Security benefits under Public Law 104-193. 103.12... applying for Title II Social Security benefits under Public Law 104-193. (a) Definition of the term an... classes of aliens permitted to remain in the United States because the Attorney General has decided for...

  18. Transportation's oil dependence and energy security in the 21st century

    DOT National Transportation Integrated Search

    1997-10-01

    The persistent and in many parts of the world rapid motorization of transport is intensifying global dependence on petroleum. Transportation's global oil dependence poses real energy security risks for the first few decades of the 21st century, at le...

  19. German Energy Security and Its Implications on Regional Security

    DTIC Science & Technology

    2016-12-01

    Daniel Moran THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this...280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public...independence.17 In the 1980s and 1990s, Esakova points out that energy security took a more economic form , with countries focusing on protecting their

  20. A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security

    NASA Astrophysics Data System (ADS)

    Okamoto, Eiji

    Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.

  1. Automating Risk Analysis of Software Design Models

    PubMed Central

    Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688

  2. Automating risk analysis of software design models.

    PubMed

    Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.

  3. Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets

    NASA Astrophysics Data System (ADS)

    Nair, Nirmal-Kumar

    As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.

  4. Global Security Sciences Home - Global Security Sciences

    Science.gov Websites

    Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview

  5. Smart Grid Communications Security Project, U.S. Department of Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Frank

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less

  6. Ex vivo biomechanical evaluation of pigeon (Columba livia) cadaver intact humeri and ostectomized humeri stabilized with caudally applied titanium locking plate or stainless steel nonlocking plate constructs.

    PubMed

    Darrow, Brett G; Biskup, Jeffrey J; Weigel, Joseph P; Jones, Michael P; Xie, Xie; Liaw, Peter K; Tharpe, Josh L; Sharma, Aashish; Penumadu, Dayakar

    2017-05-01

    OBJECTIVE To evaluate mechanical properties of pigeon (Columba livia) cadaver intact humeri versus ostectomized humeri stabilized with a locking or nonlocking plate. SAMPLE 30 humeri from pigeon cadavers. PROCEDURES Specimens were allocated into 3 groups and tested in bending and torsion. Results for intact pigeon humeri were compared with results for ostectomized humeri repaired with a titanium 1.6-mm screw locking plate or a stainless steel 1.5-mm dynamic compression plate; the ostectomized humeri mimicked a fracture in a thin cortical bone. Locking plates were secured with locking screws (2 bicortical and 4 monocortical), and nonlocking plates were secured with bicortical nonlocking screws. Constructs were cyclically tested nondestructively in 4-point bending and then tested to failure in bending. A second set of constructs were cyclically tested non-destructively and then to failure in torsion. Stiffness, strength, and strain energy of each construct were compared. RESULTS Intact specimens were stiffer and stronger than the repair groups for all testing methods, except for nonlocking constructs, which were significantly stiffer than intact specimens under cyclic bending. Intact bones had significantly higher strain energies than locking plates in both bending and torsion. Locking and nonlocking plates were of equal strength and strain energy, but not stiffness, in bending and were of equal strength, stiffness, and strain energy in torsion. CONCLUSIONS AND CLINICAL RELEVANCE Results for this study suggested that increased torsional strength may be needed before bone plate repair can be considered as the sole fixation method for avian species.

  7. Energy Security: From Deal Killers to Game Changers

    NASA Astrophysics Data System (ADS)

    Cooke, Charlie

    2010-03-01

    Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.

  8. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema

    Philips, Julia [Sandia

    2017-12-09

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products – a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  9. Security in Wireless Sensor Networks Employing MACGSP6

    ERIC Educational Resources Information Center

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  10. Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production

    EPA Science Inventory

    Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...

  11. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 4 2011-01-01 2011-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  12. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  13. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  14. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 4 2012-01-01 2012-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  15. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 4 2013-01-01 2013-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  16. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  17. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 4 2014-01-01 2014-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  18. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  19. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  20. 31 CFR 358.1 - What special terms apply to this part?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... unmatured bearer securities are bearer bonds. BECCS means the Treasury's Bearer Corpora Conversion System... BECCS. Callable means a United States Treasury security subject to call before maturity. Callable Coupons means the coupons associated with a callable security that are due after the date the security is...

