Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges
2010-07-01
the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity
Energy Security: Emerging Challenges and Opportunities
2010-08-01
46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy
Threats to US energy security: the challenge of Arab oil
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.
1979-08-13
Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Science and the Energy Security Challenge: The Example of Solid-State Lighting
Philips, Julia [Sandia
2017-12-09
Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products â a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
10 CFR 1045.39 - Challenging classification and declassification determinations.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., a further appeal may be made to the Chief Health, Safety and Security Officer. (c) Classification... 10 Energy 4 2011-01-01 2011-01-01 false Challenging classification and declassification determinations. 1045.39 Section 1045.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) NUCLEAR CLASSIFICATION...
10 CFR 1045.39 - Challenging classification and declassification determinations.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., a further appeal may be made to the Chief Health, Safety and Security Officer. (c) Classification... 10 Energy 4 2010-01-01 2010-01-01 false Challenging classification and declassification determinations. 1045.39 Section 1045.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) NUCLEAR CLASSIFICATION...
Department of the Navy Transformation Plan FY 2014-2016
2014-01-01
SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-09-28
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-01-01
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042
The European Union’s Energy Security Challenges
2007-01-26
NATO’s summit in Riga, Latvia in November 2006. Members of the Democratic Leadership in the 110th Congress have signaled their intention to introduce...cooperation through the development of international energy partnerships. Members of the Democratic Leadership in the 110th Congress have signaled their...surrounding global energy supply and demand persist, energy security issues are likely to gain importance in the 110th Congress. Members of the Democratic
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stewart, John; Halbgewachs, Ron; Chavez, Adrian
The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less
2014-12-01
which requires close attention to political, econornic, social , cultw·al, diplomatic, ethnic, and energy factors. The new geopolitical configmation in...closely connected to regional security, which requires close attention to political, economic, social , cultural, diplomatic, ethnic, and energy factors...requires close attention to political, economic, social , cultural, diplomatic, environmental, ethnical, and energy factors. Such an approach to
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anadon, Laura Diaz; Gallagher, Kelly Sims; Bunn, Matthew
2009-02-18
The report offers preliminary recommendations for near-term actions to strengthen the U.S. effort to develop and deploy advanced energy technologies. The report comes as the Obama Administration and the 111th U.S. Congress face enormous challenges and opportunities in tackling the pressing security, economic, and environmental problems posed by the energy sector. Improving the technologies of energy supply and end-use is a prerequisite for surmounting these challenges in a timely and cost-effective way, and this report elaborates on how policy can support develop of these important energy technologies.
The Eastring gas pipeline in the context of the Central and Eastern European gas supply challenge
NASA Astrophysics Data System (ADS)
Mišík, Matúš; Nosko, Andrej
2017-11-01
Ever since the 2009 natural gas crisis, energy security has been a crucial priority for countries of Central and Eastern Europe. Escalating in 2014, the conflict between Ukraine and Russia further fuelled negative expectations about the future development of energy relations for the region predominantly supplied by Russia. As a response to the planned cessation of gas transit through the Brotherhood pipeline, which brings Russian gas to Europe via Ukraine and Slovakia, the Slovak transmission system operator Eustream proposed the Eastring pipeline. This Perspective analyses this proposal and argues that neither the perceived decrease in Slovak energy security nor the loss of economic rent from the international gas transit should be the main policy driver behind such a major infrastructure project. Although marketed as an answer to current Central and Eastern European gas supply security challenges, the Eastring pipeline is actually mainly focused on issues connected to the Slovak gas transit.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Gary A.
"The Center for Frontiers of Subsurface Energy Security (CFSES)" was submitted to the "Life at the Frontiers of Energy Research" video contest at the 2011 Science for Our Nation's Energy Future: Energy Frontier Research Centers (EFRCs) Summit and Forum. Twenty-six EFRCs created short videos to highlight their mission and their work. CFSES is directed by Gary A. Pope at the University of Texas at Austin and partners with Sandia National Laboratories. The Office of Basic Energy Sciences in the U.S. Department of Energy's Office of Science established the 46 Energy Frontier Research Centers (EFRCs) in 2009. These collaboratively-organized centers conductmore » fundamental research focused on 'grand challenges' and use-inspired 'basic research needs' recently identified in major strategic planning efforts by the scientific community. The overall purpose is to accelerate scientific progress toward meeting the nation's critical energy challenges.« less
Pope, Gary A. (Director, Center for Frontiers of Subsurface Energy Security); CFSES Staff
2017-12-09
'The Center for Frontiers of Subsurface Energy Security (CFSES)' was submitted to the 'Life at the Frontiers of Energy Research' video contest at the 2011 Science for Our Nation's Energy Future: Energy Frontier Research Centers (EFRCs) Summit and Forum. Twenty-six EFRCs created short videos to highlight their mission and their work. CFSES is directed by Gary A. Pope at the University of Texas at Austin and partners with Sandia National Laboratories. The Office of Basic Energy Sciences in the U.S. Department of Energy's Office of Science established the 46 Energy Frontier Research Centers (EFRCs) in 2009. These collaboratively-organized centers conduct fundamental research focused on 'grand challenges' and use-inspired 'basic research needs' recently identified in major strategic planning efforts by the scientific community. The overall purpose is to accelerate scientific progress toward meeting the nation's critical energy challenges.
Dual mode vehicle and infrastructure alternatives analysis
DOT National Transportation Integrated Search
2008-04-01
The United States has a transportation challenge that requires addressing four issues simultaneously: traffic congestion, environmental pollution, safety, and energy security. A potential solution to these transportation challenges is the concept of ...
Hydrogen applications for Lambert-St. Louis International Airport
DOT National Transportation Integrated Search
2009-01-01
Today, major airports are facing challenges related to pollution, energy efficiency, and safety and security. Hydrogen and fuel cell technologies, regarded as one of the key energy solutions of the 21st century are more energy efficient and reliable ...
Crabtree, George
2018-01-12
The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use.  The continued use of fossil fuels raises concerns about supply, security, environment and climate. New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.
Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
Wide-area situation awareness in electric power grid
NASA Astrophysics Data System (ADS)
Greitzer, Frank L.
2010-04-01
Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.
NASA Astrophysics Data System (ADS)
Moradkhani, H.; Hameed, M.
2017-12-01
Developing countries have experienced crucial conditions in meeting the needs for food, energy, and water security. This paper presents a country-level quantitative assessment of the current issues associated with the Food-Energy-Water-Security (FEWS) Nexus in the Middle East region. In this study, sixteen countries in the Middle East region are chosen, namely, Arabian Peninsula, Iran, Syria, Lebanon, Israel, Palestine, Egypt, and Turkey. The most recent datasets are used to study and analyze the factors that have emerged the demand to understand and manage the linkage of FEW systems in the region. Water scarcity, extreme events, population growth, urbanization, economic growth, poverty, and political stability are found to be the key drivers of the current challenges in the Middle East region. Additionally, the results suggest that these factors have created a subsequent stress on FEW resources specifically on water sector in the region. Therefore, more attention is required to sustain the FEW resources and cope with the socio-economic development.
90 Seconds of Discovery: Fast Pyrolysis
Weber, Robert; Elliot, Douglas
2018-01-16
Fossil fuels have provided a time-proven, energy-dense fuel for more than a century. The challenge facing America today is developing alternatives that work within our existing infrastructure; to decrease environmental impact; and to increase energy security.
The food-energy-water nexus and urban complexity
NASA Astrophysics Data System (ADS)
Romero-Lankao, Patricia; McPhearson, Timon; Davidson, Debra J.
2017-04-01
While tackling interdependencies among food, energy, and water security is promising, three fundamental challenges to effective operationalization need addressing: the feasibility of science-policy integration, cross-scale inequalities, and path-dependencies in infrastructure and socio-institutional practices.
Smart Grid Communications Security Project, U.S. Department of Energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, Frank
There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less
Materials for Sustainable Energy
NASA Astrophysics Data System (ADS)
Crabtree, George
2009-03-01
The global dependence on fossil fuels for energy is among the greatest challenges facing our economic, social and political future. The uncertainty in the cost and supply of oil threatens the global economy and energy security, the pollution of fossil combustion threatens human health, and the emission of greenhouse gases threatens global climate. Meeting the demand for double the current global energy use in the next 50 years without damaging our economy, security, environment or climate requires finding alternative sources of energy that are clean, abundant, accessible and sustainable. The transition to greater sustainability involves tapping unused energy flows such as sunlight and wind, producing electricity without carbon emissions from clean coal and high efficiency nuclear power plants, and using energy more efficiently in solid-state lighting, fuel cells and transportation based on plug-in hybrid and electric cars. Achieving these goals requires creating materials of increasing complexity and functionality to control the transformation of energy between light, electrons and chemical bonds. Challenges and opportunities for developing the complex materials and controlling the chemical changes that enable greater sustainability will be presented.
Report on the first Quadrennial Technology Review (QTR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2011-09-30
Access to clean, affordable, secure, and reliable energy has been a cornerstone of America’s economic growth. The Nation’s systems that produce, store, transmit, and use energy are falling short of U.S. needs. Maintaining energy security, bolstering U.S. competitiveness, and mitigating the environmental impacts of energy are long-standing challenges. Governments, consumers, and the private sector have worked for decades to address these challenges, yet they remain among the Nation’s most pressing issues. President Obama has articulated broad national energy goals for reducing U.S. dependence on oil, reducing pollution, and investing in research and development (R&D) for clean-energy technologies in the Unitedmore » States to create jobs. These include: Reducing oil imports by one-third by 2025; Supporting the deployment of 1 million electric vehicles on the road by 2015; Making non-residential buildings 20% more energy efficient by 2020; Deriving 80% of America's electricity from clean-energy sources by 2035; and Reducing greenhouse gas emissions by 175 by 2020 and 83% of 2050, from a 2005 baseline.« less
ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marra, J.
2010-09-29
Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less
Assurance of energy efficiency and data security for ECG transmission in BASNs.
Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa
2012-04-01
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erickson, Michael Charles
Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.
Israel security in the 21st century: Risks and opportunities. Research report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eisenkot, G.
Unlike the United States which publicizes its national security strategy and national military strategy in official public documents, Israel, does not produce such documents for the general public. This may appear paradoxical in that the State of Israel, from its very inception, has invested enormous energy in its security. Nevertheless, Israel has no detailed security doctrine approved and updated by the Cabinet, the Knesset (Israel`s parliament) or the General Staff. The lack of an official, published, security doctrine does not imply that Israel lacks a coherent political and military strategy based on doctrine-like concepts. Israel`s political and military successes aremore » proof to the contrary. Our purpose, then, is to identify a number of the critical Security Principles that have shaped Israeli strategy. This will provide us the foundation for our main discussion which is the risks and challenges to Israeli security in the 21st century and possible responses to those challenges.« less
Nuclear energy related capabilities at Sandia National Laboratories
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pickering, Susan Y.
2014-02-01
Sandia National Laboratories' technology solutions are depended on to solve national and global threats to peace and freedom. Through science and technology, people, infrastructure, and partnerships, part of Sandia's mission is to meet the national needs in the areas of energy, climate and infrastructure security. Within this mission to ensure clean, abundant, and affordable energy and water is the Nuclear Energy and Fuel Cycle Programs. The Nuclear Energy and Fuel Cycle Programs have a broad range of capabilities, with both physical facilities and intellectual expertise. These resources are brought to bear upon the key scientific and engineering challenges facing themore » nation and can be made available to address the research needs of others. Sandia can support the safe, secure, reliable, and sustainable use of nuclear power worldwide by incorporating state-of-the-art technologies in safety, security, nonproliferation, transportation, modeling, repository science, and system demonstrations.« less
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
Test and Evaluation of Architecture-Aware Compiler Environment
2011-11-01
biology, medicine, social sciences , and security applications. Challenges include extremely large graphs (the Facebook friend network has over...Operations with Temporal Binning ....................................................................... 32 4.12 Memory behavior and Energy per...five challenge problems empirically, exploring their scaling properties, computation and datatype needs, memory behavior , and temporal behavior
Cyber security challenges in Smart Cities: Safety, security and privacy.
Elmaghraby, Adel S; Losavio, Michael M
2014-07-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.
Scalable Energy Networks to Promote Energy Security
2011-07-01
commodity. Consider current challenges of converting energy and synchronizing sources with loads—for example, capturing solar energy to provide hot water...distributed micro-generation1 (for example, roof-mounted solar panels) and plug-in elec- tric/hybrid vehicles. The imperative extends to our national...transformers, battery chargers ■■ distribution: pumps, pipes, switches, cables ■■ applications: lighting, automobiles, personal electronic devices
Fossil Energy: Drivers and Challenges.
NASA Astrophysics Data System (ADS)
Friedmann, Julio
2007-04-01
Concerns about rapid economic growth, energy security, and global climate change have created a new landscape for fossil energy exploration, production, and utilization. Since 85% of primary energy supply comes from fossil fuels, and 85% of greenhouse gas emissions come from fossil fuel consumption, new and difficult technical and political challenges confront commercial, governmental, and public stakeholders. As such, concerns over climate change are explicitly weighed against security of international and domestic energy supplies, with economic premiums paid for either or both. Efficiency improvements, fuel conservation, and deployment of nuclear and renewable supplies will help both concerns, but are unlikely to offset growth in the coming decades. As such, new technologies and undertakings must both provide high quality fossil energy with minimal environmental impacts. The largest and most difficult of these undertakings is carbon management, wherein CO2 emissions are sequestered indefinitely at substantial incremental cost. Geological formations provide both high confidence and high capacity for CO2 storage, but present scientific and technical challenges. Oil and gas supply can be partially sustained and replaced through exploitation of unconventional fossil fuels such as tar-sands, methane hydrates, coal-to-liquids, and oil shales. These fuels provide enormous reserves that can be exploited at current costs, but generally require substantial energy to process. In most cases, the energy return on investment (EROI) is dropping, and unconventional fuels are generally more carbon intensive than conventional, presenting additional carbon management challenges. Ultimately, a large and sustained science and technology program akin to the Apollo project will be needed to address these concerns. Unfortunately, real funding in energy research has dropped dramatically (75%) in the past three decades, and novel designs in fission and fusion are not likely to provide any substantial offset in the next 30 years when they are most needed internationally.
Experimental Physical Sciences Vitae 2017
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kippen, Karen Elizabeth; Del Mauro, Diana; Patterson, Eileen Frances
Frequently our most basic research experiments stimulate solutions for some of the most intractable national security problems, such as nuclear weapons stewardship, homeland security, intelligence and information analysis, and nuclear and alternative energy. This publication highlights our talented and creative staff who deliver solutions to these complex scientific and technological challenges by conducting cutting-edge multidisciplinary physical science research.
Haberl, Bianca; Shankar, Arjun; Hogle, Susan; Pierce, Eric; Chi, Miaofang; Davidson, Brian; Doughty, Ben; Elliott, Amy; Newby, Jason; Pandya, Tara; Lee, Ho Nyung; Wagner, Robert
2018-06-13
Scientists and engineers at Oak Ridge National Laboratory apply their expertise to the toughest challenges in energy, national security, and scientific discovery. Theyâre curious, passionate, and motivated, and they explain what drives them in this video from the labâs annual Awards Night, Nov. 18, 2016.
[Biofuels, food security and transgenic crops].
Acosta, Orlando; Chaparro-Giraldo, Alejandro
2009-01-01
Soaring global food prices are threatening to push more poor people back below the poverty line; this will probably become aggravated by the serious challenge that increasing population and climate changes are posing for food security. There is growing evidence that human activities involving fossil fuel consumption and land use are contributing to greenhouse gas emissions and consequently changing the climate worldwide. The finite nature of fossil fuel reserves is causing concern about energy security and there is a growing interest in the use of renewable energy sources such as biofuels. There is growing concern regarding the fact that biofuels are currently produced from food crops, thereby leading to an undesirable competition for their use as food and feed. Nevertheless, biofuels can be produced from other feedstocks such as lingo-cellulose from perennial grasses, forestry and vegetable waste. Biofuel energy content should not be exceeded by that of the fossil fuel invested in its production to ensure that it is energetically sustainable; however, biofuels must also be economically competitive and environmentally acceptable. Climate change and biofuels are challenging FAO efforts aimed at eradicating hunger worldwide by the next decade. Given that current crops used in biofuel production have not been domesticated for this purpose, transgenic technology can offer an enormous contribution towards improving biofuel crops' environmental and economic performance. The present paper critically presents some relevant relationships between biofuels, food security and transgenic plant technology.
Materials @ LANL: Solutions for National Security Challenges
NASA Astrophysics Data System (ADS)
Teter, David
2012-10-01
Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.
Cyber security challenges in Smart Cities: Safety, security and privacy
Elmaghraby, Adel S.; Losavio, Michael M.
2014-01-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517
Technological challenges for boosting coal production with environmental sustainability.
Ghose, Mrinal K
2009-07-01
The global energy requirement has grown at a phenomenon rate and the consumption of primary energy sources has been a very high positive growth. This paper focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy source in foreseeable future. It examines the energy requirement perspective for India and demand of coal as the prime energy source. Economic development and poverty alleviation depend on securing affordable energy sources and Indian coal mining industry offers a bright future for the country's energy security, provided the industry is allowed to develop by supportive government policies and adopts latest technologies for mining. It is an irony that in-spite of having a plentiful reserves, India is not able to jack up coal production to meet its current and future demand. It discusses the strategies to be adopted for growth and meeting the coal demand. But such energy are very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively The paper highlights the emissions of greenhouse gases due to burning of fossil fuels and environmental consequences of global warming and sea-level rise. Technological solutions for environment friendly coal mining and environmental laws for the abatement of environmental degradation are discussed in this paper.
76 FR 57026 - Air Force Scientific Advisory Board Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-15
... and Technology plan emphasizing next generation energy, autonomy, sustainment, cyber, and ISR... secure cyber ops; acquisition challenges amid new era of defense policy and lessons learned from...
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
NASA Astrophysics Data System (ADS)
Creed, I. F.; Poelzer, G.; Noble, B.; Beatty, B.; Belcher, K.; Chung, T.; Loring, P. A.
2017-12-01
The global energy sector is at a crossroads. Efforts to reduce greenhouse gas emissions, volatile fossil fuel prices, the emergence of sustainability markets, and advances in renewable energy technologies are setting the foundation for what could be one of the most significant societal transitions since the industrial revolution. There is a growing movement to "re-energize" Canada, through embracing pathways to facilitate a societal transition a low-carbon future. For example, circumpolar jurisdictions are poised for a transition to renewable energy. There are more than 250 remote, off-grid communities across Canada's North, of which approximately 170 are Indigenous, that rely largely on diesel-fueled generators. Diesel-fueled generation is generally reliable when properly maintained; however, supply is limited, infrastructure is at capacity or in need of major upgrading, and the volatile price of fuel can mean significant social, community and economic opportunity loss. Renewable energy projects offer one possible opportunity to address these challenges. But, given the challenges of human capacity, limited fiscal resources, and regulatory barriers, how can Northern communities participate in the global energy transition and not be left behind? To answer this question, the University of Saskatchewan, together with partners from the circumpolar North, are leading an initiative to develop a cross-sectoral and multi-national consortium of communities, utilities, industries, governments, and academics engaged in renewable energy in the North. This consortium will reimagine energy security in the North by co-creating and brokering the knowledge and understanding to design renewable energy systems that enhance social and economic value. Northern communities and utilities will learn directly from other northern communities and utilities across Canada and internationally about what can be achieved in renewable energy development and the solutions to current and future energy challenges.