  1. On the pursuit of a nuclear development capability: The case of the Cuban nuclear program

    NASA Astrophysics Data System (ADS)

    Benjamin-Alvarado, Jonathan Calvert

    1998-09-01

    While there have been many excellent descriptive accounts of modernization schemes in developing states, energy development studies based on prevalent modernization theory have been rare. Moreover, heretofore there have been very few analyses of efforts to develop a nuclear energy capability by developing states. Rarely have these analyses employed social science research methodologies. The purpose of this study was to develop a general analytical framework, based on such a methodology to analyze nuclear energy development and to utilize this framework for the study of the specific case of Cuba's decision to develop nuclear energy. The analytical framework developed focuses on a qualitative tracing of the process of Cuban policy objectives and implementation to develop a nuclear energy capability, and analyzes the policy in response to three models of modernization offered to explain the trajectory of policy development. These different approaches are the politically motivated modernization model, the economic and technological modernization model and the economic and energy security model. Each model provides distinct and functionally differentiated expectations for the path of development toward this objective. Each model provides expected behaviors to external stimuli that would result in specific policy responses. In the study, Cuba's nuclear policy responses to stimuli from domestic constraints and intensities, institutional development, and external influences are analyzed. The analysis revealed that in pursuing the nuclear energy capability, Cuba primarily responded by filtering most of the stimuli through the twin objectives of economic rationality and technological advancement. Based upon the Cuban policy responses to the domestic and international stimuli, the study concluded that the economic and technological modernization model of nuclear energy development offered a more complete explanation of the trajectory of policy development than either the politically-motivated or economic and energy security models. The findings of this case pose some interesting questions for the general study of energy programs in developing states. By applying the analytical framework employed in this study to a number of other cases, perhaps the understanding of energy development schemes may be expanded through future research.

  2. Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists

    NASA Astrophysics Data System (ADS)

    Wadsworth, Jeffrey

    2010-04-01

    The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.

  3. Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists

    NASA Astrophysics Data System (ADS)

    Wadsworth, Jeffrey

    2010-05-01

    The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.

  4. The Great Game redux: Energy security and the emergence of tripolarity in Eurasia

    NASA Astrophysics Data System (ADS)

    Ozdamar, Ibrahim Ozgur

    Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.

  5. Influence and Interest: How a Belligerent Dictator Resists Current Methods

    DTIC Science & Technology

    2018-04-09

    Economics , Security (Boulder, CO: Lynne Rienner  Publishers Inc, 2009), 12.  10 Mark Bowden, “How to Deal With North Korea: There are No Good Options...nuclear, energy, economic and diplomatic benefits in exchange for halting North Korea’s nuclear program.”6 The Clinton Administration was not able to get...aimed at Chinese leadership as much as North Korea.31 The second part of the Trump Administration’s multifaceted approach is to apply economic pressure

  6. NEVADA TEST SITE WASTE ACCEPTANCE CRITERIA

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    U.S. DEPARTMENT OF ENERGY, NATIONAL NUCLEAR SECURITY ADMINISTRATION, NEVADA SITE OFFICE

    This document establishes the U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) waste acceptance criteria (WAC). The WAC provides the requirements, terms, and conditions under which the Nevada Test Site will accept low-level radioactive and mixed waste for disposal. Mixed waste generated within the State of Nevada by NNSA/NSO activities is accepted for disposal. It includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the Nevada Test Site Area 3 and Area 5 Radioactive Waste Management Site for storage or disposal.

  7. Science & Technology Review September 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duoss, Eric B.; Kotta, Paul R.; Meissner, Caryn N.

    This is the September 2017 edition of the LLNL, Science and Technology Review. At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  8. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  9. 20 CFR 404.203 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... benefits and has proven his or her right to them for a given period of time. We, us, or our means the Social Security Administration. You or your means the insured worker who has applied for benefits or a deceased insured worker on whose social security earnings record someone else has applied. (b) Other...

  10. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  11. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  12. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  13. 76 FR 36951 - In the Matter of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.): Order of Suspension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-23

    .... (n/k/a Bancorp Energy, Inc.): Order of Suspension of Trading June 21, 2011. It appears to the... securities of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.) because it has not filed any... above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act...

  14. 76 FR 18587 - In the Matter of Corestream Energy, Inc. (f/k/a Zealous, Inc.); Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Corestream Energy, Inc. (f/k... Corestream Energy, Inc. (``Corestream'') (f/k/a Zealous, Inc.) because it has failed to file certain periodic.... Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  15. Science & Technology Review October/November 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogt, R. L.; Meissner, C. N.; Kotta, P. R.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. The Laboratory is operated by Lawrence Livermore National Security, LLC (LLNS), for the Department of Energy’smore » National Nuclear Security Administration. LLNS is a partnership involving Bechtel National, University of California, Babcock & Wilcox, Washington Division of URS Corporation, and Battelle in affiliation with Texas A&M University. More information about LLNS is available online at www.llnsllc.com. Please address any correspondence (including name and address changes) to S&TR, Mail Stop L-664, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, California 94551, or telephone (925) 423-3893. Our e-mail address is str-mail@llnl.gov. S&TR is available on the Web at str.llnl.gov.« less

  16. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    NASA Astrophysics Data System (ADS)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  17. Preliminary strategic environmental assessment of the Great Western Development Strategy: safeguarding ecological security for a new western China.

    PubMed

    Li, Wei; Liu, Yan-ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  18. Nevada National Security Site Environmental Report 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less

  19. Coupled Flow and Mechanics in Porous and Fractured Media*

    NASA Astrophysics Data System (ADS)

    Martinez, M. J.; Newell, P.; Bishop, J.

    2012-12-01

    Numerical models describing subsurface flow through deformable porous materials are important for understanding and enabling energy security and climate security. Some applications of current interest come from such diverse areas as geologic sequestration of anthropogenic CO2, hydro-fracturing for stimulation of hydrocarbon reservoirs, and modeling electrochemistry-induced swelling of fluid-filled porous electrodes. Induced stress fields in any of these applications can lead to structural failure and fracture. The ultimate goal of this research is to model evolving faults and fracture networks and flow within the networks while coupling to flow and mechanics within the intact porous structure. We report here on a new computational capability for coupling of multiphase porous flow with geomechanics including assessment of over-pressure-induced structural damage. The geomechanics is coupled to the flow via the variation in the fluid pore pressures, whereas the flow problem is coupled to mechanics by the concomitant material strains which alter the pore volume (porosity field) and hence the permeability field. For linear elastic solid mechanics a monolithic coupling strategy is utilized. For nonlinear elastic/plastic and fractured media, a segregated coupling is presented. To facilitate coupling with disparate flow and mechanics time scales, the coupling strategy allows for different time steps in the flow solve compared to the mechanics solve. If time steps are synchronized, the controller allows user-specified intra-time-step iterations. The iterative coupling is dynamically controlled based on a norm measuring the degree of variation in the deformed porosity. The model is applied for evaluation of the integrity of jointed caprock systems during CO2 sequestration operations. Creation or reactivation of joints can lead to enhanced pathways for leakage. Similarly, over-pressures can induce flow along faults. Fluid flow rates in fractures are strongly dependent on the effective hydraulic aperture, which is a non-linear function of effective normal stress. The dynamically evolving aperture field updates the effective, anisotropic permeability tensor, thus resulting in a highly coupled multiphysics problem. Two models of geomechanical damage are discussed: critical shear-slip criteria and a sub-grid joint model. Leakage rates through the caprock resulting from the joint model are compared to those assuming intact material, allowing a correlation between potential for leakage and injection rates/pressures, for various in-situ stratigraphies. *This material is based upon work supported as part of the Center for Frontiers of Subsurface Energy Security, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001114. Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energys National Nuclear Security Administration under Contract DE-AC04-94AL85000.