Human Reliability Program Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, John; Rogers, Erin; Gerke, Gretchen
A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less
Shared Awareness in Times of Crisis: A Framework for Collaboration
2011-06-01
also affords a “ dashboard ” perspective allowing for centralization of resources. The U.S. Army’s Knowledge Online portal is one example of a single...labor, energy, materials, information, cash and technology into outputs of higher value • Organization’s values (criteria that managers and...follows: Challenges - Disabilities Inter-Organizational Cross-Organizational Privacy and Security high security (portal) blocks information flow Trust
Water-energy-food security nexus: the road map
NASA Astrophysics Data System (ADS)
Hamdy, Atef
2015-04-01
The world's growing population and increased prosperity will increase global demand for energy, as well as food and water supplies in the coming decades. In the arid and semi arid regions as in most of the world water and energy have historically been managed separately, with little consideration of cross sectoral interactions, yet in reality, water and energy are closely interconnected. By addressing water and energy together planners can identify crucial interactions, conflicting demands and potential synergies. For many countries around the world it is needed to establish a road map on: (i) how to implement nexus policies to increase efficiency of natural resources management? (ii) how to bridge science with policy and business? (iii) how governments be inspired by business? (iv) how can be business be inspired by science? (v) how can we learn from each other and how collaborate to address the challenges ahead? Such road map should seek to bring together stakeholders involved in the nexus implementation approach over the coming years to develop nexus tools for decision making to quantify water energy food resources on both national and regional level. However, experiences gained and learned lessons indicate clearly that numerous countries are facing several barriers in putting in action their nexus road map due to the lack of integrated resource management, lack of capacity for research development, lack of knowledge sharing across sectors, and not enough interaction between policy makers and scientists. Those are major challenges to be faced to achieve the water, energy and food security nexus. Furthermore, such goal cannot be reached without building and strengthening the synergy between education, research and innovation for sustainable resource management. Those issues beside others will be fully discussed in this paper. Keywords: water-energy-food security; nexus
Beyond Fossil Fuels: Options and Challenges
NASA Astrophysics Data System (ADS)
Thompson, Levi T.
2007-05-01
Securing our nationâÂÂs energy supply is arguably the most important challenge we face. The source and amount of energy that is available impacts nearly every aspect of our lives including our mobility, health and welfare. Presently, the U.S. depends heavily on foreign energy resources. For example, in 2006, nearly 60 percent of the crude oil consumed in the U.S. was imported; approximately one-quarter of this oil comes from the Persian Gulf. With growing demands from emerging economies, declining environmental quality and potential for global conflict, there is a pressing need to develop a more sustainable energy strategy. This presentation will review options for a sustainable energy economy including the use of hydrogen and fuel cells, and describe some of the key challenges To cite this abstract, use the following reference: http://meetings.aps.org/link/BAPS.2007.OSS07.A1.2
Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Josserand, Terry Michael; Young, Leone; Chamberlin, Edwin Phillip
The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations thatmore » estimators and analysts of the Nuclear Security Enterprise will find useful.« less
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Suggestions for Strategic Planning for the Office of Nonproliferation Research and Engineering
2002-01-01
The Office of Nonproliferation Research and Engineering, part of the recently formed National Nuclear Security Administration within the Department...of Energy, conducts wide-ranging research for diverse end users at the federal and local level. As such, the Office faces a number of challenges in...planning methods. This report grew out of support provided to an advisory committee for the Office of Nonproliferation and National Security, an
National Synchrotron Light Source II
Hill, John; Dooryhee, Eric; Wilkins, Stuart; Miller, Lisa; Chu, Yong
2018-01-16
NSLS-II is a synchrotron light source helping researchers explore solutions to the grand energy challenges faced by the nation, and open up new regimes of scientific discovery that will pave the way to discoveries in physics, chemistry, and biology â advances that will ultimately enhance national security and help drive the development of abundant, safe, and clean energy technologies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Jason E.
For more than 50 years, the United States (U.S.) Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) has advanced the frontiers of science and technology through courageous discovery and innovation. Our multidisciplinary team of more than 4,400 scientists, engineers, and support professionals is tackling global sustainability challenges in our science, energy, environmental, and security missions. For example, our research on how human and natural systems interact is critical to informing sustainable solutions to the nation’s energy and environmental challenges. PNNL is equally committed to sustainability right here at home, and we are making excellent progress toward the goals describedmore » in this plan. We are working on ongoing challenges, such as reducing the energy required to meet our research mission and promoting conservation among our employees.« less
ARPA-E: Celebrating the Energy Entrepreneur
Williams, Ellen; Henshall, Dave; Babinec, Sue; Wessells, Colin; Zakhor, Avideh; Mockler, Todd
2018-01-16
The world faces urgent energy challenges brought on by projected population increases, aging infrastructure and the global threat of climate change. ARPA-E is investing in some of the countryâs brightest energy entrepreneurs that are developing innovative technological options to help meet future energy needs. Featuring remarks from ARPA-E Director Dr. Ellen D. Williams, as well as interviews with the Deputy Director of Commercialization Dave Henshall, Senior Technology-to-Market Advisor Sue Babinec, and a number of ARPA-E awardees, this video highlights the energy entrepreneur, and the critical role they play in creating solutions to address future energy challenges and ensure a secure energy future. The video also incorporates footage shot on site with several ARPA-E awardees who are spurring innovation, much of which will be highlighted in other videos shown throughout the Summit.
Power and Energy Strategy White Paper
2010-04-01
and cooling. In recent years, several factors have emerged which further complicate the engineering and logistics challenges associated with power and...equation to maintain US military dominance in support of national security. II. INTRODUCTION Energy was a critical factor during many of the...non-combat platforms, especially for auxiliary power, and the compelling quest for compact, high capacity power sources for our overburdened Soldiers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Trost, Alan L.
The U.S. Department of Energy (DOE) Office of Nuclear Energy (NE) has developed a research and development (R&D) roadmap for its research, development, and demonstration (RD&D) activities to ensure nuclear energy remains a compelling and viable energy option for the U.S. The roadmap defines NE RD&D activities and objectives that address the challenges to research, develop and demonstrate options to the current U.S commercial fuel cycle to enable the safe, secure, economic, and sustainable expansion of nuclear energy, while minimizing proliferation and terrorism risks expanding the use of nuclear power. The roadmap enables the development of technologies and other solutionsmore » that can improve the reliability, sustain the safety, and extend the life of current reactors. In addition, it will help to develop improvements in the affordability of the new reactors to enable nuclear energy to help meet the Administration’s energy security and climate change goals.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghose, M.K.; Paul, B.
The global energy requirement has grown at a phenomenal rate and the consumption of primary energy sources has been a very high positive growth. This article focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy in the foreseeable future. It examines energy requirement perspectives for India and demands of petroleum, natural gas, and coal bed methane in the foreseeable future. It discusses the state of present day petroleum and petrochemical industries in the country and the latest advances in them to take over in the next fewmore » years. The regional pattern of consumption of primary energy sources shows that oil remains as the largest single source of primary energy in most parts of the world. However, gas dominates as the prime source in some parts of the world. Economic development and poverty alleviation depend on securing affordable energy sources and for the country's energy security; it is necessary to adopt the latest technological advances in petroleum and petrochemical industries by supportive government policies. But such energy is very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively. Environmental laws for the abatement of environmental degradation are discussed in this paper. The paper concludes that energy security leading to energy independence is certainly possible and can be achieved through a planned manner.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bryant, Steven L; Camacho-Lopez, Tara R; Tenney, Craig M
Representing the Center for Frontiers of Subsurface Energy Security (CFSES), this document is one of the entries in the Ten Hundred and One Word Challenge. As part of the challenge, the 46 Energy Frontier Research Centers were invited to represent their science in images, cartoons, photos, words and original paintings, but any descriptions or words could only use the 1000 most commonly used words in the English language, with the addition of one word important to each of the EFRCs and the mission of DOE: energy. The mission of the CFSES is to pursue the scientific understanding of multiscale, multiphysicsmore » processes and to ensure safe and economically feasible storage of carbon dioxide and other byproducts of energy production without harming the environment.« less
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists
NASA Astrophysics Data System (ADS)
Wadsworth, Jeffrey
2010-04-01
The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.
Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists
NASA Astrophysics Data System (ADS)
Wadsworth, Jeffrey
2010-05-01
The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-12-30
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-01-01
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831
NASA Astrophysics Data System (ADS)
Karasiev, V. V.
2017-10-01
Free-energy density functional theory (DFT) is one of the standard tools in high-energy-density physics used to determine the fundamental properties of dense plasmas, especially in cold and warm regimes when quantum effects are essential. DFT is usually implemented via the orbital-dependent Kohn-Sham (KS) procedure. There are two challenges of conventional implementation: (1) KS computational cost becomes prohibitively expensive at high temperatures; and (2) ground-state exchange-correlation (XC) functionals do not take into account the XC thermal effects. This talk will address both challenges and report details of the formal development of new generalized gradient approximation (GGA) XC free-energy functional which bridges low-temperature (ground state) and high-temperature (plasma) limits. Recent progress on development of functionals for orbital-free DFT as a way to address the second challenge will also be discussed. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Since its creation in 1946, Argonne National Laboratory has addressed the nation’s most pressing challenges in science, energy, the environment, and national security. United by a common goal – to improve the world – Argonne continues to drive the scientific and technological breakthroughs needed to ensure a sustainable future.
Sandia National Laboratories focus issue: introduction.
Boye, Robert
2014-08-20
For more than six decades, Sandia has provided the critical science and technology to address the nation's most challenging issues. Our original nuclear weapons mission has been complemented with work in defense systems, energy and climate, as well as international and homeland security. Our vision is to be a premier science and engineering laboratory for technology solutions to the most challenging problems that threaten peace and freedom for our nation and the globe.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.
Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.
Microgrid Enabled Distributed Energy Solutions (MEDES) - Fort Bliss Military Reservation
2014-04-01
Security Act EPA Environmental Protection Agency EPAct05 Energy Policy Act of 2005 EPDF Enlisted Personnel Dining Facility EPEC El Paso Electric Company...Retrofitting the existing electrical infrastructure was a challenge, especially with the existing switchboard layout restricting the addition of motor ...operators (to allow for load shedding). The Lockheed Martin team installed as many motor operators as physically possible in the existing
Virtual special issue on catalysis at the U.S. Department of Energy's National Laboratories
Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.; ...
2016-04-21
Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.
Food security: crops for people not for cars.
Kullander, Sven
2010-05-01
Humankind is currently faced with the huge challenge of securing a sustainable energy supply and biofuels constitute one of the major options. However, the commercially traded edible crops are barely sufficient to meet food demand of the present world population. Certain regions, for example EU-27, do not even have a sufficient indigenous crop production. Of this follows that motor biofuels based on edible crops should be avoided. To replace more than some percent of the fossil motor fuels, non-edible biomass-rest products and wastes-should instead be considered for conversion to biofuels. In this way, about 10% of the current fossil fuels can be replaced. Feeding a world population expected to grow by some 50% during the next 50 years will be a major challenge. For environmental reasons it seems that agricultural land cannot be expanded very much, maybe not at all. The solution to the increasing food demand seems therefore to be using the present crop production more efficiently and increasing output from present agricultural land, maintaining biodiversity and climate stability within reasonable limits. In the future, agriculture will need more energy and more water irrigation. Food production is, however, already very energy demanding, requiring several times more externally provided energy than the energy content of the food itself. A sufficient energy supply will be a key issue for the future farming!
A Strategy for Nuclear Energy Research and Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ralph G. Bennett
2008-12-01
The United States is facing unprecedented challenges in climate change and energy security. President-elect Obama has called for a reduction of CO2 emissions to 1990 levels by 2020, with a further 80% reduction by 2050. Meeting these aggressive goals while gradually increasing the overall energy supply requires that all non-emitting technologies must be advanced. The development and deployment of nuclear energy can, in fact, help the United States meet several key challenges: 1) Increase the electricity generated by non-emitting sources to mitigate climate change, 2) Foster the safe and proliferation-resistant use of nuclear energy throughout the world, 3) Reduce themore » transportation sector’s dependence on imported fossil fuels, and 4) Reduce the demand on natural gas for process heat and hydrogen production. However, because of the scale, cost, and time horizons involved, increasing nuclear energy’s share will require a coordinated research effort—combining the efforts of industry and government, supported by innovation from the research community. This report outlines the significant nuclear energy research and development (R&D) necessary to create options that will allow government and industrial decision-makers to set policies and create nuclear energy initiatives that are decisive and sustainable. The nuclear energy R&D strategy described in this report adopts the following vision: Safe and economical nuclear energy in the United States will expand to address future electric and non-electric needs, significantly reduce greenhouse gas emissions and provide energy diversity, while providing leadership for safe, secure and responsible expansion of nuclear energy internationally.« less
Post-Cold War Science and Technology at Los Alamos
NASA Astrophysics Data System (ADS)
Browne, John C.
2002-04-01
Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.
NASA Astrophysics Data System (ADS)
Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor
Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-07-11
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-01-01
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
On securing wireless sensor network--novel authentication scheme against DOS attacks.
Raja, K Nirmal; Beno, M Marsaline
2014-10-01
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
2015-11-01
energy efficiency.25 The rules are scheduled to go into effect in 2016. One of the toughest components for coal power plants to meet will be the NOx...coal power plants out of business by the early-2020s.30 High Cost and Other Challenges of Renewables. Renewable energy has been a focus of the envi...will be explained later in detail. Coal: An Environmentally Problematic Energy Source. Besides CO2 emissions, burning coal pollutes the environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Intrator, Miranda Huang
Los Alamos National Security, LLC (LANS) is the manager and operator of Los Alamos National Laboratory (Los Alamos) for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52- 06NA25396. Los Alamos is a mission-centric Federally Funded Research and Development Center focused on solving critical national security challenges through science and engineering for both government and private customers. LANS is opening this formal Request for Information (RFI) to gauge interest in engaging as an industry partner to LANS for collaboration in advancing the bio-assessment platform described below. Please see last section for details on submitting a Letter ofmore » Interest.« less
77 FR 44611 - Notice of International Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
... under the Asia-Pacific Partnership on Clean Development and Climate (APP). The APP was an international partnership between the United States, South Korea, Japan, India, Canada, China and Australia aimed at addressing the challenges of climate change, energy security and air pollution in a way that encouraged...
Managing water resources for biomass production in a biofuel economy
USDA-ARS?s Scientific Manuscript database
One goal of our national security policy is to become more energy independent using biofuels. The expanded production of agricultural crops for bioenergy production has introduced new challenges for management of water. Water availability has been widely presumed in the discussion of bioenergy crop ...
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M
2017-09-04
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
NASA Astrophysics Data System (ADS)
Devineni, N.; Lall, U.
2014-12-01
Where will the food for the 9 billion people we expect on Earth by 2050 come from? The answer to this question depends on where the water and the energy for agriculture will come from. This assumes of course, that our primary food source will continue to be based on production on land, and that irrigation and the use of fertilizers to improve production are needed to address climate shocks and deteriorating soil health. Given this, establishing an economically, environmentally and physically feasible pathway to achieve water, energy and food security in the face of a changing climate is crucial to planetary well-being. A central hypothesis of the proposed paper is that innovation towards agricultural sustainability in countries such as India and China, that have large populations relative to their water, energy and arable land endowment, and yet have opportunity for improvement in productivity metrics such as crop yield per unit water or energy use, can show us the way to achieve global water-food-energy sustainability. These countries experience a monsoonal climate, which has a high frequency of climate extremes (more floods and droughts, and a short rainy season) relative to the developed countries in temperate climates. Global climate change projections indicate that the frequency and severity of extremes may pose a challenge in the future. Thus, strategies that are resilient to such extremes in monsoonal climates may be of global value in a warmer, more variable world. Much of the future population growth is expected to occur in Africa, S. America and S. Asia. Targeting these regions for higher productivity and resilience is consequently important from a national security perspective as well. Through this paper, we propose to (a) layout in detail, the challenges faced by the water, energy and food sectors in emerging countries, with specific focus on India and China and (b) provide the scientific background for an integrated systems analytic approach to formulate solutions at varying scales that can be employed globally. Such coordinated analyses is important for an examination of the future water sustainability in the face of changing climate, agricultural trends, environmental impacts and new energy choices.
The National Ignition Facility: The Path to a Carbon-Free Energy Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stolz, C J
2011-03-16
The National Ignition Facility (NIF), the world's largest and most energetic laser system, is now operational at Lawrence Livermore National Laboratory (LLNL). The NIF will enable exploration of scientific problems in national strategic security, basic science and fusion energy. One of the early NIF goals centers on achieving laboratory-scale thermonuclear ignition and energy gain, demonstrating the feasibility of laser fusion as a viable source of clean, carbon-free energy. This talk will discuss the precision technology and engineering challenges of building the NIF and those we must overcome to make fusion energy a commercial reality.
The National Ignition Facility: the path to a carbon-free energy future.
Stolz, Christopher J
2012-08-28
The National Ignition Facility (NIF), the world's largest and most energetic laser system, is now operational at Lawrence Livermore National Laboratory. The NIF will enable exploration of scientific problems in national strategic security, basic science and fusion energy. One of the early NIF goals centres on achieving laboratory-scale thermonuclear ignition and energy gain, demonstrating the feasibility of laser fusion as a viable source of clean, carbon-free energy. This talk will discuss the precision technology and engineering challenges of building the NIF and those we must overcome to make fusion energy a commercial reality.
Implications of Postharvest Food Loss/Waste Prevention to Energy and Resources Conservation
NASA Astrophysics Data System (ADS)
Cai, X.; Shafiee-Jood, M.
2015-12-01
World's growing demand for food is driven by population and income growth, dietary changes, and the ever-increasing competition between food, feed and bioenergy challenges food security; meanwhile agricultural expansion and intensification threats the environment by the various detrimental impacts. Researchers have attempted to explore strategies to overcome this grand challenge. One of the promising solutions that have attracted considerable attention recently is to increase the efficiency of food supply chain by reducing food loss and waste (FLW). According to recent studies conducted by Food and Agriculture Organization (FAO), United Nation, almost one third of the food produced for human consumption globally is lost or wasted along the food supply chain. This amount of food discarded manifests a missing, yet potential, opportunity to sustainably enhance both food security and environmental sustainability. However, implementing the strategies and technologies for tackling FLW does not come up as an easy solution since it requires economic incentives, benefit and cost analysis, infrastructure development, and appropriate market mechanism. In this presentation I will provide a synthesis of knowledge on the implications of postharvest food loss/waste prevention to energy and resource conservation, environmental protection, as well as food security. I will also discuss how traditional civil and environmental engineering can contribute to the reduction of postharvest food loss, an important issue of sustainable agriculture.