  20. Benchmarking the scientific research on wastewater-energy nexus by using bibliometric analysis.

    PubMed

    Zheng, Tianlong; Li, Pengyu; Shi, Zhining; Liu, Jianguo

    2017-12-01

    With an exponential increase in urbanization and industrialization, water pollution is an inevitable consequence of relatively lagging wastewater treatment facilities. The conventional activated sludge process for wastewater treatment primarily emphasizes the removal of harmful substances to maintain increasingly stringent effluent discharged standards, which is considered an energy-intensive technique. Therefore, innovative and sustainable wastewater treatment should pay more attention to energy and resource recovery in dealing with fossil fuel depletion, global-scale energy security, and climate change. A bibliometric analysis was applied to trace wastewater-energy nexus-related research during the period 1991 to 2015, with respect to the Science Citation Index EXPANDED (SCI-EXPANDED) database. Journal of Hazardous Materials, ranking 1st in h-index (79), was the most productive journal (431, 4.5%) during the same time, followed by International Journal of Hydrogen Energy (422, 4.4%) and Water Research (393, 4.1%) journal, the latter owning a topmost journal impact factor. Though, China (2154, 22.5%) was the most productive country, while the USA with highest h-index (88) was the favorest collaborative country. The Chinese Academy of Sciences, China (241, 2.5%) produced the maximum publications. A novel method called "word cluster analysis" showed that the emerging sustainable processes and novel renewable energy application are applied in response to the desire for a net wastewater-energy nexus system. Based on different wastewater types, the emerging energy and sources recovery treatment processes of Anammox, anaerobic digestion, and microbial fuel cells gained extensive innovation. Evaluation indicators including sustainability, life cycle assessment, and environmental impact were appropriately used to dissert feasibility of the novel treatment methods in regard of renewable energy utilization, energy savings, and energy recovery. The transformation of the new concept of "broaden income source, economize on expenditures and exploit inner potential" should be generalized in order to achieve an environmentally sustainable development of wastewater-energy nexus system.

  1. European Energy Policy and Its Effects on Gas Security

    NASA Astrophysics Data System (ADS)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  2. 10 CFR 70.5 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... milling, the Agreement States of Colorado, Utah, Texas and Washington should be contacted. [48 FR 16032... 10 Energy 2 2012-01-01 2012-01-01 false Communications. 70.5 Section 70.5 Energy NUCLEAR... Director, Division of Security Policy, Office of Nuclear Security and Incident Response, U.S. Nuclear...

  3. The Use of Statistical Downscaling to Project Regional Climate Changes as they Relate to Future Energy Production

    NASA Astrophysics Data System (ADS)

    Werth, D. W.; O'Steen, L.; Chen, K.; Altinakar, M. S.; Garrett, A.; Aleman, S.; Ramalingam, V.

    2010-12-01

    Global climate change has the potential for profound impacts on society, and poses significant challenges to government and industry in the areas of energy security and sustainability. Given that the ability to exploit energy resources often depends on the climate, the possibility of climate change means we cannot simply assume that the untapped potential of today will still exist in the future. Predictions of future climate are generally based on global climate models (GCMs) which, due to computational limitations, are run at spatial resolutions of hundreds of kilometers. While the results from these models can predict climatic trends averaged over large spatial and temporal scales, their ability to describe the effects of atmospheric phenomena that affect weather on regional to local scales is inadequate. We propose the use of several optimized statistical downscaling techniques that can infer climate change at the local scale from coarse resolution GCM predictions, and apply the results to assess future sustainability for two sources of energy production dependent on adequate water resources: nuclear power (through the dissipation of waste heat from cooling towers, ponds, etc.) and hydroelectric power. All methods will be trained with 20th century data, and applied to data from the years 2040-2049 to get the local-scale changes. Models of cooling tower operation and hydropower potential will then use the downscaled data to predict the possible changes in energy production, and the implications of climate change on plant siting, design, and contribution to the future energy grid can then be examined.

  4. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  5. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Director for Corporate Managementand Chief Information Officer shall designate an NRC Personnel Security... 10 Energy 1 2014-01-01 2014-01-01 false Recommendation of the NRC Personnel Security Review Panel... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE...

  6. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Director for Corporate Managementand Chief Information Officer shall designate an NRC Personnel Security... 10 Energy 1 2013-01-01 2013-01-01 false Recommendation of the NRC Personnel Security Review Panel... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE...

  7. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  8. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...

  9. Applied patent RFID systems for building reacting HEPA air ventilation system in hospital operation rooms.

    PubMed

    Lin, Jesun; Pai, Jar-Yuan; Chen, Chih-Cheng

    2012-12-01

    RFID technology, an automatic identification and data capture technology to provide identification, tracing, security and so on, was widely applied to healthcare industry in these years. Employing HEPA ventilation system in hospital is a way to ensure healthful indoor air quality to protect patients and healthcare workers against hospital-acquired infections. However, the system consumes lots of electricity which cost a lot. This study aims to apply the RFID technology to offer a unique medical staff and patient identification, and reacting HEPA air ventilation system in order to reduce the cost, save energy and prevent the prevalence of hospital-acquired infection. The system, reacting HEPA air ventilation system, contains RFID tags (for medical staffs and patients), sensor, and reacting system which receives the information regarding the number of medical staff and the status of the surgery, and controls the air volume of the HEPA air ventilation system accordingly. A pilot program was carried out in a unit of operation rooms of a medical center with 1,500 beds located in central Taiwan from Jan to Aug 2010. The results found the air ventilation system was able to function much more efficiently with less energy consumed. Furthermore, the indoor air quality could still keep qualified and hospital-acquired infection or other occupational diseases could be prevented.

  10. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  11. SPIDERS Bi-Directional Charging Station Interconnection Testing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simpson, M.

    2013-09-01

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).

  12. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  13. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  14. Evaluation of dressings used with local anaesthetic cream and for peripheral venous cannulation.

    PubMed

    Needham, Rowan; Strehle, Eugen-Matthias

    2008-10-01

    To compare four polyurethane dressings manufactured by two different companies for use in children. Seventy-eight dressings were applied to secure either local anaesthetic creams (n = 62) or intravenous cannulae (n = 16). Each dressing was evaluated for ease of application, security and ease of removal, using a simple scoring system. 84 per cent of Opsite flexigrid and 90 per cent of Tegaderm local anaesthetic cream dressings were rated as easy or very easy to apply. Opsite flexigrid was felt to be more secure, whereas Tegaderm was easier to remove. The Tegaderm cannula dressing was easier to apply than the iv3000 dressing. There was little difference between the two brands, including costs.

  15. Nuclear energy related capabilities at Sandia National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pickering, Susan Y.

    2014-02-01

    Sandia National Laboratories' technology solutions are depended on to solve national and global threats to peace and freedom. Through science and technology, people, infrastructure, and partnerships, part of Sandia's mission is to meet the national needs in the areas of energy, climate and infrastructure security. Within this mission to ensure clean, abundant, and affordable energy and water is the Nuclear Energy and Fuel Cycle Programs. The Nuclear Energy and Fuel Cycle Programs have a broad range of capabilities, with both physical facilities and intellectual expertise. These resources are brought to bear upon the key scientific and engineering challenges facing themore » nation and can be made available to address the research needs of others. Sandia can support the safe, secure, reliable, and sustainable use of nuclear power worldwide by incorporating state-of-the-art technologies in safety, security, nonproliferation, transportation, modeling, repository science, and system demonstrations.« less

  16. 49 CFR 37.165 - Lift and securement use.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Lift and securement use. 37.165 Section 37.165... DISABILITIES (ADA) Provision of Service § 37.165 Lift and securement use. (a) This section applies to public... with disabilities with the use of securement systems, ramps and lifts. If it is necessary for the...