Role of non-fossil energy in meeting China's energy and climate target for 2020
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhou, Sheng; Tong, Qing; Yu, Sha
2012-12-01
China is the largest energy consumer and CO2 emitter in the world. The Chinese government faces growing challenges of ensuring energy security and reducing greenhouse gas emissions. To address these two issues, the Chinese government has announced two ambitious domestic indicative autonomous mitigation targets for 2020: increasing the ratio of non-fossil energy to 15% and reducing carbon dioxide emissions per unit of GDP by 40-45% from 2005 levels. To explore the role of non-fossil energy in achieving these two targets, this paper first provides an overview of current status of non-fossil energy development in China; then gives a brief reviewmore » of GDP and primary energy consumption; next assesses in detail the role of the non fossil energy in 2020, including the installed capacity and electricity generation of non-fossil energy sources, the share and role of non-fossil energy in the electricity structure, emissions reduction resulting from the shift to non-fossil energy, and challenges for accomplishing the mitigation targets in 2020 ; finally, conclusions and policy measures for non-fossil energy development are proposed.« less
Risk and Infrastructure Science Center - Global Security Sciences
delivers scientific tools and methodologies to inform decision making regarding the most challenging Sciences ASD Accelerator Systems AES APS Engineering Support XSD X-ray Science Physical Sciences and Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
THE POTENTIAL MID-TERM ROLE OF NUCLEAR POWER IN THE UNITED STATES: A SCENARIO ANALYSIS USING MARKAL
With all nations facing enormous challenges related to energy security, sustainability and environmental quality, nuclear power is likely to play an increasingly important role in the future. In particular, the life-cycle emissions of criteria pollutants and greenhouse gases (GHG...
Power grid operation risk management: V2G deployment for sustainable development
NASA Astrophysics Data System (ADS)
Haddadian, Ghazale J.
The production, transmission, and delivery of cost--efficient energy to supply ever-increasing peak loads along with a quest for developing a low-carbon economy require significant evolutions in the power grid operations. Lower prices of vast natural gas resources in the United States, Fukushima nuclear disaster, higher and more intense energy consumptions in China and India, issues related to energy security, and recent Middle East conflicts, have urged decisions makers throughout the world to look into other means of generating electricity locally. As the world look to combat climate changes, a shift from carbon-based fuels to non-carbon based fuels is inevitable. However, the variability of distributed generation assets in the electricity grid has introduced major reliability challenges for power grid operators. While spearheading sustainable and reliable power grid operations, this dissertation develops a multi-stakeholder approach to power grid operation design; aiming to address economic, security, and environmental challenges of the constrained electricity generation. It investigates the role of Electric Vehicle (EV) fleets integration, as distributed and mobile storage assets to support high penetrations of renewable energy sources, in the power grid. The vehicle-to-grid (V2G) concept is considered to demonstrate the bidirectional role of EV fleets both as a provider and consumer of energy in securing a sustainable power grid operation. The proposed optimization modeling is the application of Mixed-Integer Linear Programing (MILP) to large-scale systems to solve the hourly security-constrained unit commitment (SCUC) -- an optimal scheduling concept in the economic operation of electric power systems. The Monte Carlo scenario-based approach is utilized to evaluate different scenarios concerning the uncertainties in the operation of power grid system. Further, in order to expedite the real-time solution of the proposed approach for large-scale power systems, it considers a two-stage model using the Benders Decomposition (BD). The numerical simulation demonstrate that the utilization of smart EV fleets in power grid systems would ensure a sustainable grid operation with lower carbon footprints, smoother integration of renewable sources, higher security, and lower power grid operation costs. The results, additionally, illustrate the effectiveness of the proposed MILP approach and its potentials as an optimization tool for sustainable operation of large scale electric power systems.
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
NASA Astrophysics Data System (ADS)
Hebner, Greg
2010-11-01
Products and consumer goods that utilize low temperature plasmas at some point in their creation touch and enrich our lives on almost a continuous basis. Examples are many but include the tremendous advances in microelectronics and the pervasive nature of the internet, advanced material coatings that increase the strength and reliability of products from turbine engines to potato chip bags, and the recent national emphasis on energy efficient lighting and compact fluorescent bulbs. Each of these products owes their contributions to energy security and international competiveness to fundamental research investments. However, it would be a mistake to believe that the great commercial success of these products implies a robust understanding of the complicated interactions inherent in plasma systems. Rather, current development of the next generation of low temperature plasma enabled products and processes is clearly exposing a new set of exciting scientific challenges that require leaps in fundamental understanding and interdisciplinary research teams. Emerging applications such as liquid-plasma systems to improve water quality and remediate hazardous chemicals, plasma-assisted combustion to increase energy efficiency and reduce emissions, and medical applications promise to improve our lives and the environment only if difficult science questions are solved. This talk will take a brief look back at the role of low temperature plasma science in enabling entirely new markets and then survey the next generation of emerging plasma applications. The emphasis will be on describing the key science questions and the opportunities for scientific cross cutting collaborations that underscore the need for increased outreach on the part of the plasma science community to improve visibility at the federal program level. This work is supported by the DOE, Office of Science for Fusion Energy Sciences, and Sandia National Laboratories, a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000
Laboratory Directed Research and Development FY2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, W; Sketchley, J; Kotta, P
2012-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less
Taking the "waste" out of "wastewater" for human water security and ecosystem sustainability.
Grant, Stanley B; Saphores, Jean-Daniel; Feldman, David L; Hamilton, Andrew J; Fletcher, Tim D; Cook, Perran L M; Stewardson, Michael; Sanders, Brett F; Levin, Lisa A; Ambrose, Richard F; Deletic, Ana; Brown, Rebekah; Jiang, Sunny C; Rosso, Diego; Cooper, William J; Marusic, Ivan
2012-08-10
Humans create vast quantities of wastewater through inefficiencies and poor management of water systems. The wasting of water poses sustainability challenges, depletes energy reserves, and undermines human water security and ecosystem health. Here we review emerging approaches for reusing wastewater and minimizing its generation. These complementary options make the most of scarce freshwater resources, serve the varying water needs of both developed and developing countries, and confer a variety of environmental benefits. Their widespread adoption will require changing how freshwater is sourced, used, managed, and priced.
The Water-Energy-Food Nexus in Kazakhstan: Trends and Analyses
NASA Astrophysics Data System (ADS)
Karatayev, Marat; Rivotti, Pedro; Sobral Mourão, Zenaida; Konadu, D. Dennis; Clarke, Michèle
2017-04-01
The concept of the water, energy and food nexus is extremely relevant to Kazakhstan as the country faces population growth, economic progress and environmental challenges such as water scarcity, desertification, and climate change. Furthermore, poor sectoral coordination and institutional fragmentation have caused an unsustainable resource use and threaten the long-term sustainability of water, energy and food security in Kazakhstan. Specifically, low tariffs in the water and electricity sectors have led to under-investment in water and energy efficiency measures, leading to extensive water losses, soil salinity, as well as degradation of agricultural land. Using the nexus approach, this study aims to investigate and map the linkages between water resources, energy production and food security in Kazakhstan, with an emphasis on the current coordination framework. This will enable the identification of critical interdependency issues in the management of these resources. The results will provide a better understanding of the current interconnectedness of the sectors, and support the coordination of decision-making at various levels of governance and research of land, water and energy to meet sustainable development goals.
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
ASCR Cybersecurity for Scientific Computing Integrity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piesert, Sean
The Department of Energy (DOE) has the responsibility to address the energy, environmental, and nuclear security challenges that face our nation. Much of DOE’s enterprise involves distributed, collaborative teams; a signi¬cant fraction involves “open science,” which depends on multi-institutional, often international collaborations that must access or share signi¬cant amounts of information between institutions and over networks around the world. The mission of the Office of Science is the delivery of scienti¬c discoveries and major scienti¬c tools to transform our understanding of nature and to advance the energy, economic, and national security of the United States. The ability of DOE tomore » execute its responsibilities depends critically on its ability to assure the integrity and availability of scienti¬c facilities and computer systems, and of the scienti¬c, engineering, and operational software and data that support its mission.« less
NASA Astrophysics Data System (ADS)
Sabonis-Chafee, Theresa Marie
The successor states of Armenia, Lithuania and Ukraine arrived at independence facing extraordinary challenges in their energy sectors. Each state was a net importer, heavily dependent on cheap energy supplies, mostly from Russia. Each state also inherited a nuclear power complex over which it had not previously exercised full control. In the time period 1991--1996, each state attempted to impose coherence on the energy sector, selecting a new course for the pieces it had inherited from a much larger, highly integrated energy structure. Each state attempted to craft national energy policies in the midst of severe supply shocks and price shocks. Each state developed institutions to govern its nuclear power sector. The states' challenges were made even greater by the fact that they had few political or economic structures necessary for energy management, and sought to create those structures at the same time. This dissertation is a systematic, non-quantitative examination of how each state's energy policies developed during the 1991--1996 time period. The theoretical premise of the analysis (drawn from Statist realism) is that systemic variables---regional climate and energy vulnerability---provide the best explanations for the resulting energy policy decisions. The dependent variable is defined as creation and reform of energy institutions. The independent variables include domestic climate, regional climate, energy vulnerability and transnational assistance. All three states adopted rhetoric and legislation declaring energy a strategic sector. The evidence suggests that two of the states, Armenia and Lithuania, which faced tense regional climates and high levels of energy vulnerability, succeeded in actually treating energy strategically, approaching energy as a matter of national security or "high politics." The third state, Ukraine, failed to do so. The evidence presented suggests that the systemic variables (regional climate and energy vulnerability) provided a more favorable environment for Ukraine, one in which the state attempted reform of the sector, but not as a concerted national security issue.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less
USDA-ARS?s Scientific Manuscript database
The United States Government is aggressively promoting ethanol and alternative biofuels as a substitute for gasoline. The Energy Independence and Security Act of 2007 enacted on December 19 targets production of 36 billion gallons of biofuels by 2022. Passage of this bill was motivated by recent s...
Deatsch-Kratochvil, Amanda N; Pascual, Thomas Neil; Kesner, Adam; Rosenblatt, Eduardo; Chhem, Rethy K
2013-02-01
Global health has been an issue of seemingly low political importance in comparison with issues that have direct bearing on countries' national security. Recently, health has experienced a "political revolution" or a rise in political importance. Today, we face substantial global health challenges, from the spread of infectious disease, gaps in basic maternal and child health care, to the globalization of cancer. A recent estimate states that the "overall lifetime risk of developing cancer (both sexes) is expected to rise from more than one in three to one in two by 2015." These issues pose significant threats to international health security. To successfully combat these grave challenges, the international community must embrace and engage in global health diplomacy, defined by scholars Thomas Novotny and Vicanne Adams as a political activity aimed at improving global health, while at the same time maintaining and strengthening international relations. The IAEA (International Atomic Energy Agency) is an international organization with a unique mandate to "accelerate and enlarge the contribution of atomic energy to peace, health, and prosperity throughout the world." This article discusses global health diplomacy, reviews the IAEA's program activities in human health by focusing on radiation medicine and cancer, and the peaceful applications of atomic energy within the context of global health diplomacy. Copyright © 2013 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
Opportunities and challenges for a sustainable energy future.
Chu, Steven; Majumdar, Arun
2012-08-16
Access to clean, affordable and reliable energy has been a cornerstone of the world's increasing prosperity and economic growth since the beginning of the industrial revolution. Our use of energy in the twenty-first century must also be sustainable. Solar and water-based energy generation, and engineering of microbes to produce biofuels are a few examples of the alternatives. This Perspective puts these opportunities into a larger context by relating them to a number of aspects in the transportation and electricity generation sectors. It also provides a snapshot of the current energy landscape and discusses several research and development opportunities and pathways that could lead to a prosperous, sustainable and secure energy future for the world.
Learning Competitive Intelligence from a Bunch of Screwballs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Troy Hiltbrand
Idaho National Laboratory is the Department of Energy’s (DOE) lead lab for nuclear energy research and is dedicated to supporting the advancement of missions in nuclear energy research, energy and environment, and national security. The laboratory is operated by Battelle Energy Alliance (BEA) and participates both independently and jointly with other labs in the support of work for the DOE and other government organizations. The Information Management department is a key support organization whose purpose is to enable the three key areas supporting the Laboratory mission, Nuclear Energy, National and Homeland Security, and Energy and Environment, are successful. The challengemore » that we face is having relevant information about what these key areas of the Laboratory are working on and how we can best support them in achieving overall mission success. In addition, one of the major challenges that they face comes with knowing their customers and their customer’s needs so that they can successfully execute on their mission. Technology Application Organizations today are dependent on understanding their customers and competitors so that they can respond accordingly, but this can be a difficult and vexing challenge. Customers do not always reveal all of their needs and competitors rarely come out and reveal what they are doing, but this does not mean that hints about their plans are not abundant in information that is readily available. The challenge has always been how to keep track of all that is happening and converting that into useful information. Taking the lead from the “Screwball Division” from World War II, we have the tools available to automate this process and start to mine the Internet to get clues of what our customers and competitors are actively working on. By looking at what is being said and relating that to what else is being said, we can build competitive intelligence and act upon this to further our organizational objectives.« less
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Global CLEWs model - A novel application of OSeMOSYS
NASA Astrophysics Data System (ADS)
Avgerinopoulos, Georgios; Pereira Ramos, Eunice; Howells, Mark
2017-04-01
Over the past years, studies that analyse Nexus issues from a holistic point of view and not energy, land or water separately have been gaining momentum. This project aims at giving insights into global issues through the application and the analysis of a global scale OSeMOSYS model. The latter -which is based on a fully open and amendable code- has been used successfully in the latest years as it has been the producing fully accessible energy models suitable for capacity building and policy making suggestions. This study develops a CLEWs (climate, land, energy and water) model with the objective of interrogating global challenges (e.g. increasing food demand) and international trade features, with policy priorities on food security, resource efficiency, low-carbon energy and climate change mitigation, water availability and vulnerability to water stress and floods, water quality, biodiversity and ecosystem services. It will for instance assess (i) the impact of water constraints on food security and human development (clean water for human use; industrial and energy water demands), as well as (ii) the impact of climate change on aggravating or relieving water problems.
Challenges of deploying nuclear energy for power generation in Malaysia
NASA Astrophysics Data System (ADS)
Jaafar, Mohd Zamzam; Nazaruddin, Nurul Huda; Lye, Jonathan Tan Thiam
2017-01-01
Under the 10th Malaysia Plan (2010-2015) and the Economic Transformation Programme (ETP), nuclear energy was identified as a potential long-term option to be explored for electricity generation in Peninsular Malaysia. The energy sector in Malaysia currently faces several concerns including depleting domestic gas supply which will affect security and reliability of supply as well as overdependance on fossil fuels - mainly gas and imported coal, and nuclear energy may offer a possible solution to these issues as well as global climate change concern. Pursuing the nuclear option, Malaysia Nuclear Power Corporation (MNPC) is undertaking a series of comprehensive studies to facilitate an informed Government decision on the matter. This paper aims to discuss the many challenges towards the peaceful use of nuclear energy for electricity generation in the context of the New Energy Policy 2010 to achieve a balanced and sustainable energy mix. This effort will continue in the 11th Malaysia Plan (2016-2020) with emphasis on implementing a comprehensive communications plan and public awareness programme for the potential use of nuclear energy in the future. In analysing the challenges for the development of nuclear energy in Malaysia, the traditional triple bottom line (TBL) framework for sustainability, encompassing economic, social and environmental objectives is utilized. An additional factor, technical, is also included in the analysis to provide a more holistic view. It is opined that the main challenges of developing nuclear energy for electricity generation in a newcomer country like Malaysia can be attributed primarily to domestic non-technical factors compared to the technical factor.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Petru, Ernest Frank
The Human Resources (HR) Division is a critical part of Los Alamos National Laboratory, an internationally recognized science and R&D facility with a specialized workforce of more than 10,000. The Laboratory’s mission is to solve national security challenges through scientific excellence. The HR Division partners with employees and managers to support the Laboratory in hiring, retaining, and motivating an exceptional workforce. The Laboratory is owned by the U.S. Department of Energy (DOE), with oversight by the DOE’s National Nuclear Security Administration (NNSA). In 2006, NNSA awarded the contract for managing and operating the Laboratory to Los Alamos National Security, LLCmore » (LANS), and a for-profit consortium. This report expounds on performance excellence efforts, presenting a strategic plan and operations.« less
Wind Energy Deployment in Isolated Islanded Power Systems: Challenges & Realities (Poster)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baring-Gould, I.
Rising costs of fuels, energy surety, and the carbon impacts of diesel fuel are driving remote and islanded communities dependent on diesel power generation to look for alternatives. Over the past few years, interest in using wind energy to reduce diesel fuel consumption has increased dramatically, potentially providing economic, environmental, social, and security benefits to the energy supply of isolated and islanded communities. However, the task of implementing such systems has remained elusive and subject to many cases of lower-than-expected performance. This poster describes the current status of integrating higher contribution wind technology into islanded power systems, the progress ofmore » recent initiatives implemented by the U.S. Department of Energy and Interior, and some of the lingering technical and commercial challenges. Operating experience from a number of power systems is described. The worldwide market for wind development in islanded communities (some of these supplying large domestic loads) provides a strong market niche for the wind industry, even in the midst of a slow global recovery.« less
LLNL: Science in the National Interest
George Miller
2017-12-09
This is Lawrence Livermore National Laboratory. located in the Livermore Valley about 50 miles east of San Francisco, the Lab is where the nations topmost science, engineering and technology come together. National security, counter-terrorism, medical technologies, energy, climate change our researchers are working to develop solutions to these challenges. For more than 50 years, we have been keeping America strong.
The Policy Trade-off Between Energy Security and Climate Change in the GCC States
NASA Astrophysics Data System (ADS)
Shahbek, Shaikha Ali
Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.
Army Net Zero: Energy Roadmap and Program Summary, Fiscal Year 2013 (Brochure)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The U.S. Army (Army) partnered with the National Renewable Energy Laboratory (NREL) and the U.S. Army Corps of Engineers to assess opportunities for increasing energy security through improved energy efficiency and optimized renewable energy strategies at nine installations across the Army's portfolio. Referred to as Net Zero Energy Installations (NZEIs), these projects demonstrate and validate energy efficiency and renewable energy technologies with approaches that can be replicated across DOD and other Federal agencies, setting the stage for broad market adoption. This report summarizes the results of the energy project roadmaps developed by NREL, shows the progress each installation could makemore » in achieving Net Zero Energy by 2020, and presents lessons learned and unique challenges from each installation.« less
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
Tsoukalas, Lefteri
2018-01-24
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.
Lentine, Anthony L.; DeRose, Christopher T.
2016-02-12
In this study, small silicon photonics micro-resonator modulators and filters hold the promise for multi-terabit per-second interconnects at energy consumptions well below 1 pJ/bit. To date, no products exist and little known commercial development is occurring using this technology. Why? In this talk, we review the many challenges that remain to be overcome in bringing this technology from the research labs to the field where they can overcome important commercial, industrial, and national security limitations of existing photonic technologies.
NASA Astrophysics Data System (ADS)
1990-01-01
Our nation faces significant challenges as we enter the 1990s: securing a reliable supply of competitively priced energy, improving the quality of our environment, and increasing our share of foreign markets for goods and services. The U.S. Department of Energy's (DOE) Programs in Renewable Energy are working toward meeting these challenges by developing the technologies that make use of our nation's largest energy resource: renewable energy. The sunlight, wind biomass, flowing water, ocean energy, and geothermal energy that make up the renewable energy resource can be found throughout our nation. These resources can provide all the forms of energy our nation needs: liquid fuels, electricity, and heating and cooling. Renewable energy meets about 10 percent of our need for these forms of energy today, yet the potential contribution is many times greater. DOE's Programs in Renewable Energy are working side-by-side with American industry to develop the technologies that convert renewable energy resources into practical, cost-competitive energy. After a decade of progress in research, several of these technologies are poised to make large contributions during the 1990s and beyond. This booklet provides an overview of the renewable energy programs and their plans for FY 1990. Sources of additional information are listed at the back of the booklet.