  17. 24 CFR 1007.30 - Security for loan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security for loan. 1007.30 Section... SECTION 184A LOAN GUARANTEES FOR NATIVE HAWAIIAN HOUSING § 1007.30 Security for loan. (a) In general. A... Lands is used as collateral or security for the loan, the following additional provisions apply: (1...

  18. 22 CFR 308.10 - Security of records systems-manual and automated.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security of records systems-manual and automated... Security of records systems—manual and automated. The head of the agency has the responsibility of... destruction of manual and automatic record systems. These security safeguards shall apply to all systems in...

  19. 45 CFR 1182.15 - Institute responsibility for maintaining adequate technical, physical, and security safeguards to...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... record systems. These security safeguards shall apply to all systems in which identifiable personal data... data and automated systems shall be adequately trained in the security and privacy of personal data. (4... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...

  20. 45 CFR 2508.10 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... record systems. These security safeguards shall apply to all systems in which identifiable personal data... the security and privacy of such records. (7) The disposal and destruction of records within a system... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...

  1. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... disclosure or destruction of manual and automatic record systems. These security safeguards shall apply to... use of records contained in a system of records are adequately trained to protect the security and... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...

  2. 76 FR 61438 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-04

    ... clarify that 2102(e) applies to trading halts in new derivative securities, so as to not be confused with... derivative securities products when a temporary interruption occurs in the calculation or wide dissemination... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65425; File No. SR-ISE-2011-61] Self-Regulatory...

  3. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...

  4. Energy and technology review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quirk, W.J.; Canada, J.; de Vore, L.

    1994-04-01

    This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.

  5. 78 FR 73915 - Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc., and Transworld Benefits International, Inc.; Order... that there is a lack of current and accurate information concerning the securities of Industry Concept...

  6. 78 FR 56977 - Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp., Komodo, Inc., Uphonia, Inc., and Wilson Brothers USA, Inc., Order of Suspension of Trading September 12, 2013. It appears to the Securities and Exchange...

  7. 77 FR 54908 - Extension of the Public Review and Comment Period and Announcement of an Additional Public...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Review and... Disposition Supplemental Environmental Impact Statement AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Extension of the public review and comment period and announcement of an...

  8. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...

  9. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...

  10. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  11. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  12. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  13. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  14. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  15. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  16. 10 CFR 11.5 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR... concepts of justice, a personnel security program in the interests of the common defense and security for...

  17. 10 CFR 11.5 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR... concepts of justice, a personnel security program in the interests of the common defense and security for...

  18. Multi-attribute criteria applied to electric generation energy system analysis LDRD.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kuswa, Glenn W.; Tsao, Jeffrey Yeenien; Drennen, Thomas E.

    2005-10-01

    This report began with a Laboratory-Directed Research and Development (LDRD) project to improve Sandia National Laboratories multidisciplinary capabilities in energy systems analysis. The aim is to understand how various electricity generating options can best serve needs in the United States. The initial product is documented in a series of white papers that span a broad range of topics, including the successes and failures of past modeling studies, sustainability, oil dependence, energy security, and nuclear power. Summaries of these projects are included here. These projects have provided a background and discussion framework for the Energy Systems Analysis LDRD team to carrymore » out an inter-comparison of many of the commonly available electric power sources in present use, comparisons of those options, and efforts needed to realize progress towards those options. A computer aid has been developed to compare various options based on cost and other attributes such as technological, social, and policy constraints. The Energy Systems Analysis team has developed a multi-criteria framework that will allow comparison of energy options with a set of metrics that can be used across all technologies. This report discusses several evaluation techniques and introduces the set of criteria developed for this LDRD.« less

  19. 31 CFR 321.1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Presenter means the individual requesting the redemption or redemption-exchange of securities. (k..., including redemption-exchange. (m) Redemption-exchange means the authorized redemption of eligible securities for the purpose of applying the proceeds in payment for other securities offered in exchange by...

  20. 48 CFR 339.7100 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7100 Definitions. As used in this subpart, the following definitions shall apply: Adequate security means, in accordance with OMB Circular A-130, Management of Federal Information Resources, Appendix 3 (Security of Federal...

Top