Sustainable Development and Energy Geotechnology Potential Roles for Geotechnical Engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
FragaszyProgram Dire, Dr. R. J.; Santamarina, Carlos; Espinoza, N.
2011-01-01
The world is facing unprecedented challenges related to energy resources, global climate change, material use, and waste generation. Failure to address these challenges will inhibit the growth of the developing world and will negatively impact the standard of living and security of future generations in all nations. The solutions to these challenges will require multidisciplinary research across the social and physical sciences and engineering. Although perhaps not always recognized, geotechnical engineering expertise is critical to the solution of many energy and sustainability-related problems. Hence, geotechnical engineers and academicians have opportunity and responsibility to contribute to the solution of these worldwidemore » problems. Research will need to be extended to non-standard issues such as thermal properties of soils; sediment and rock response to extreme conditions and at very long time scales; coupled hydro-chemo-thermo-bio-mechanical processes; positive feedback systems; the development of discontinuities; biological modification of soil properties; spatial variability; and emergent phenomena. Clearly, the challenges facing geotechnical engineering in the future will require a much broader knowledge base than our traditional educational programs provide. The geotechnical engineering curricula, from undergraduate education through continuing professional education, must address the changing needs of a profession that will increasingly be engaged in alternative/renewable energy production; energy efficiency; sustainable design, enhanced and more efficient use of natural resources, waste management, and underground utilization.« less
Global water risks and national security: Building resilience (Invited)
NASA Astrophysics Data System (ADS)
Pulwarty, R. S.
2013-12-01
The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.
ARPA-E: Accelerating U.S. Energy Innovation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manser, Joseph S.; Rollin, Joseph A.; Brown, Kristen E.
ARPA-E is charged with addressing the most pressing issues facing the U.S. energy sector today, as well as those projected to impact national energy security in the future. The agency’s mission is clearly elucidated in its authorizing statute:2 “To overcome long-term and high-risk technological barriers in the development of energy technologies.” The three principal thrusts of the agency’s mission are (i) reducing energy imports, (ii) reducing energy-related emissions and greenhouse gases, and (iii) improving energy efficiency in all sectors of the U.S. economy. Meeting these ambitious challenges requires focused, interdisciplinary effort on a national scale that will help ensure themore » United States maintains a competitive lead in developing and deploying advanced energy technologies.« less
U.S. Geological Survey Energy and Minerals science strategy: a resource lifecycle approach
Ferrero, Richard C.; Kolak, Jonathan J.; Bills, Donald J.; Bowen, Zachary H.; Cordier, Daniel J.; Gallegos, Tanya J.; Hein, James R.; Kelley, Karen D.; Nelson, Philip H.; Nuccio, Vito F.; Schmidt, Jeanine M.; Seal, Robert R.
2013-01-01
The economy, national security, and standard of living of the United States depend heavily on adequate and reliable supplies of energy and mineral resources. Based on population and consumption trends, the Nation’s use of energy and minerals can be expected to grow, driving the demand for ever broader scientific understanding of resource formation, location, and availability. In addition, the increasing importance of environmental stewardship, human health, and sustainable growth places further emphasis on energy and mineral resources research and understanding. Collectively, these trends in resource demand and the interconnectedness among resources will lead to new challenges and, in turn, require cutting- edge science for the next generation of societal decisions. The long and continuing history of U.S. Geological Survey contributions to energy and mineral resources science provide a solid foundation of core capabilities upon which new research directions can grow. This science strategy provides a framework for the coming decade that capitalizes on the growth of core capabilities and leverages their application toward new or emerging challenges in energy and mineral resources research, as reflected in five interrelated goals.
Challenges and gaps for energy planning models in the developing-world context
NASA Astrophysics Data System (ADS)
Debnath, Kumar Biswajit; Mourshed, Monjur
2018-03-01
Energy planning models (EPMs) support multi-criteria assessments of the impact of energy policies on the economy and environment. Most EPMs originated in developed countries and are primarily aimed at reducing greenhouse gas emissions while enhancing energy security. In contrast, most, if not all, developing countries are predominantly concerned with increasing energy access. Here, we review thirty-four widely used EPMs to investigate their applicability to developing countries and find an absence of consideration of the objectives, challenges, and nuances of the developing context. Key deficiencies arise from the lack of deliberation of the low energy demand resulting from lack of access and availability of supply. Other inadequacies include the lack of consideration of socio-economic nuances such as the prevalence of corruption and resulting cost inflation, the methods for adequately addressing the shortcomings in data quality, availability and adequacy, and the effects of climate change. We argue for further research on characterization and modelling of suppressed demand, climate change impacts, and socio-political feedback in developing countries, and the development of contextual EPMs.
Global impacts of U.S. bioenergy production and policy: A general equilibrium perspective
NASA Astrophysics Data System (ADS)
Evans, Samuel Garner
The conversion of biomass to energy represents a promising pathway forward in efforts to reduce fossil fuel use in the transportation and electricity sectors. In addition to potential benefits, such as greenhouse gas reductions and increased energy security, bioenergy production also presents a unique set of challenges. These challenges include tradeoffs between food and fuel production, distortions in energy markets, and terrestrial emissions associated with changing land-use patterns. Each of these challenges arises from market-mediated responses to bioenergy production, and are therefore largely economic in nature. This dissertation directly addresses these opportunities and challenges by evaluating the economic impacts of U.S. bioenergy production and policy, focusing on both existing and future biomass-to-energy pathways. The analysis approaches the issue from a global, economy-wide perspective, reflecting two important facts. First, that large-scale bioenergy production connects multiple sectors of the economy due to the use of agricultural land resources for biomass production, and competition with fossil fuels in energy markets. Second, markets for both agricultural and energy commodities are highly integrated globally, causing domestic policies to have international effects. The reader can think of this work as being comprised of three parts. Part I provides context through an extensive review of the literature on the market-mediated effects of conventional biofuel production (Chapter 2) and develops a general equilibrium modeling framework for assessing the extent to which these phenomenon present a challenge for future bioenergy pathways (Chapter 3). Part II (Chapter 4) explores the economic impacts of the lignocellulosic biofuel production targets set in the U.S. Renewable Fuel Standard on global agricultural and energy commodity markets. Part III (Chapter 5) extends the analysis to consider potential inefficiencies associated with policy-induced competition for biomass between the electricity and transportation fuel sectors.
Report on July 2015 Additional Protocol Coordinators Best Practices Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gitau, Ernest T.N.; Burbank, Roberta L.; Finch, Valerie A.
After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old),more » identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.« less
ERIC Educational Resources Information Center
Sage, Colin
2013-01-01
Recent experience of food price volatility in global markets encourages closer examination of the dynamics underlying the global food system and reveals a range of contingent factors. Meanwhile a common thread of many recent expert reports has emphasised the need to intensify agricultural production to double food output by 2050. Drawing upon a…
Using microgrids to enhance energy security and resilience
Lu, Xiaonan; Wang, Jianhui; Guo, Liping
2016-12-05
Although microgrids are now widely studied, challenges still exist. A reliable control architecture needs to be developed to coordinate different devices. Advanced forecasting and demand response management approaches should be implemented to cope with the intermittence of renewable generation. Furthermore, interconnection issues should be further studied to eliminate the influence of microgrid integration and achieve coordinated operation throughout the system.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
Trade-offs and Opportunities in the Nexus of Energy and Water-for-Food
NASA Astrophysics Data System (ADS)
Rosegrant, M. W.
2015-12-01
The world economy is under pressure for greater, more efficient and more sustainable use of natural resources to meet complementary and competing objectives in the energy, water, and food sectors. Increasing national, regional, and seasonal water scarcities in much of the world pose severe challenges for national governments, the international development community, and ultimately, for individual water users. This presentation assesses the nexus between energy and water, with an emphasis on the interactions and trade-offs between energy and water for food production. It examines the impact of biofuel production on water quantity and quality, and the potential for hydropower potential to meet energy challenges while expanding irrigation water supplies and food production potential, thereby enhancing global food security. Biofuel production affects both water quantity and quality. Expanding production of biofuels—through either crop-based production systems or direct biomass production—can significantly increase demand for water as more acreage is planted or the crop mix begins to favor thirstier crops; water demand for bio-refineries creates additional competition with agricultural water use. Water quality can also be adversely affected by increased acreage for fertilizer-intensive crops, such as maize or sugarcane, which can result in increased nitrate run-off and soil erosion. Hydropower has become a relatively forgotten part of the energy-water security picture that deserves renewed attention. Unlike biofuels, hydropower does not normally compete with agricultural water. Instead, development of hydropower could complement food production by developing dam structures and power that also provide irrigation water and support its distribution for growing food crops. But balanced hydropower policies require consideration of potential trade-offs with environmental and social impacts.
Supporting Clean Energy Development in Swaziland
DOE Office of Scientific and Technical Information (OSTI.GOV)
2016-04-01
Swaziland, a country largely dependent on regional fossil fuel imports to meet power needs, is vulnerable to supply changes and price shocks. To address this challenge, the country's National Energy Policy and Implementation Strategy prioritizes actions to enhance energy independence through scaling up renewable energy and energy efficiency. With approximately 70 percent of the country lacking electricity, Swaziland is also strongly committed to expanding energy access to support key economic and social development goals. Within this context, energy security and energy access are two foundational objectives for clean energy development in Swaziland. The partnership between the Swaziland Energy Regulatory Authoritymore » and the Clean Energy Solutions Center led to concrete outcomes to support clean energy development in Swaziland. Improving renewable energy project licensing processes will enable Swaziland to achieve key national objectives to expand clean energy access and transition to greater energy independence.« less
Meeting the challenge of food and energy security.
Karp, Angela; Richter, Goetz M
2011-06-01
Growing crops for bioenergy or biofuels is increasingly viewed as conflicting with food production. However, energy use continues to rise and food production requires fuel inputs, which have increased with intensification. Focussing on the question of food or fuel is thus not helpful. The bigger, more pertinent, challenge is how the increasing demands for food and energy can be met in the future, particularly when water and land availability will be limited. Energy crop production systems differ greatly in environmental impact. The use of high-input food crops for liquid transport fuels (first-generation biofuels) needs to be phased out and replaced by the use of crop residues and low-input perennial crops (second/advanced-generation biofuels) with multiple environmental benefits. More research effort is needed to improve yields of biomass crops grown on lower grade land, and maximum value should be extracted through the exploitation of co-products and integrated biorefinery systems. Policy must continually emphasize the changes needed and tie incentives to improved greenhous gas reduction and environmental performance of biofuels.
Energy reduction using multi-channels optical wireless communication based OFDM
NASA Astrophysics Data System (ADS)
Darwesh, Laialy; Arnon, Shlomi
2017-10-01
In recent years, an increasing number of data center networks (DCNs) have been built to provide various cloud applications. Major challenges in the design of next generation DC networks include reduction of the energy consumption, high flexibility and scalability, high data rates, minimum latency and high cyber security. Use of optical wireless communication (OWC) to augment the DC network could help to confront some of these challenges. In this paper we present an OWC multi channels communication method that could lead to significant energy reduction of the communication equipment. The method is to convert a high speed serial data stream to many slower and parallel streams and vies versa at the receiver. We implement this concept of multi channels using optical orthogonal frequency division multiplexing (O-OFDM) method. In our scheme, we use asymmetrically clipped optical OFDM (ACO-OFDM). Our results show that the realization of multi channels OFDM (ACO-OFDM) methods reduces the total energy consumption exponentially, as the number of channels transmitted through them rises.
Shared Electronic Health Record Systems: Key Legal and Security Challenges.
Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M
2017-11-01
Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.
Cyber physical systems based on cloud computing and internet of things for energy efficiency
NASA Astrophysics Data System (ADS)
Suciu, George; Butca, Cristina; Suciu, Victor; Cretu, Alexandru; Fratu, Octavian
2016-12-01
Cyber Physical Systems (CPS) and energy efficiency play a major role in the context of industry expansion. Management practices for improving efficiency in the field of energy consumption became a priority of many major industries who are inefficient in terms of exploitation costs. The effort of adopting energy management means in an organization is quite challenging due to the lack of resources and expertise. One major problem consists in the lack of knowledge for energy management and practices. This paper aims to present authors' concept in creating a Cyber Physical Energy System (CPES) that will change organizations' way of consuming energy, by making them aware of their use. The presented concept will consider the security of the whole system and the easy integration with the existing electric network infrastructure.
NASA Astrophysics Data System (ADS)
Maraseni, T. N.; Mushtaq, S.; Reardon-Smith, K.
2012-09-01
The Australian Government is currently addressing the challenge of increasing water scarcity through significant on-farm infrastructure investment to facilitate the adoption of new water-efficient pressurized irrigation systems. However, it is highly likely that conversion to these systems will increase on-farm energy consumption and greenhouse gas (GHG) emissions, suggesting potential conflicts in terms of mitigation and adaptation policies. This study explored the trade-offs associated with the adoption of more water efficient but energy-intensive irrigation technologies by developing an integrated assessment framework. Integrated analysis of five case studies revealed trade-offs between water security and environmental security when conversion to pressurized irrigation systems was evaluated in terms of fuel and energy-related emissions, except in cases where older hand-shift sprinkler irrigation systems were replaced. These results suggest that priority should be given, in implementing on-farm infrastructure investment policy, to replacing inefficient and energy-intensive sprinkler irrigation systems such as hand-shift and roll-line. The results indicated that associated changes in the use of agricultural machinery and agrochemicals may also be important. The findings of this study support the use of an integrated approach to avoid possible conflicts in designing national climate change mitigation and adaptation policies, both of which are being developed in Australia.
Verhoeven, Harry
2013-11-13
As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.
Basic Science for a Secure Energy Future
NASA Astrophysics Data System (ADS)
Horton, Linda
2010-03-01
Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.
Modeling Primary Atomization of Liquid Fuels using a Multiphase DNS/LES Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arienti, Marco; Oefelein, Joe; Doisneau, Francois
2016-08-01
As part of a Laboratory Directed Research and Development project, we are developing a modeling-and-simulation capability to study fuel direct injection in automotive engines. Predicting mixing and combustion at realistic conditions remains a challenging objective of energy science. And it is a research priority in Sandia’s mission-critical area of energy security, being also relevant to many flows in defense and climate. High-performance computing applied to this non-linear multi-scale problem is key to engine calculations with increased scientific reliability.
Environment, Renewable Energy and Reduced Carbon Emissions
NASA Technical Reports Server (NTRS)
Sen, S.; Khazanov, G.; Kishimoto, Y.
2011-01-01
Increased energy security and reduced carbon emissions pose significant challenges for science and technology. However, they also create substantial opportunities for innovative research and development. In this review paper, we highlight some of the key opportunities and mention public policies that are needed to enable the efforts and to maximize the probability of their success. Climate is among the uttermost nonlinear behaviors found around us. As recent studies showed the possible effect of cosmic rays on the Earth's climate, we investigate how complex interactions between the planet and its environment can be responsible for climate anomalies.
Food security: the challenge of feeding 9 billion people.
Godfray, H Charles J; Beddington, John R; Crute, Ian R; Haddad, Lawrence; Lawrence, David; Muir, James F; Pretty, Jules; Robinson, Sherman; Thomas, Sandy M; Toulmin, Camilla
2010-02-12
Continuing population and consumption growth will mean that the global demand for food will increase for at least another 40 years. Growing competition for land, water, and energy, in addition to the overexploitation of fisheries, will affect our ability to produce food, as will the urgent requirement to reduce the impact of the food system on the environment. The effects of climate change are a further threat. But the world can produce more food and can ensure that it is used more efficiently and equitably. A multifaceted and linked global strategy is needed to ensure sustainable and equitable food security, different components of which are explored here.
Lyons, Peter B
2011-01-01
The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pfaltzgraff, Robert L
2006-10-22
This conference's focus was the peaceful uses of the atom and their implications for nuclear science, energy security, nuclear medicine and national security. The conference also provided the setting for the presentation of the prestigious Enrico Fermi Prize, a Presidential Award which recognizes the contributions of distinguished members of the scientific community for a lifetime of exceptional achievement in the science and technology of nuclear, atomic, molecular, and particle interactions and effects. An impressive group of distinguished speakers addressed various issues that included: the impact and legacy of the Eisenhower Administrationâs âAtoms for Peaceâ concept, the current and future rolemore » of nuclear power as an energy source, the challenges of controlling and accounting for existing fissile material, and the horizons of discovery for particle or high-energy physics. The basic goal of the conference was to examine what has been accomplished over the past fifty years as well as to peer into the future to gain insights into what may occur in the fields of nuclear energy, nuclear science, nuclear medicine, and the control of nuclear materials.« less
NASA Astrophysics Data System (ADS)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede
2015-12-01
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kotta, P. R.; Kline, K. M.
2005-02-28
The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’smore » success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities, industry, and other scientific and research institutions. By keeping the Laboratory at the forefront of science and technology, the LDRD Program enables us to meet our mission challenges, especially those of our ever-evolving national security and homeland security missions.« less
Homeland Security. Management Challenges Facing Federal Leadership
2002-12-01
Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future
Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
Water-energy-food nexus: concepts, questions and methodologies
NASA Astrophysics Data System (ADS)
Li, Y.; Chen, X.; Ding, W.; Zhang, C.; Fu, G.
2017-12-01
The term of water-energy -food nexus has gained increasing attention in the research and policy making communities as the security of water, energy and food becomes severe under changing environment. Ignorance of their closely interlinkages accompanied by their availability and service may result in unforeseeable, adverse consequences. This paper comprehensively reviews the state-of-the-art in the field of water-energy-food, with a focus on concepts, research questions and methodologies. First, two types of nexus definition are compared and discussed to understand the essence of nexus research issues. Then, three kinds of nexus research questions are presented, including internal relationship analysis, external impact analysis, and evaluation of the nexus system. Five nexus modelling approaches are discussed in terms of their advantages, disadvantages and application, with an aim to identify research gaps in current nexus methods. Finally, future research areas and challenges are discussed, including system boundary, data uncertainty and modelling, underlying mechanism of nexus issues and system performance evaluation. This study helps bring research efforts together to address the challenging questions in the nexus and develop the consensus on building resilient water, energy and food systems.
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsoukalas, Lefteri
2009-04-29
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energymore » internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.« less
Nuclear energy: Where do we go from here?
NASA Astrophysics Data System (ADS)
Muslim, Dato'Noramly, Dr
2015-04-01
As Malaysia progresses towards 2020, the depleting resource of oil and gas has forced a re-look at alternatives to replace fossil fuels as energy sources. Among the viable options is nuclear energy, enabling us to meet energy needs and sustain national development in the twenty-first century. Three essential steps Malaysia must take to introduce nuclear power into its energy mix are: energy planning, infrastructure development, and deployment. Malaysia has to face a series of challenges, including public acceptance, waste management, minimizing proliferation risk, and ensuring the security of nuclear plants and materials. Timely development of qualified and competent manpower is a key limiting factor in the development and transfer of nuclear technologies — and education and training take time, effort and money. There is a need for political will. Within the Asian region, China, Korea and Japan are in the forefront in utilizing nuclear power to meet electricity demands. Countries such as UAE, Bangladesh, Vietnam and Turkey are moving ahead with the nuclear option for electricity generation and they have begun planning and construction of nuclear power plants. Against this backdrop, what are Malaysia's moves? This paper discusses various options and challenges, obstacles and repercussions in meeting future energy demands.
Interconnection, Integration, and Interactive Impact Analysis of Microgrids and Distribution Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kang, Ning; Wang, Jianhui; Singh, Ravindra
2017-01-01
Distribution management systems (DMSs) are increasingly used by distribution system operators (DSOs) to manage the distribution grid and to monitor the status of both power imported from the transmission grid and power generated locally by a distributed energy resource (DER), to ensure that power flows and voltages along the feeders are maintained within designed limits and that appropriate measures are taken to guarantee service continuity and energy security. When microgrids are deployed and interconnected to the distribution grids, they will have an impact on the operation of the distribution grid. The challenge is to design this interconnection in such amore » way that it enhances the reliability and security of the distribution grid and the loads embedded in the microgrid, while providing economic benefits to all stakeholders, including the microgrid owner and operator and the distribution system operator.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, Cris William
Los Alamos National Laboratory’s proposed MaRIE facility is slated to introduce the world’s highest energy hard x-ray free electron laser (XFEL). As the light source for the Matter-Radiation Interactions in Extremes experimental facility (MaRIE), the 42-keV XFEL, with bursts of x-ray pulses at gigahertz repetition for studying fast dynamical processes, will help accelerate discovery and design of the advanced materials needed to meet 21st-century national security and energy security challenges. Yet the science of free-electron lasers has a long and distinguished history at Los Alamos National Laboratory (LANL), where for nearly four decades Los Alamos scientists have been performing research,more » design, development, and collaboration work in FEL science. The work at Los Alamos has evolved from low-gain amplifier and oscillator FEL development to highbrightness photoinjector development, and later, self-amplified spontaneous emission (SASE) and high-gain amplifier FEL development.« less
ERIC Educational Resources Information Center
Lingenfelter, Paul E.
2012-01-01
The nation's next President will face a host of challenges, among them the economy, health care, an aging population, energy, the environment, and security at home and aboard. In this open letter, the leaders of higher education coordinating and governing boards across the country urge the 2012 presidential candidates to make improving the…
Leaning and Greening the Supply Chain: A Teaching Case Study for Engineering Students
ERIC Educational Resources Information Center
Grantham, Katie; Cudney, Elizabeth
2011-01-01
A version of the American Clean Energy and Security Act, passed by the House of Representatives in June 2009, mandates a 17% cut in emissions by 2020 and upwards of an 80% cut by 2050, based on emissions from 2005. This impending legislation is a challenge to companies already trying to survive in an economic downturn. It is critical that the…
2014-09-01
generation, exotic storage technologies, smart power grid management, and better power sources for directed-energy weapons (DEW). Accessible partner nation...near term will help to mitigate risks and improve outcomes. 2 Forecasting typically extrapolates predictions based...eventually, diminished national power . Within this context, this paper examines policy, legal, ethical, and strategy implications for DoD from the impact
Plant genetics, sustainable agriculture and global food security.
Ronald, Pamela
2011-05-01
The United States and the world face serious societal challenges in the areas of food, environment, energy, and health. Historically, advances in plant genetics have provided new knowledge and technologies needed to address these challenges. Plant genetics remains a key component of global food security, peace, and prosperity for the foreseeable future. Millions of lives depend upon the extent to which crop genetic improvement can keep pace with the growing global population, changing climate, and shrinking environmental resources. While there is still much to be learned about the biology of plant-environment interactions, the fundamental technologies of plant genetic improvement, including crop genetic engineering, are in place, and are expected to play crucial roles in meeting the chronic demands of global food security. However, genetically improved seed is only part of the solution. Such seed must be integrated into ecologically based farming systems and evaluated in light of their environmental, economic, and social impacts-the three pillars of sustainable agriculture. In this review, I describe some lessons learned, over the last decade, of how genetically engineered crops have been integrated into agricultural practices around the world and discuss their current and future contribution to sustainable agricultural systems.
Food security: contributions from science to a new and greener revolution
Beddington, John
2010-01-01
There is an intrinsic link between the challenge we face to ensure food security through the twenty-first century and other global issues, most notably climate change, population growth and the need to sustainably manage the world's rapidly growing demand for energy and water. Our progress in reducing global poverty and achieving the Millennium Development Goals will be determined to a great extent by how coherently these long-term challenges are tackled. A key question is whether we can feed a future nine billion people equitably, healthily and sustainably. Science and technology can make a major contribution, by providing practical solutions. Securing this contribution requires that high priority be attached both to research and to facilitating the real world deployment of existing and emergent technologies. Put simply, we need a new, ‘greener revolution’. Important areas for focus include: crop improvement; smarter use of water and fertilizers; new pesticides and their effective management to avoid resistance problems; introduction of novel non-chemical approaches to crop protection; reduction of post-harvest losses; and more sustainable livestock and marine production. Techniques and technologies from many disciplines, ranging from biotechnology and engineering to newer fields such as nanotechnology, will be needed. PMID:20008386
Crops and food security--experiences and perspectives from Taiwan.
Huang, Chen-Te; Fu, Tzu-Yu Richard; Chang, Su-San
2009-01-01
Food security is an important issue that is of concern for all countries around the world. There are many factors which may cause food insecurity including increasing demand, shortage of supply, trade condition, another countries' food policy, lack of money, high food and oil prices, decelerating productivity, speculation, etc. The food self-sufficiency ratio of Taiwan is only 30.6% weighted by energy in 2007. Total agriculture imports and cereals have increased significantly due to the expansion of livestock and fishery industries and improve living standard. The agriculture sector of Taiwan is facing many challenges, such as: low level of food self-sufficiency, aging farmers, large acreage of set-aside farmlands, small scale farming, soaring price of fertilizers, natural disasters accelerated by climate change, and rapid changes in the world food economy. To cope with these challenges, the present agricultural policy is based on three guidelines: "Healthfulness, Efficiency, and Sustainability." A program entitled "Turning Small Landlords into Large Tenants" was launched to make effective use of idle lands. Facing globalization and the food crisis, Taiwan will secure stable food supply through revitalization of its set-aside farmlands and international markets, and provide technical assistance to developing countries, in particular for staple food crops.
NASA Astrophysics Data System (ADS)
Li, Wei; Liu, Yan-Ju; Yang, Zhifeng
2012-02-01
The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.
Li, Wei; Liu, Yan-ju; Yang, Zhifeng
2012-02-01
The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide andmore » the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.« less
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada
2015-01-01
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093
Reconciling food security and bioenergy: priorities for action
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.
Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less
Reconciling food security and bioenergy: priorities for action
Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.; ...
2016-06-14
Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less
Energy and Minerals Science at the U.S. Geological Survey
Ferrero, Richard C.; Kolak, Jonathan J.; Bills, Donald J.; Bowen, Zachary H.; Cordier, Daniel J.; Gallegos, Tanya J.; Hein, James R.; Kelley, Karen D.; Nelson, Philip H.; Nuccio, Vito F.; Schmidt, Jeanine M.; Seal, Robert R.
2013-01-01
The economy, national security, and standard of living of the United States depend on adequate and reliable supplies of energy and mineral resources. Based on population and consumption trends, the Nation’s and World’s use of energy and minerals is expected to grow, driving the demand for scientific understanding of resource formation, location, and availability. The importance of environmental stewardship and human health in sustainable growth emphasizes the need for a broader understanding of energy and mineral resources. The U.S. Geological Survey (USGS) is a world leader in conducting research needed to address these challenges and to provide a scientific foundation for policy and decisionmaking with respect to resource use, sustainability, environmental protection, and an adaptive resource management approach.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muslim, Dato’ Dr Noramly, E-mail: noramlymuslim@yahoo.com
As Malaysia progresses towards 2020, the depleting resource of oil and gas has forced a re-look at alternatives to replace fossil fuels as energy sources. Among the viable options is nuclear energy, enabling us to meet energy needs and sustain national development in the twenty-first century. Three essential steps Malaysia must take to introduce nuclear power into its energy mix are: energy planning, infrastructure development, and deployment. Malaysia has to face a series of challenges, including public acceptance, waste management, minimizing proliferation risk, and ensuring the security of nuclear plants and materials. Timely development of qualified and competent manpower ismore » a key limiting factor in the development and transfer of nuclear technologies — and education and training take time, effort and money. There is a need for political will. Within the Asian region, China, Korea and Japan are in the forefront in utilizing nuclear power to meet electricity demands. Countries such as UAE, Bangladesh, Vietnam and Turkey are moving ahead with the nuclear option for electricity generation and they have begun planning and construction of nuclear power plants. Against this backdrop, what are Malaysia’s moves? This paper discusses various options and challenges, obstacles and repercussions in meeting future energy demands.« less
Earth Observations for Global Water Security
NASA Technical Reports Server (NTRS)
Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas
2013-01-01
The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.
Catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The catalysis research carried out at the DOE National Laboratories ranges from very fundamental catalysis science, funded by DOE's Office of Basic Energy Sciences (BES), to applied research and development (R&D)more » in areas such as biomass conversion to fuels and chemicals, fuel cells, and vehicle emission control with primary funding from DOE's Office of Energy Efficiency and Renewable Energy.« less
5 CFR 1312.11 - Challenges to classifications.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...
5 CFR 1312.11 - Challenges to classifications.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.11 Challenges to classifications. OMB employees are... anonymous, in which case the question may be directed to the EOP Security Officer. ...
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
NASA Astrophysics Data System (ADS)
Belof, Jonathan; Orlikowski, Daniel; Wu, Christine; McLaughlin, Keith
2013-06-01
Shock and ramp compression experiments are allowing us to probe condensed matter under extreme conditions where phase transitions and other non-equilibrium aspects can now be directly observed, but first principles simulation of kinetics remains a challenge. A multi-scale approach is presented here, with non-equilibrium statistical mechanical quantities calculated by molecular dynamics (MD) and then leveraged to inform a classical nucleation and growth kinetics model at the hydrodynamic scale. Of central interest is the free energy barrier for the formation of a critical nucleus, with direct NEMD presenting the challenge of relatively long timescales necessary to resolve nucleation. Rather than attempt to resolve the time-dependent nucleation sequence directly, the methodology derived here is built upon the non-equilibrium work theorem in order to bias the formation of a critical nucleus and thus construct the nucleation and growth rates. Having determined these kinetic terms from MD, a hydrodynamics implementation of Kolmogorov-Johnson-Mehl-Avrami (KJMA) kinetics and metastabilty is applied to the dynamic compressive freezing of water and compared with recent ramp compression experiments [Dolan et al., Nature (2007)] Lawrence Livermore National Laboratory is operated by Lawrence Livermore National Security, LLC, for the U.S. Department of Energy, National Nuclear Security Administration under Contract DE-AC52-07NA27344.
Hood, Leroy E.; Omenn, Gilbert S.; Moritz, Robert L.; Aebersold, Ruedi; Yamamoto, Keith R.; Amos, Michael; Hunter-Cevera, Jennie; Locascio, Laurie
2014-01-01
This White Paper sets out a Life Sciences Grand Challenge for Proteomics Technologies to enhance our understanding of complex biological systems, link genomes with phenotypes, and bring broad benefits to the biosciences and the US economy. The paper is based on a workshop hosted by the National Institute of Standards and Technology (NIST) in Gaithersburg, MD, 14–15 February 2011, with participants from many federal R&D agencies and research communities, under the aegis of the US National Science and Technology Council (NSTC). Opportunities are identified for a coordinated R&D effort to achieve major technology-based goals and address societal challenges in health, agriculture, nutrition, energy, environment, national security, and economic development. PMID:22807061
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
The pressure cold wind system on the impact of industrial boiler economy and security
NASA Astrophysics Data System (ADS)
Li, Henan; Qian, Hongli; Jiang, Lei; Yu, Dekai; Li, Guannan; Yuan, Hong
2017-05-01
Industrial boiler is one of the most energy-consuming equipment in china, the annual consumption of energy accounts for about one-third of the national energy consumption.Industrial boiler in service at present have several severe problems such as small capacity, low efficiency, high energy consumption and causing severe pollution on environment, the average industrial boiler operation efficiency is only 65%. If the efficiency increased by 15% ∼ 20%, which meet the international advanced level, each year 70 million tons of coal saving and reduce environmental pollution[1]. As energy conservation and emissions reduction becomes the basic national policy of our country, improving the efficiency of industrial boiler energy is facing opportunities and challenges, optimizing the operation mode of the existing units, it is necessary to increase the flexibility of the boiler control.
Liu, Ren; Srivastava, Anurag K.; Bakken, David E.; ...
2017-08-17
Intermittency of wind energy poses a great challenge for power system operation and control. Wind curtailment might be necessary at the certain operating condition to keep the line flow within the limit. Remedial Action Scheme (RAS) offers quick control action mechanism to keep reliability and security of the power system operation with high wind energy integration. In this paper, a new RAS is developed to maximize the wind energy integration without compromising the security and reliability of the power system based on specific utility requirements. A new Distributed Linear State Estimation (DLSE) is also developed to provide the fast andmore » accurate input data for the proposed RAS. A distributed computational architecture is designed to guarantee the robustness of the cyber system to support RAS and DLSE implementation. The proposed RAS and DLSE is validated using the modified IEEE-118 Bus system. Simulation results demonstrate the satisfactory performance of the DLSE and the effectiveness of RAS. Real-time cyber-physical testbed has been utilized to validate the cyber-resiliency of the developed RAS against computational node failure.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Ren; Srivastava, Anurag K.; Bakken, David E.
Intermittency of wind energy poses a great challenge for power system operation and control. Wind curtailment might be necessary at the certain operating condition to keep the line flow within the limit. Remedial Action Scheme (RAS) offers quick control action mechanism to keep reliability and security of the power system operation with high wind energy integration. In this paper, a new RAS is developed to maximize the wind energy integration without compromising the security and reliability of the power system based on specific utility requirements. A new Distributed Linear State Estimation (DLSE) is also developed to provide the fast andmore » accurate input data for the proposed RAS. A distributed computational architecture is designed to guarantee the robustness of the cyber system to support RAS and DLSE implementation. The proposed RAS and DLSE is validated using the modified IEEE-118 Bus system. Simulation results demonstrate the satisfactory performance of the DLSE and the effectiveness of RAS. Real-time cyber-physical testbed has been utilized to validate the cyber-resiliency of the developed RAS against computational node failure.« less
Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
Doroodgar, Farzan; Razzaque, Mohammad Abdur; Isnin, Ismail Fauzi
2014-01-01
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge. PMID:24618781
Seluge++: a secure over-the-air programming scheme in wireless sensor networks.
Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi
2014-03-11
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rick Meeker; L. Baldwin; Steinar Dale
2010-03-31
Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintainingmore » system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kok, Koen; Widergren, Steve
Secure, Clean and Efficient Energy is one of the great societal challenges of our time. Electricity as a sustainable energy carrier plays a central role in the most effective transition scenarios towards sustainability. To harness this potential, the current electricity infrastructure needs to be rigorously re-engineered into an integrated and intelligent electricity system: the smart grid. Key elements of the smart grid vision are the coordination mechanisms. In such a system, vast numbers of devices, currently just passively connected to the grid, will become actively involved in system-wide and local coordination tasks. In this light, transactive energy (TE) is emergingmore » as a strong contender for orchestrating the coordinated operation of so many devices.« less
Power Hardware-in-the-Loop (PHIL) Testing Facility for Distributed Energy Storage (Poster)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neubauer.J.; Lundstrom, B.; Simpson, M.
2014-06-01
The growing deployment of distributed, variable generation and evolving end-user load profiles presents a unique set of challenges to grid operators responsible for providing reliable and high quality electrical service. Mass deployment of distributed energy storage systems (DESS) has the potential to solve many of the associated integration issues while offering reliability and energy security benefits other solutions cannot. However, tools to develop, optimize, and validate DESS control strategies and hardware are in short supply. To fill this gap, NREL has constructed a power hardware-in-the-loop (PHIL) test facility that connects DESS, grid simulator, and load bank hardware to a distributionmore » feeder simulation.« less
NASA Astrophysics Data System (ADS)
Eichman, Joshua David
Renewable resources including wind, solar, geothermal, biomass, hydroelectric, wave and tidal, represent an opportunity for environmentally preferred generation of electricity that also increases energy security and independence. California is very proactive in encouraging the implementation of renewable energy in part through legislation like Assembly Bill 32 and the development and execution of Renewable Portfolio Standards (RPS); however renewable technologies are not without challenges. All renewable resources have some resource limitations, be that from location, capacity, cost or availability. Technologies like wind and solar are intermittent in nature but represent one of the most abundant resources for generating renewable electricity. If RPS goals are to be achieved high levels of intermittent renewables must be considered. This work explores the effects of high penetration of renewables on a grid system, with respect to resource availability and identifies the key challenges from the perspective of the grid to introducing these resources. The HiGRID tool was developed for this analysis because no other tool could explore grid operation, while maintaining system reliability, with a diverse set of renewable resources and a wide array of complementary technologies including: energy efficiency, demand response, energy storage technologies and electric transportation. This tool resolves the hourly operation of conventional generation resources (nuclear, coal, geothermal, natural gas and hydro). The resulting behavior from introducing additional renewable resources and the lifetime costs for each technology is analyzed.
The DOE Geothermal Data Repository and the Future of Geothermal Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weers, Jon; Anderson, Arlene
We are, right now, in the midst of the Data Revolution. Just as the Industrial Revolution of the early 1800's marked a major turning point in history with changes to manufacturing that influenced almost every aspect of daily life, the proliferation of big data and the evolution of our collective ability to put it to work for us is having a profound impact on our lives today. The U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) is leveraging new resources, such as the National Renewable Energy Laboratory's (NREL) new secure cloud environment, and cutting edge approaches to data analysis,more » to prepare for the challenges that data from energy and geosciences research presents. This paper will explore some of those challenges, highlight some of the benefits of data analysis, and explain the steps DOE and NREL are taking to ensure the GDR is ready for the future of geothermal data.« less
Chapter 10: Research and Deployment of Renewable Bioenergy Production from Microalgae
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laurens, Lieve M; Glasser, Melodie
Recent progress towards the implementation of renewable bioenergy production has included microalgae, which have potential to significantly contribute to a viable future bioeconomy. In a current challenging energy landscape, where an increased demand for renewable fuels is projected and accompanied by plummeting fossil fuels' prices, economical production of algae-based fuels becomes more challenging. However, in the context of mitigating carbon emissions with the potential of algae to assimilate large quantities of CO2, there is a route to drive carbon sequestration and utilization to support a sustainable and secure global energy future. This chapter places international energy policy in the contextmore » of the current and projected energy landscape. The contribution that algae can make, is summarized as both a conceptual contribution as well as an overview of the commercial infrastructure installed globally. Some of the major recent developments and crucial technology innovations are the results of global government support for the development of algae-based bioenergy, biofuels and bioproduct applications, which have been awarded as public private partnerships and are summarized in this chapter.« less
NASA Astrophysics Data System (ADS)
Moran, E. H.; Tindall, J. A.; Campbell, A. A.
2010-12-01
ABSTRACT Energy and water security and sustainability have become a national and global priority. The continued security and economic health of any country depends on a sustainable supply of both energy and water because these two critical natural resources are inexorably linked. The production of energy requires large volumes of water while the treatment and distribution of water is equally dependent upon readily available, low-cost energy. In the U.S. and other countries, irrigated agriculture and thermoelectric generation withdrawals of fresh water are approximately equal however; they are growing due to increasing population. Within the U.S. electricity production requires about 190,000 million gallons of freshwater per day, accounting for over 40 percent of all daily freshwater withdrawals in the U.S. The indirect use of water (home lighting and electric appliances) is approximately equal to its direct use (watering lawns and taking showers). Current trends of water use and availability suggest that meeting future water and energy demands to support continued economic global development will require improved utilization and management of both energy and water resources. Primary concerns include: (1) Increasing populations require more food and energy; this may cause direct competition between the two largest water users for limited water resources (energy and agriculture); (2) Population growth and economic expansion projections indicate the U.S. alone will require an additional 393,000 MW of new generating capacity (equivalent to about 1,000 new 400 MW plants) by the year 2020 - other countries particularly India and China have similar trends; and (3) Potential environmental and ecological restrictions on the use of water for power generation such as the restrictions on cooling water withdrawals and cooling water use for nuclear power plants to protect aquatic species and habitat and the environment may reduce usable supplies. The U.S. and other Nation's abilities to meet the increasing demand for affordable water and energy are being seriously challenged by these emerging issues. This research presents potential solutions for security and sustainability of these systems, which are a pressing global priority.
Feeding nine billion: the challenge to sustainable crop production.
Gregory, Peter J; George, Timothy S
2011-11-01
In the recent past there was a widespread working assumption in many countries that problems of food production had been solved, and that food security was largely a matter of distribution and access to be achieved principally by open markets. The events of 2008 challenged these assumptions, and made public a much wider debate about the costs of current food production practices to the environment and whether these could be sustained. As in the past 50 years, it is anticipated that future increases in crop production will be achieved largely by increasing yields per unit area rather than by increasing the area of cropped land. However, as yields have increased, so the ratio of photosynthetic energy captured to energy expended in crop production has decreased. This poses a considerable challenge: how to increase yield while simultaneously reducing energy consumption (allied to greenhouse gas emissions) and utilizing resources such as water and phosphate more efficiently. Given the timeframe in which the increased production has to be realized, most of the increase will need to come from crop genotypes that are being bred now, together with known agronomic and management practices that are currently under-developed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenberg, Raymond; Wright, Kyle A.; McCaw, Erica E.
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide. Internationally, over 40 countries are cooperating with GTRI to enhance the security of these materials. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials, including orphaned and disused high-activity sources. GTRI began cooperation with the Republic of Colombia in April 2004. This cooperation has been a resounding success by securing forty high-risk sites, consolidating disused/orphan sources at an interim secure national storage facility, and developing a comprehensive approach to security, training, and sustainability.more » In 2005 the Colombian Ministry of Mines and Energy requested the Department of Energy’s support in the construction of a new Central Storage Facility (CSF). In December 2005, the Ministry selected to construct this facility at the Institute of Geology and Mining (Ingeominas) site in Bogota. This site already served as Colombia’s national repository, where disused sources were housed in various buildings around the complex. The CSF project was placed under contract in May 2006, but environmental issues and public protests, which led to a class action lawsuit against the Colombian Government, forced the Ministry to quickly suspend activities, thereby placing the project in jeopardy. Despite these challenges, however, the Ministry of Mines and Energy worked closely with public and environmental authorities to resolve these issues, and continued to be a strong advocate of the GTRI program. In June 2008, the Ministry of Mines and Energy was granted the construction and environmental licenses. As a result, construction immediately resumed and the CSF was completed by December 2008. A commissioning ceremony was held for the new facility in January 2009, which was attended by representatives from the Department of Energy, U.S. Embassy, and the Ministry of Mines and Energy, including the Minister and Vice Minister.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duren, Mike; Aldridge, Hal; Abercrombie, Robert K
2013-01-01
Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution andmore » management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.« less
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G
2016-05-01
The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.
2016-01-01
Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842
Sandia National Laboratories: Directed-energy tech receives funding to
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research
Flexible operation of thermal plants with integrated energy storage technologies
NASA Astrophysics Data System (ADS)
Koytsoumpa, Efthymia Ioanna; Bergins, Christian; Kakaras, Emmanouil
2017-08-01
The energy system in the EU requires today as well as towards 2030 to 2050 significant amounts of thermal power plants in combination with the continuously increasing share of Renewables Energy Sources (RES) to assure the grid stability and to secure electricity supply as well as to provide heat. The operation of the conventional fleet should be harmonised with the fluctuating renewable energy sources and their intermittent electricity production. Flexible thermal plants should be able to reach their lowest minimum load capabilities while keeping the efficiency drop moderate as well as to increase their ramp up and down rates. A novel approach for integrating energy storage as an evolutionary measure to overcome many of the challenges, which arise from increasing RES and balancing with thermal power is presented. Energy storage technologies such as Power to Fuel, Liquid Air Energy Storage and Batteries are investigated in conjunction with flexible power plants.
Space assets, technology and services in support of energy policy
NASA Astrophysics Data System (ADS)
Vasko, C. A.; Adriaensen, M.; Bretel, A.; Duvaux-Bechon, I.; Giannopapa, C. G.
2017-09-01
Space can be used as a tool by decision and policy makers in developing, implementing and monitoring various policy areas including resource management, environment, transport, security and energy. This paper focuses on the role of space for the energy policy. Firstly, the paper summarizes the European Union's (EU) main objectives in energy policy enclosed in the Energy Strategy 2020-2030-2050 and demonstrates how space assets can contribute to achieving those objectives. Secondly, the paper addresses how the European Space Agency (ESA) has established multiple initiatives and programs that directly finance the development of space assets, technology and applications that deliver services in support of the EU energy policy and sector. These efforts should be continued and strengthened in order to overcome identified technological challenges. The use of space assets, technology and applications, can help achieve the energy policy objectives for the next decades.
The Energy-Water Nexus: Managing the Links between Energy and Water for a Sustainable Future
NASA Astrophysics Data System (ADS)
Hussey, Karen; Petit, Carine
2010-05-01
Water and energy are both indispensable inputs to modern economies but currently both resources are under threat owing to the impacts of an ever-increasing population and associated demand, unsustainable practices in agriculture and manufacturing, and the implications of a changing climate. However, it is where water and energy rely on each other that pose the most complex challenges for policy-makers. Water is needed for mining coal, drilling oil, refining gasoline, and generating and distributing electricity; and, conversely, vast amounts of energy are needed to pump, transport, treat and distribute water, particularly in the production of potable water through the use of desalination plants and waste water treatment plants. Despite the links, and the urgency in both sectors for security of supply, in existing policy frameworks energy and water policies are developed largely in isolation from one another. Worse still, some policies designed to encourage alternative energy supplies give little thought to the resultant consequences on water resources, and, similarly, policies designed to secure water supplies pay little attention to the resultant consequences on energy use. The development of new technologies presents both opportunities and challenges for managing the energy-water nexus but a better understanding of the links between energy and water is essential in any attempt to formulate policies for more resilient and adaptable societies. The energy-water nexus must be adequately integrated into policy and decision-making or governments run the risk of contradicting their efforts, and therefore failing in their objectives, in both sectors. A series of COST Exploratory Workshops, drawing on on-going research in the energy-water nexus from a number of international teams, identified the implications of the energy-water nexus on the development of (i) energy policies (ii) water resource management policies and (iii) climate adaptation and mitigation policies. A preliminary list of recommendations on how best to account for and integrate these impacts into policy and decision-making processes at various institutional levels was prepared and future research needs in the energy-water nexus were suggested as main outcomes. This presentation draws on the contributions to the COST water-energy-links exploratory workshops and the development of 12 case studies undertaken by researchers from Europe, the United States, Australia and China, which will be published in a Special Feature of Ecology and Society, mid-2010.
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
Multi-channel probes to understand fission dynamics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mosby, Shea Morgan
2016-04-15
Explaining the origin of the elements is a major outstanding question in nuclear astrophysics. Observed elemental abundance distribution shows strong nuclear physics effects. In conclusion, neutron-induced reactions are important for nuclear astrophysics and applied fields in nuclear energy and security. LANSCE has a program to address many of these questions directly with neutron beams on (near-)stable nuclei. Increasing demand for correlated data to test details of fission models poses additional challenges. Possibilities exist to extend existing experimental efforts to radioactive beam facilities. Kinematic focusing from using inverse kinematics has potential to circumvent some challenges associated with measuring correlations between fissionmore » output channels.« less
ERIC Educational Resources Information Center
Sauls, Jeff; Gudigantala, Naveen
2013-01-01
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B
2008-10-01
Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.
Center for Functional Nanomaterials
BNL
2017-12-09
Staff from Brookhaven's new Center for Functional Nanomaterials (CFN) describe how this advanced facility will focus on the development and understanding of nanoscale materials. The CFN provides state-of-the-art capabilities for the fabrication and study of nanoscale materials, with an emphasis on atomic-level tailoring to achieve desired properties and functions. The overarching scientific theme of the CFN is the development and understanding of nanoscale materials that address the Nation's challenges in energy security.
Price-Based Acquisition. Issues and Challenges for Defense Department Procurement of Weapon Systems
2005-01-01
government without excess non- value -added work. Again, however, the central issue is how can DoD determine whether the price is fair and reasonable without a...document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND...contracting and to providing incentives for contractors so as to achieve the best value in defense procurement. iv Price-Based Acquisition This
Paul Smith
2017-01-01
It is estimated that there are at least 60,000 tree species globally and that more than 20 percent of them are threatened with extinction. This threatened tree diversity will have a critical impact for solving some of this centuryâs major challenges in the areas of energy, water scarcity, human health, food security, climate change and habitat degradation. Botanic...
The Enterprise 2.0 Concept: Challenges on Data and Information Security
NASA Astrophysics Data System (ADS)
Silva, Ana; Moreira, Fernando; Varajão, João
The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
Carbon nanotube nanostructured hybrid materials systems for renewable energy applications
NASA Astrophysics Data System (ADS)
Marquis, Fernand D. S.
2011-01-01
Global energy demand is growing at an alarming and unsustainable rate, drawing mainly on the use of fossil fuels. These reserves are decreasing rapidly and becoming increasingly expensive. The associated emissions of greenhouse gases and other toxic pollutants are becoming environmentally unacceptable. Energy security has become a major issue as fossil fuels are confined to few areas in the world and their availability is controlled by political, economic, and ecological factors. A global coherent energy strategy that encompasses the entire energy life cycle is required in order to address all the forms of energy harvesting, storage, conversion, transmission, and distribution. Hybrid nanomaterial systems hold the key to fundamental advances in direct renewable energy and energy storage and conversion which are needed to enable renewable energy and meet the general energy challenges and associated environmental effects. This paper presents new approaches and methodologies used to design and develop carbon nanotube nanostructured hybrid nanomaterial systems incorporating structural and light-absorbing electron donor polymers, inorganic semiconductors, metallic and ceramic nanoparticles as energy harvesting and storage systems.
Energy Independence and Security Act of 2007
This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.
NASA Astrophysics Data System (ADS)
Khan, Muazzam A.; Ahmad, Jawad; Javaid, Qaisar; Saqib, Nazar A.
2017-03-01
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, i.e. audio, video and digital images. Due to bulky nature of multimedia data, WSN process a large volume of multimedia data which significantly increases computational complexity and hence reduces battery time. With respect to battery life constraints, image compression in addition with secure transmission over a wide ranged sensor network is an emerging and challenging task in Wireless Multimedia Sensor Networks. Due to the open nature of the Internet, transmission of data must be secure through a process known as encryption. As a result, there is an intensive demand for such schemes that is energy efficient as well as highly secure since decades. In this paper, discrete wavelet-based partial image encryption scheme using hashing algorithm, chaotic maps and Hussain's S-Box is reported. The plaintext image is compressed via discrete wavelet transform and then the image is shuffled column-wise and row wise-wise via Piece-wise Linear Chaotic Map (PWLCM) and Nonlinear Chaotic Algorithm, respectively. To get higher security, initial conditions for PWLCM are made dependent on hash function. The permuted image is bitwise XORed with random matrix generated from Intertwining Logistic map. To enhance the security further, final ciphertext is obtained after substituting all elements with Hussain's substitution box. Experimental and statistical results confirm the strength of the anticipated scheme.
Shale Gas: Development Opportunities and Challenges
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zoback, Mark D.; Arent, Douglas J.
2014-03-01
The use of horizontal drilling and multistage hydraulic fracturing technologies has enabled the production of immense quantities of natural gas, to date principally in North America but increasingly in other countries around the world. The global availability of this resource creates both opportunities and challenges that need to be addressed in a timely and effective manner. There seems little question that rapid shale gas development, coupled with fuel switching from coal to natural gas for power generation, can have beneficial effects on air pollution, greenhouse gas emissions, and energy security in many countries. In this context, shale gas resources representmore » a critically important transition fuel on the path to a decarbonized energy future. For these benefits to be realized, however, it is imperative that shale gas resources be developed with effective environmental safeguards to reduce their impact on land use, water resources, air quality, and nearby communities.« less
NASA Astrophysics Data System (ADS)
Wada, Y.
2017-12-01
Humanity has already reached or even exceeded the Earth's carrying capacity. Growing needs for food, energy and water will only exacerbate existing challenges over the next decades. Consequently, the acceptance of "business as usual" is eroding and we are being challenged to adopt new, more integrated, and more inclusive development pathways that avoid dangerous interference with the local environment and global planetary boundaries. This challenge is embodied in the United Nation's Sustainable Development Goals (SDGs), which endeavor to set a global agenda for moving towards more sustainable development strategies. To improve and sustain human welfare, it is critical that access to modern, reliable, and affordable water, energy, and food is expanded and maintained. The Integrated Solutions for Water, Energy, and Land (IS-WEL) project has been launched by IIASA, together with the Global Environment Facility (GEF) and the United Nations Industrial Development Organization (UNIDO). This project focuses on the water-energy-land nexus in the context of other major global challenges such as urbanization, environmental degradation, and equitable and sustainable futures. It develops a consistent framework for looking at the water-energy-land nexus and identify strategies for achieving the needed transformational outcomes through an advanced assessment framework. A multi-scalar approach are being developed that aims to combine global and regional integrated assessment tools with local stakeholder knowledge in order to identify robust solutions to energy, water, food, and ecosystem security in selected regions of the world. These are regions facing multiple energy, water and land use challenges and rapid demographic and economic changes, and are hardest hit by increasing climate variability and change. This project combines the global integrated assessment model (MESSAGE) with the global land (GLOBIOM) and water (Community Water Model) model respectively, and the integrated modeling framework are then combined with detailed regional decision support tools for water-energy-land nexus analysis in case study regions. A number of stakeholder meetings are used to engage local communities in the definition of important nexus drivers, scenario development and definition of performance metrics.
The new risk paradigm for chemical process security and safety.
Moore, David A
2004-11-11
The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.
CREM monitoring: a wireless RF application
NASA Astrophysics Data System (ADS)
Valencia, J. D.; Burghard, B. J.; Skorpik, J. R.; Silvers, K. L.; Schwartz, M. J.
2005-05-01
Recent security lapses within the Department of Energy laboratories prompted the establishment and implementation of additional procedures and training for operations involving classified removable electronic media (CREM) storage. In addition, the definition of CREM has been expanded and the number of CREM has increased significantly. Procedures now require that all CREM be inventoried and accounted for on a weekly basis. Weekly inventories consist of a physical comparison of each item against the reportable inventory listing. Securing and accounting for CREM is a continuous challenge for existing security systems. To address this challenge, an innovative framework, encompassing a suite of technologies, has been developed by Pacific Northwest National Laboratory (PNNL) to monitor, track, and locate CREM in safes, vaults, and storage areas. This Automated Removable Media Observation and Reporting (ARMOR)framework, described in this paper, is an extension of an existing PNNL program, SecureSafe. The key attributes of systems built around the ARMOR framework include improved accountability, reduced risk of human error, improved accuracy and timeliness of inventory data, and reduced costs. ARMOR solutions require each CREM to be tagged with a unique electronically readable ID code. Inventory data is collected from tagged CREM at regular intervals and upon detection of an access event. Automated inventory collection and report generation eliminates the need for hand-written inventory sheets and allows electronic transfer of the collected inventory data to a modern electronic reporting system. An electronic log of CREM access events is maintained, providing enhanced accountability for daily/weekly checks, routine audits, and follow-up investigations.
EU Failing FAO Challenge to Improve Global Food Security.
Smyth, Stuart J; Phillips, Peter W B; Kerr, William A
2016-07-01
The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.
2011-05-04
evolving security challenges. Issues such as terrorism, proliferation of weapons of mass destruction, impacts of climate change , and the ever...impacts of climate change , and the ever-growing competition for valuable natural resources are a few of the these challenges. As an integral part...destruction, impacts of climate change , and the ever-growing competition for valuable natural resources have resulted in a new set of security
Hood, Leroy E; Omenn, Gilbert S; Moritz, Robert L; Aebersold, Ruedi; Yamamoto, Keith R; Amos, Michael; Hunter-Cevera, Jennie; Locascio, Laurie
2012-09-01
This White Paper sets out a Life Sciences Grand Challenge for Proteomics Technologies to enhance our understanding of complex biological systems, link genomes with phenotypes, and bring broad benefits to the biosciences and the US economy. The paper is based on a workshop hosted by the National Institute of Standards and Technology (NIST) in Gaithersburg, MD, 14-15 February 2011, with participants from many federal R&D agencies and research communities, under the aegis of the US National Science and Technology Council (NSTC). Opportunities are identified for a coordinated R&D effort to achieve major technology-based goals and address societal challenges in health, agriculture, nutrition, energy, environment, national security, and economic development. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
A roadmap for nuclear energy technology
NASA Astrophysics Data System (ADS)
Sofu, Tanju
2018-01-01
The prospects for the future use of nuclear energy worldwide can best be understood within the context of global population growth, urbanization, rising energy need and associated pollution concerns. As the world continues to urbanize, sustainable development challenges are expected to be concentrated in cities of the lower-middle-income countries where the pace of urbanization is fastest. As these countries continue their trajectory of economic development, their energy need will also outpace their population growth adding to the increased demand for electricity. OECD IEA's energy system deployment pathway foresees doubling of the current global nuclear capacity by 2050 to reduce the impact of rapid urbanization. The pending "retirement cliff" of the existing U.S. nuclear fleet, representing over 60 percent of the nation's emission-free electricity, also poses a large economic and environmental challenge. To meet the challenge, the U.S. DOE has developed the vision and strategy for development and deployment of advanced reactors. As part of that vision, the U.S. government pursues programs that aim to expand the use of nuclear power by supporting sustainability of the existing nuclear fleet, deploying new water-cooled large and small modular reactors to enable nuclear energy to help meet the energy security and climate change goals, conducting R&D for advanced reactor technologies with alternative coolants, and developing sustainable nuclear fuel cycle strategies. Since the current path relying heavily on water-cooled reactors and "once-through" fuel cycle is not sustainable, next generation nuclear energy systems under consideration aim for significant advances over existing and evolutionary water-cooled reactors. Among the spectrum of advanced reactor options, closed-fuel-cycle systems using reactors with fast-neutron spectrum to meet the sustainability goals offer the most attractive alternatives. However, unless the new public-private partnership models emerge to tackle the licensing and demonstration challenges for these advanced reactor concepts, realization of their enormous potential is not likely, at least in the U.S.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Opportunities in solar energy research over the next decade
NASA Astrophysics Data System (ADS)
Kennett, E.
1989-06-01
A sustainable energy path that relies on renewable energy sources can provide policymakers with the flexibility to cope with an uncertain national and global future. Improving market pricing signals, opening up the energy supply and energy savings business, educating society to see the true present value of future savings, and reinvigorating research and development programs will be difficult. However, those nations that accept the challenge will be rewarded with increased energy security, more stable economies, and a healthier global environment. The following report is an overview of eight trends in our society that are expected to shape the nature of architecture at the turn of the century. These trends will have pronounced effects on the use of renewable energy in our building stock. In turn, solar energy research can provide the answers to certain questions which will arise during these changes. Changes, if understood, can also serve to accelerate the inclusion of certain technologies, as in this particular case, solar energy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cox, Sarah L; Hotchkiss, Elizabeth L; Bilello, Daniel E
Reliable, safe, and secure electricity is essential for economic and social development and a necessary input for many sectors of the economy. However, electricity generation and associated processes make up a significant portion of global greenhouse gas (GHG) emissions contributing to climate change. Furthermore, electricity systems are vulnerable to climate change impacts - both short-term events and changes over the longer term. This vulnerability presents both near-term and chronic challenges in providing reliable, affordable, equitable, and sustainable energy services. Within this context, developing countries face a number of challenges in the energy sector, including the need to reliably meet growingmore » electricity demand, lessen dependence on imported fuels, expand energy access, and improve stressed infrastructure for fuel supply and electricity transmission. Energy efficiency (EE) and renewable energy (RE) technical solutions described in this paper can bridge action across climate change mitigation and resilience through reducing GHG emissions and supporting electric power sector adaptation to increasing climate risk. Integrated planning approaches, also highlighted in this paper, play an integral role in bringing together mitigation and resilience action under broader frameworks. Through supporting EE and RE deployment and integrated planning approaches, unique to specific national and local circumstances, countries can design and implement policies, strategies, and sectoral plans that unite development priorities, climate change mitigation, and resilience.« less
7 Key Challenges for Visualization in Cyber Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Best, Daniel M.; Endert, Alexander; Kidwell, Dan
In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.
Diversifying bio-petro fuel sources for future energy sustainability and its challenges
NASA Astrophysics Data System (ADS)
Othman, M. R.; Helwani, Z.; Idris, I.
2018-04-01
Petroleum has been important in the energy industry since 19th century when the refining of paraffin from crude oil began. The industry recently appears to be in a downtown and fragile moment despite the price of oil is slowly rising. Renewable alternatives such as biofuels have gained increasing traction while petroleum fuel seemingly concedes to bio-fuels due to the rising public concern on the environment and stricter emission regulations. To be a strategic fuel in the energy security matrix, both fossil and bio-fuels options should be considered. However, the use of bio-fuels to achieve a degree of carbon neutrality is not without challenges. Among the challenges are land development and socio-political issue, carbon neutrality due to ILUC, high 2G bio-fuel feedstock and production cost, competing technology from electric vehicles and the impending fourth industrial revolution, NOx emissions and variation in biodiesel quality. This paper briefly reviews the potential of fuels source diversification and the challenges and how they can raise up to the challenges in order to be sustainable and attractive. In order to achieve this objective, first carbon credit through carbon trading needs to continue to stabilize the energy price. Second, 1G bio-fuel needs to forgo the use of natural, peat forest, rubber estate since these are an effective carbon sink and oxygen source. Third, advanced bio-fuels with high yield, process economics and sustainability need to be innovated. Fourth, the quality and standard bio-fuel that reduces NOx emission need to be improved. Finally and most importantly, carbon capture technology needs to be deployed immediately in fossil fuel power plants.
Information security of power enterprises of North-Arctic region
NASA Astrophysics Data System (ADS)
Sushko, O. P.
2018-05-01
The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.
NASA Astrophysics Data System (ADS)
Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.
2017-10-01
The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lentine, Anthony L.; DeRose, Christopher T.
In this study, small silicon photonics micro-resonator modulators and filters hold the promise for multi-terabit per-second interconnects at energy consumptions well below 1 pJ/bit. To date, no products exist and little known commercial development is occurring using this technology. Why? In this talk, we review the many challenges that remain to be overcome in bringing this technology from the research labs to the field where they can overcome important commercial, industrial, and national security limitations of existing photonic technologies.
Wang, Wei; Wang, Chunqiu; Zhao, Min
2014-03-01
To ease the burdens on the hospitalization capacity, an emerging swallowable-capsule technology has evolved to serve as a remote gastrointestinal (GI) disease examination technique with the aid of the wireless body sensor network (WBSN). Secure multimedia transmission in such a swallowable-capsule-based WBSN faces critical challenges including energy efficiency and content quality guarantee. In this paper, we propose a joint resource allocation and stream authentication scheme to maintain the best possible video quality while ensuring security and energy efficiency in GI-WBSNs. The contribution of this research is twofold. First, we establish a unique signature-hash (S-H) diversity approach in the authentication domain to optimize video authentication robustness and the authentication bit rate overhead over a wireless channel. Based on the full exploration of S-H authentication diversity, we propose a new two-tier signature-hash (TTSH) stream authentication scheme to improve the video quality by reducing authentication dependence overhead while protecting its integrity. Second, we propose to combine this authentication scheme with a unique S-H oriented unequal resource allocation (URA) scheme to improve the energy-distortion-authentication performance of wireless video delivery in GI-WBSN. Our analysis and simulation results demonstrate that the proposed TTSH with URA scheme achieves considerable gain in both authenticated video quality and energy efficiency.
Shen, Wei; Han, Weijian; Wallington, Timothy J
2014-06-17
China's oil imports and greenhouse gas (GHG) emissions have grown rapidly over the past decade. Addressing energy security and GHG emissions is a national priority. Replacing conventional vehicles with electric vehicles (EVs) offers a potential solution to both issues. While the reduction in petroleum use and hence the energy security benefits of switching to EVs are obvious, the GHG benefits are less obvious. We examine the current Chinese electric grid and its evolution and discuss the implications for EVs. China's electric grid will be dominated by coal for the next few decades. In 2015 in Beijing, Shanghai, and Guangzhou, EVs will need to use less than 14, 19, and 23 kWh/100 km, respectively, to match the 183 gCO2/km WTW emissions for energy saving vehicles. In 2020, in Beijing, Shanghai, and Guangzhou EVs will need to use less than 13, 18, and 20 kWh/100 km, respectively, to match the 137 gCO2/km WTW emissions for energy saving vehicles. EVs currently demonstrated in China use 24-32 kWh/100 km. Electrification will reduce petroleum imports; however, it will be very challenging for EVs to contribute to government targets for GHGs emissions reduction.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mizner, Jack Harry; Passell, Howard David; Keller, Elizabeth James Kistin
Sustainability is a critical national security issue for the U.S. and other nations. Sandia National Laboratories (SNL) is already a global leader in sustainability science and technology (SS&T) as documented in this report. This report documents the ongoing work conducted this year as part of the Sustainability Innovation Foundry (SIF). The efforts of the SIF support Sandia's national and international security missions related to sustainability and resilience revolving around energy use, water use, and materials, both on site at Sandia and externally. The SIF leverages existing Sandia research and development (R&D) in sustainability science and technology to support new solutionsmore » to complex problems. The SIF also builds on existing Sandia initiatives to support transformation of Sandia into a fully sustainable entity in terms of materials, energy, and water use. In the long term, the SIF will demonstrate the efficacy of sustainability technology developed at Sandia through prototyping and test bed approaches and will provide a common platform for support of solutions to the complex problems surrounding sustainability. Highlights from this year include the Sustainability Idea Challenge, improvements in facilities energy use, lectures and presentations from relevant experts in sustainability [Dr. Barry Hughes, University of Denver], and significant development of the Institutional Transformation (IX) modeling tools to support evaluation of proposed modifications to the SNL infrastructure to realize energy savings.« less
Tyfield, David
2011-07-01
There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.
Trading Off Global Fuel Supply, CO2 Emissions and Sustainable Development.
Wagner, Liam; Ross, Ian; Foster, John; Hankamer, Ben
2016-01-01
The United Nations Conference on Climate Change (Paris 2015) reached an international agreement to keep the rise in global average temperature 'well below 2°C' and to 'aim to limit the increase to 1.5°C'. These reductions will have to be made in the face of rising global energy demand. Here a thoroughly validated dynamic econometric model (Eq 1) is used to forecast global energy demand growth (International Energy Agency and BP), which is driven by an increase of the global population (UN), energy use per person and real GDP (World Bank and Maddison). Even relatively conservative assumptions put a severe upward pressure on forecast global energy demand and highlight three areas of concern. First, is the potential for an exponential increase of fossil fuel consumption, if renewable energy systems are not rapidly scaled up. Second, implementation of internationally mandated CO2 emission controls are forecast to place serious constraints on fossil fuel use from ~2030 onward, raising energy security implications. Third is the challenge of maintaining the international 'pro-growth' strategy being used to meet poverty alleviation targets, while reducing CO2 emissions. Our findings place global economists and environmentalists on the same side as they indicate that the scale up of CO2 neutral renewable energy systems is not only important to protect against climate change, but to enhance global energy security by reducing our dependence of fossil fuels and to provide a sustainable basis for economic development and poverty alleviation. Very hard choices will have to be made to achieve 'sustainable development' goals.
Trading Off Global Fuel Supply, CO2 Emissions and Sustainable Development
Wagner, Liam; Ross, Ian; Foster, John; Hankamer, Ben
2016-01-01
The United Nations Conference on Climate Change (Paris 2015) reached an international agreement to keep the rise in global average temperature ‘well below 2°C’ and to ‘aim to limit the increase to 1.5°C’. These reductions will have to be made in the face of rising global energy demand. Here a thoroughly validated dynamic econometric model (Eq 1) is used to forecast global energy demand growth (International Energy Agency and BP), which is driven by an increase of the global population (UN), energy use per person and real GDP (World Bank and Maddison). Even relatively conservative assumptions put a severe upward pressure on forecast global energy demand and highlight three areas of concern. First, is the potential for an exponential increase of fossil fuel consumption, if renewable energy systems are not rapidly scaled up. Second, implementation of internationally mandated CO2 emission controls are forecast to place serious constraints on fossil fuel use from ~2030 onward, raising energy security implications. Third is the challenge of maintaining the international ‘pro-growth’ strategy being used to meet poverty alleviation targets, while reducing CO2 emissions. Our findings place global economists and environmentalists on the same side as they indicate that the scale up of CO2 neutral renewable energy systems is not only important to protect against climate change, but to enhance global energy security by reducing our dependence of fossil fuels and to provide a sustainable basis for economic development and poverty alleviation. Very hard choices will have to be made to achieve ‘sustainable development’ goals. PMID:26959977
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
Market Evolution: Wholesale Electricity Market Design for 21st Century Power Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cochran, Jaquelin; Miller, Mackay; Milligan, Michael
2013-10-01
Demand for affordable, reliable, domestically sourced, and low-carbon electricity is on the rise. This growing demand is driven in part by evolving public policy priorities, especially reducing the health and environmental impacts of electricity service and expanding energy access to under-served customers. Consequently, variable renewable energy resources comprise an increasing share ofelectricity generation globally. At the same time, new opportunities for addressing the variability of renewables are being strengthened through advances in smart grids, communications, and technologies that enable dispatchable demand response and distributed generation to extend to the mass market. A key challenge of merging these opportunities is marketmore » design -- determining how to createincentives and compensate providers justly for attributes and performance that ensure a reliable and secure grid -- in a context that fully realizes the potential of a broad array of sources of flexibility in both the wholesale power and retail markets. This report reviews the suite of wholesale power market designs in use and under consideration to ensure adequacy, security, and flexibilityin a landscape of significant variable renewable energy. It also examines considerations needed to ensure that wholesale market designs are inclusive of emerging technologies, such as demand response, distributed generation, and storage.« less
Accelerators for Discovery Science and Security applications
NASA Astrophysics Data System (ADS)
Todd, A. M. M.; Bluem, H. P.; Jarvis, J. D.; Park, J. H.; Rathke, J. W.; Schultheiss, T. J.
2015-05-01
Several Advanced Energy Systems (AES) accelerator projects that span applications in Discovery Science and Security are described. The design and performance of the IR and THz free electron laser (FEL) at the Fritz-Haber-Institut der Max-Planck-Gesellschaft in Berlin that is now an operating user facility for physical chemistry research in molecular and cluster spectroscopy as well as surface science, is highlighted. The device was designed to meet challenging specifications, including a final energy adjustable in the range of 15-50 MeV, low longitudinal emittance (<50 keV-psec) and transverse emittance (<20 π mm-mrad), at more than 200 pC bunch charge with a micropulse repetition rate of 1 GHz and a macropulse length of up to 15 μs. Secondly, we will describe an ongoing effort to develop an ultrafast electron diffraction (UED) source that is scheduled for completion in 2015 with prototype testing taking place at the Brookhaven National Laboratory (BNL) Accelerator Test Facility (ATF). This tabletop X-band system will find application in time-resolved chemical imaging and as a resource for drug-cell interaction analysis. A third active area at AES is accelerators for security applications where we will cover some top-level aspects of THz and X-ray systems that are under development and in testing for stand-off and portal detection.
Water Resources: the Central Component of the WEF Nexus?
NASA Astrophysics Data System (ADS)
Ding, K.; Gunda, T.; Hornberger, G. M.
2017-12-01
Increasing population growth, consumption of natural resources, and deterioration of the environment coupled with climate change impacts (such as increased variability in precipitation) will challenge our abilities to provide water, energy and food (WEF) to the global populace. Less developed areas, such as the countries in Sub-Saharan Africa, are particularly vulnerable to such resource issues due to immature governance and management structures and strategies. We introduce an integrated approach to resource security analysis, which traditionally has focused on the WEF components separately and apply the methods to a suite of countries in Sub-Saharan Africa. Specifically, we evaluate the inter-connected nature of WEF securities by considering physical, demographic, socioeconomic, health, and institutional parameters related to each of the resource securities and by analyzing the relationships among the metrics. For example, reported food deficits for countries are strongly correlated with reported levels of access to safe drinking water. Multivariate statistical analyses are applied to identify relationships among resources and to develop indices that robustly and comprehensively capture the WEF nexus. Our results indicate that water plays the central role in the WEF nexus, due to its extensive use for both food and energy production in these countries. This approach provides a framework for analyzing the WEF nexus in other regions of the world.
Co-Simulation for Advanced Process Design and Optimization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stephen E. Zitney
2009-01-01
Meeting the increasing demand for clean, affordable, and secure energy is arguably the most important challenge facing the world today. Fossil fuels can play a central role in a portfolio of carbon-neutral energy options provided CO{sub 2} emissions can be dramatically reduced by capturing CO{sub 2} and storing it safely and effectively. Fossil energy industry faces the challenge of meeting aggressive design goals for next-generation power plants with CCS. Process designs will involve large, highly-integrated, and multipurpose systems with advanced equipment items with complex geometries and multiphysics. APECS is enabling software to facilitate effective integration, solution, and analysis of high-fidelitymore » process/equipment (CFD) co-simulations. APECS helps to optimize fluid flow and related phenomena that impact overall power plant performance. APECS offers many advanced capabilities including ROMs, design optimization, parallel execution, stochastic analysis, and virtual plant co-simulations. NETL and its collaborative R&D partners are using APECS to reduce the time, cost, and technical risk of developing high-efficiency, zero-emission power plants with CCS.« less
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
National Security Technology Incubator Evaluation Process
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lewis, N. S.; Crabtree, G.; Nozik, A. J.
2005-04-21
World demand for energy is projected to more than double by 2050 and to more than triple by the end of the century. Incremental improvements in existing energy networks will not be adequate to supply this demand in a sustainable way. Finding sufficient supplies of clean energy for the future is one of society?s most daunting challenges. Sunlight provides by far the largest of all carbon-neutral energy sources. More energy from sunlight strikes the Earth in one hour (4.3 ? 1020 J) than all the energy consumed on the planet in a year (4.1 ? 1020 J). We currently exploitmore » this solar resource through solar electricity ? a $7.5 billion industry growing at a rate of 35?40% per annum ? and solar-derived fuel from biomass, which provides the primary energy source for over a billion people. Yet, in 2001, solar electricity provided less than 0.1% of the world's electricity, and solar fuel from modern (sustainable) biomass provided less than 1.5% of the world's energy. The huge gap between our present use of solar energy and its enormous undeveloped potential defines a grand challenge in energy research. Sunlight is a compelling solution to our need for clean, abundant sources of energy in the future. It is readily available, secure from geopolitical tension, and poses no threat to our environment through pollution or to our climate through greenhouse gases. This report of the Basic Energy Sciences Workshop on Solar Energy Utilization identifies the key scientific challenges and research directions that will enable efficient and economic use of the solar resource to provide a significant fraction of global primary energy by the mid 21st century. The report reflects the collective output of the workshop attendees, which included 200 scientists representing academia, national laboratories, and industry in the United States and abroad, and the U.S. Department of Energy?s Office of Basic Energy Sciences and Office of Energy Efficiency and Renewable Energy.« less
Analysis for Non-Traditional Security Challenges: Methods and Tools
2006-11-20
PMESII Modeling Challenges modeling or where data is not available to support the model, would aid decision Domain is large, nebulous, complex, and...traditional challenges . This includes enlisting the aid of the inter-agency and alliance/coalition communities. Second, we need to realize this...20 November 2006 MILITARY OPERATIONS RESEARCH SOCIETY MIFh MORS Workshop Analysis for Non-Traditional Security Challenges : Methods and Tools 21-23
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Nanocarbon composites and hybrids in sustainability: a review.
Vilatela, Juan J; Eder, Dominik
2012-03-12
There is an ever-growing need to protect our environment by increasing energy efficiency and developing "clean" energy sources. These are global challenges, and their resolution is vital to our energy security. Although many conventional materials, such as metals, ceramics, and plastics, cannot fulfil all requirements for these new technologies, many material combinations can offer synergistic effects that create improved and even new properties. The implementation of nanocarbons, such as graphene and carbon nanotubes, into nanocomposites and, more recently, into the new class of hybrids, are very promising examples. In contrast to classical nanocomposites, where a low volume fraction of the carbon component is mixed into a polymer or ceramic matrix, hybrids are materials in which nanocarbon is coated with a thin layer of the functional compound, which introduces the interface as a powerful new parameter. Based on interfacial charge and energy transfer processes, nanocarbon hybrids have shown increased sensitivities in gas sensors, improved efficiencies in photovoltaics, superior activities in photocatalysts, and enhanced capacities in supercapacitors. This review compares the characteristics and potentials of both nanocarbon composites and hybrids, highlights recent developments in their synthesis and discusses key challenges for their use in various energy applications. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Wastewater treatment high rate algal ponds (WWT HRAP) for low-cost biofuel production.
Mehrabadi, Abbas; Craggs, Rupert; Farid, Mohammed M
2015-05-01
Growing energy demand and water consumption have increased concerns about energy security and efficient wastewater treatment and reuse. Wastewater treatment high rate algal ponds (WWT HRAPs) are a promising technology that could help solve these challenges concurrently where climate is favorable. WWT HRAPs have great potential for biofuel production as a by-product of WWT, since the costs of algal cultivation and harvest for biofuel production are covered by the wastewater treatment function. Generally, 800-1400 GJ/ha/year energy (average biomass energy content: 20 GJ/ton; HRAP biomass productivity: 40-70 tons/ha/year) can be produced in the form of harvestable biomass from WWT HRAP which can be used to provide community-level energy supply. In this paper the benefits of WWT HRAPs are compared with conventional mass algal culture systems. Moreover, parameters to effectively increase algal energy content and overall energy production from WWT HRAP are discussed including selection of appropriate algal biomass biofuel conversion pathways. Copyright © 2014 Elsevier Ltd. All rights reserved.
A Look Inside Argonne's Center for Nanoscale Materials
Divan, Ralu; Rosenthal, Dan; Rose, Volker; Wai Hla
2018-05-23
At a very small, or "nano" scale, materials behave differently. The study of nanomaterials is much more than miniaturization - scientists are discovering how changes in size change a material's properties. From sunscreen to computer memory, the applications of nanoscale materials research are all around us. Researchers at Argonne's Center for Nanoscale Materials are creating new materials, methods and technologies to address some of the world's greatest challenges in energy security, lightweight but durable materials, high-efficiency lighting, information storage, environmental stewardship and advanced medical devices.
Resource Conservation and a Sustainable Las Vegas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piechota, Thomas C.
2014-05-15
This research project developed educational, research, and outreach activities that addressed the challenges of Las Vegas as related to a secure energy supply through conservation, clean and adequate water supply, economic growth and diversification, air quality, and the best use of land, and usable public places. This was part of the UNLV Urban Sustainability Initiative (USI) that responded to a community and state need where a unifying vision of sustainability was developed in a cost-effective manner that promoted formal working partnerships between government, community groups, and industry.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clark Cully
2009-09-30
Physicists make valuable contributions in a wide variety of careers, including those in Washington. Many national challenges, including energy, innovation, and security, create a demand for technically-competent individuals across government. Clark will discuss some of the many programs in D.C. designed to attract the best and brightest minds, from grad-students to professors, from short-term assignments to whole new careers. These are great opportunities to use your expertise and enrich your knowledge of the broader scientific enterprise, all while serving society.
Update on NRF Measurements on ^237Np for National Security and Safeguards Applications
NASA Astrophysics Data System (ADS)
Angell, C. T.; Joshi, T.; Yee, R.; Swanberg, E.; Norman, E. B.; Kulp, W. D.; Warren, G.; Hicks, C. L., Jr.; Korbly, S.; Klimenko, A.; Wilson, C.; Bray, T. H.; Copping, R.; Shuh, D. K.
2010-11-01
Nuclear resonance fluorescence (NRF) uses γ rays to excite nuclear levels and measure their properties. This provides a unique isotopic signature, and can be used to identify and assay material. This is particularly important for applications that detect the smuggling of nuclear material or the diversion of fissile material for covert weapon programs, both of which present grave risks to world security. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions potentially making it an attractive material for covert weapon programs. This talk will present the final results of two measurements of NRF on ^237Np using a bremsstrahlung photon source. 15 NRF states have been identified between 1.5 and 2.5 MeV excitation energy.
Inertial-confinement fusion with lasers
Betti, R.; Hurricane, O. A.
2016-05-03
The quest for controlled fusion energy has been ongoing for over a half century. The demonstration of ignition and energy gain from thermonuclear fuels in the laboratory has been a major goal of fusion research for decades. Thermonuclear ignition is widely considered a milestone in the development of fusion energy, as well as a major scientific achievement with important applications to national security and basic sciences. The U.S. is arguably the world leader in the inertial con fment approach to fusion and has invested in large facilities to pursue it with the objective of establishing the science related to themore » safety and reliability of the stockpile of nuclear weapons. Even though significant progress has been made in recent years, major challenges still remain in the quest for thermonuclear ignition via laser fusion.« less
Romania and the New Cold War Security Challenges
2017-06-09
social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... course of the two challenge months, satisfy the requirements described above for receiving assignment of... Qualified Security, the assignment of Qualified Securities to a Group will be based on factors that include... become the LMM for such Qualified Security, it may initiate a challenge by notifying the Exchange of its...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheffield, J.
Energy availability in a country is of great importance to its economy and to raising and maintaining its standard of living. In 1994, the United States consumed more than 88 quadrillion Btu (quads) of energy and spent about $500 billion on fuels and electricity. Fortunately, the United States is well endowed with energy sources, notably fossil fuels, and possesses a considerable nuclear power industry. The United States also has significant renewable energy resources and already exploits much of its hydropower resources, which represent 10% of electricity production. Nevertheless, in 1994, the United States imported about 45% of the petroleum productsmore » it consumed, equivalent to about 17 quads of energy. This dependence on imported oil puts the country at risk of energy supply disruptions and oil price shocks. Previous oil shocks may have cost the country as much as $4 billion (in 1993 dollars) between 1973 and 1990. Moreover, the production and use of energy from fossil fuels are major sources of environmental damage. The corresponding situation in many parts of the world is more challenging. Developing countries are experiencing rapid growth in population, energy demand, and the environmental degradation that often results from industrial development. The near-term depletion of energy resources in response to this rapid growth runs counter to the concept of ''sustainable development''--development that meets the needs of today without compromising the ability of future generations to meet their own needs. Energy research and development (R&D) to improve efficiency and to develop and deploy energy alternatives may be viewed, therefore, as an insurance policy to combat the dangers of oil shocks and environmental pollution and as a means of supporting sustainable development. These considerations guide the energy policy of the United States and of the U.S. Department of Energy (DOE). In its strategic plan, DOE identifies the fostering of ''a secure and reliable energy system that is environmentally and economically sustainable'' as the first component of its mission. The strategic goal established for energy resources, identified as one of DOE's four businesses, is for ''the Department of Energy and its partners [to] promote secure, competitive, and environmentally responsible energy systems that serve the needs of the public.'' DOE has also identified four strategic goals for its programs in energy resources: (1) strengthening the economy and raising living standards through improvements in the energy field; (2) protecting the environment by reducing the adverse environmental impacts associated with energy production, distribution, and use; (3) keeping America secure by reducing vulnerabilities to global energy market shocks; and (4) enhancing American competitiveness in a growing world energy market.« less
What is a missing link among wireless persistent surveillance?
NASA Astrophysics Data System (ADS)
Hsu, Charles; Szu, Harold
2011-06-01
The next generation surveillance system will equip with versatile sensor devices and information focus capable of conducting regular and irregular surveillance and security environments worldwide. The community of the persistent surveillance must invest the limited energy and money effectively into researching enabling technologies such as nanotechnology, wireless networks, and micro-electromechanical systems (MEMS) to develop persistent surveillance applications for the future. Wireless sensor networks can be used by the military for a number of purposes such as monitoring militant activity in remote areas and force protection. Being equipped with appropriate sensors these networks can enable detection of enemy movement, identification of enemy force and analysis of their movement and progress. Among these sensor network technologies, covert communication is one of the challenging tasks in the persistent surveillance because it is highly demanded to provide secured sensor nodes and linkage for fear of deliberate sabotage. Due to the matured VLSI/DSP technologies, affordable COTS of UWB technology with noise-like direct sequence (DS) time-domain pulses is a potential solution to support low probability of intercept and low probability of detection (LPI/LPD) data communication and transmission. This paper will describe a number of technical challenges in wireless persistent surveillance development include covert communication, network control and routing, collaborating signal and information processing, and etc. The paper concludes by presenting Hermitian Wavelets to enhance SNR in support of secured communication.
P.L. 110-140, "Energy Independence and Security Act of 2007", 2007
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-19
The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...
10 CFR 95.49 - Security of automatic data processing (ADP) systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...
INL Control System Situational Awareness Technology Final Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Bryce Wheeler; Todd Vollmer
The Situational Awareness project is a comprehensive undertaking of Idaho National Laboratory (INL) in an effort to produce technologies capable of defending the country’s energy sector infrastructure from cyber attack. INL has addressed this challenge through research and development of an interoperable suite of tools that safeguard critical energy sector infrastructure. The technologies in this project include the Sophia Tool, Mesh Mapper (MM) Tool, Intelligent Cyber Sensor (ICS) Tool, and Data Fusion Tool (DFT). Each is designed to function effectively on its own, or they can be integrated in a variety of customized configurations based on the end user’s riskmore » profile and security needs.« less
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
Practical challenges in quantum key distribution
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...
2016-11-08
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Practical challenges in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
2014-01-01
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now
Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Nuclear Power; Past, present and future
NASA Astrophysics Data System (ADS)
Elliott, David
2017-04-01
This book looks at the early history of nuclear power, at what happened next, and at its longer-term prospects. The main question is: can nuclear power overcome the problems that have emerged? It was once touted as the ultimate energy source, freeing mankind from reliance on dirty, expensive fossil energy. Sixty years on, nuclear only supplies around 11.5% of global energy and is being challenged by cheaper energy options. While the costs of renewable sources, like wind and solar, are falling rapidly, nuclear costs have remained stubbornly high. Its development has also been slowed by a range of other problems, including a spate of major accidents, security concerns and the as yet unresolved issue of what to do with the wastes that it produces. In response, a new generation of nuclear reactors is being developed, many of them actually revised versions of the ideas first looked at in the earlier phase. Will this new generation of reactors bring nuclear energy to the forefront of energy production in the future?
IMPACTS Results Summary for CY 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weakley, Steven A.
Working in partnership with industry, the U.S. Department of Energy’s (DOE’s) Advanced Manufacturing Office (AMO) is helping reduce industrial energy use, carbon emissions, and waste while boosting productivity and economic competitiveness. Operating within the Office of Energy Efficiency and Renewable Energy (EERE), ITP conducts research, development, and demonstration (RD&D) projects and technology transfer activities that are producing substantial benefits to industry and helping the nation to address some of its biggest challenges in the areas of energy security and environmental performance. This document summarizes some of the impacts of ITP’s programs through 2010. The selection of 2010 as the timeframemore » for this report recognizes the fact that it takes at least two years to gain a full perspective on program performance and to assess the results of commercialization efforts for the technologies and practices at issue.« less
32 CFR 2700.14 - Challenges to classification.
Code of Federal Regulations, 2011 CFR
2011-07-01
... NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.14 Challenges to classification. If holders of classified information believe the information is improperly or unnecessarily... the OMSN Information Security Oversight Committee, established pursuant to § 2700.51. Action on such...
Microalgae biorefineries: The Brazilian scenario in perspective.
Brasil, B S A F; Silva, F C P; Siqueira, F G
2017-10-25
Biorefineries have the potential to meet a significant part of the growing demand for energy, fuels, chemicals and materials worldwide. Indeed, the bio-based industry is expected to play a major role in energy security and climate change mitigation during the 21th century. Despite this, there are challenges related to resource consumption, processing optimization and waste minimization that still need to be overcome. In this context, microalgae appear as a promising non-edible feedstock with advantages over traditional land crops, such as high productivity, continuous harvesting throughout the year and minimal problems regarding land use. Importantly, both cultivation and microalgae processing can take place at the same site, which increases the possibilities for process integration and a reduction in logistic costs at biorefinery facilities. This review describes the actual scenario for microalgae biorefineries integration to the biofuels and petrochemical industries in Brazil, while highlighting the major challenges and recent advances in microalgae large-scale production. Copyright © 2016 Elsevier B.V. All rights reserved.
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
China’s Energy Security: The Grand Hedging Strategy
2010-05-01
spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s
Efficient live face detection to counter spoof attack in face recognition systems
NASA Astrophysics Data System (ADS)
Biswas, Bikram Kumar; Alam, Mohammad S.
2015-03-01
Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.
Radiography Capabilities for Matter-Radiation Interactions in Extremes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walstrom, Peter Lowell; Garnett, Robert William; Chapman, Catherine A. B
The Matter-Radiation Interactions in Extremes (MaRIE) experimental facility will be used to discover and design the advanced materials needed to meet 21st century national security and energy security challenges. This new facility will provide the new tools scientists need to develop next-generation materials that will perform predictably and on-demand for currently unattainable lifetimes in extreme environments. The MaRIE facility is based on upgrades to the existing LANSCE 800-MeV proton linac and a new 12-GeV electron linac and associated X-ray FEL to provide simultaneous multiple probe beams, and new experimental areas. In addition to the high-energy photon probe beam, both electronmore » and proton radiography capabilities will be available at the MaRIE facility. Recently, detailed radiography system studies have been performed to develop conceptual layouts of high-magnification electron and proton radiography systems that can meet the experimental requirements for the expected first experiments to be performed at the facility. A description of the radiography systems, their performance requirements, and a proposed facility layout are presented.« less
Laboratory Directed Research and Development Annual Report for 2009
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Pamela J.
This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalablemore » synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.« less
Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications
NASA Astrophysics Data System (ADS)
Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.
2009-10-01
The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Fernandes, Horst Monken; Recio, Manuel Santamaria; Forsstrom, Hans; Carson, Philip Michael
2013-05-01
The challenges faced by states seeking to implement Environmental Remediation works are many. To this end, the International Atomic Energy Agency attempts to provide assistance and guidance to Member States wherever possible. This review article provides a brief overview of these challenges and highlights the international sources of financial and implementation support discussed at an international conference on the topic in Astana, Kazakhstan in 2009. The conference concluded the importance of institutional structures as a pre-requisite for remediation work, recognized privatization as a useful but limited financing tool for remediation and illustrated the need for better coordination between international funding organizations to reduce overlap and optimization of resources to secure the best outcomes. Copyright © 2011 Elsevier Ltd. All rights reserved.
The security energy encryption in wireless power transfer
NASA Astrophysics Data System (ADS)
Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.
2017-09-01
This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.
NASA Astrophysics Data System (ADS)
Pettit, Sandra L.
Designing and constructing safe, secure and cost-effective buildings has always been the goal of architects, engineers, developers and community officials. However, in light of recent tragic events, urban security design has become a major concern for both public and private building owners as the threat of terrorism attacks becomes more evident. Modern research and technology have provided a means to counter some of these threats, but there is little doubt that the need for physical security design will continue to increase as long as there are conflicting social, religious, and political agendas in the world. Parallel to this trend, the desire for aesthetically pleasing structures and architecture which pushes the envelope of typical building design make designing a secure, blast and fire resistant building a challenge, as many protective measures clash with the desires of architects. As a result, development of construction materials and technologies with respect to security is on the rise and there is a need for comprehensive solutions. Research into the behavior of stainless steel may prove it to be an elegant and efficient solution to a secure structural design which does not compromise a building's architecture. As a material that is often chosen for its aesthetic appeal, it also exhibits excellent ductility and high stress-strain rates, allowing it to absorb large amounts of energy from blasts before fracturing, compared to carbon steel. Stainless steel also exhibits superior fire-resisting qualities and can perform similarly to carbon steels without unsightly added fire protection. Using stainless steel for elements which have been identified as vulnerable to attack, such as a major column or transfer girder, or elements which can protect the rest of structure from a blast, such as a blast wall, can be an efficient component of a comprehensive urban security design. The challenges associated with the use of stainless steel, which has kept its use in structural design to a minimum, such as higher costs, availability, or special welding procedures, are minimal and will be easily overcome as the use of stainless steel in structure increases and designers and fabricators become more familiar with the material.
Security Challenges in the Gulf of Guinea Sub-Region: Strategy for Nigeria
2008-06-01
Gas Fisheries Defense of Shipping Data Sea Power Functioning Ecosystem Nation-States Pollution & Misuse Criminal Activities Poaching ...region, these increased activities have created challenging security issues including increased piracy, poaching , terrorism, militant youth activities... impact its economic, social and political development. Also, the GoG’s vast sea area presents great challenges to the Nigerian nation and the
Energy Structure and Energy Security under Climate Mitigation Scenarios in China
Matsumoto, Ken’ichi
2015-01-01
This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094
Achieving Transformational Materials Performance in a New Era of Science
Sarrao, John
2017-12-22
The inability of current materials to meet performance requirements is a key stumbling block for addressing grand challenges in energy and national security. Fortunately, materials research is on the brink of a new era - a transition from observation and validation of materials properties to prediction and control of materials performance. In this talk, I describe the nature of the current challenge, the prospects for success, and a specific facility concept, MaRIE, that will provide the needed capabilities to meet these challenges, especially for materials in extreme environments. MaRIE, for Matter-Radiation Interactions in Extremes, is Los Alamos' concept to realize this vision of 21st century materials research. This vision will be realized through enhancements to the current LANSCE accelerator, development of a fourth-generation x-ray light source co-located with the proton accelerator, and a comprehensive synthesis and characterization facility focused on controlling complex materials and the defect/structure link to materials performance.
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
ERIC Educational Resources Information Center
Reddy, Dinesh Sampangirama
2017-01-01
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Oktyabrsky, Serge; Yakimov, Michael; Tokranov, Vadim; ...
2016-03-30
Here, a picosecond-range timing of charged particles and photons is a long-standing challenge for many high-energy physics, biophysics, medical and security applications. We present a design, technological pathway and challenges, and some properties important for realization of an ultrafast high-efficient room-temperature semiconductor scintillator based on self-assembled InAs quantum dots (QD) embedded in a GaAs matrix. Low QD density (<; 10 15 cm -3), fast (~5 ps) electron capture, luminescence peak redshifted by 0.2-0.3 eV from GaAs absorption edge with fast decay time (0.5-1 ns) along with the efficient energy transfer in the GaAs matrix (4.2 eV/pair) allows for fabrication ofmore » a semiconductor scintillator with the unsurpassed performance parameters. The major technological challenge is fabrication of a large volume (> 1 cm 3 ) of epitaxial QD medium. This requires multiple film separation and bonding, likely using separate epitaxial films as waveguides for improved light coupling. Compared to traditional inorganic scintillators, the semiconductor-QD based scintillators could have about 5x higher light yield and 20x faster decay time, opening a way to gamma detectors with the energy resolution better than 1% and sustaining counting rates MHz. Picosecond-scale timing requires segmented low-capacitance photodiodes integrated with the scintillator. For photons, the proposed detector inherently provides the depth-of-interaction information.« less
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...
A Perspective on Research Challenges in Information Security
2011-11-01
UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pike, Bill
Data—lots of data—generated in seconds and piling up on the internet, streaming and stored in countless databases. Big data is important for commerce, society and our nation’s security. Yet the volume, velocity, variety and veracity of data is simply too great for any single analyst to make sense of alone. It requires advanced, data-intensive computing. Simply put, data-intensive computing is the use of sophisticated computers to sort through mounds of information and present analysts with solutions in the form of graphics, scenarios, formulas, new hypotheses and more. This scientific capability is foundational to PNNL’s energy, environment and security missions. Seniormore » Scientist and Division Director Bill Pike and his team are developing analytic tools that are used to solve important national challenges, including cyber systems defense, power grid control systems, intelligence analysis, climate change and scientific exploration.« less
Integrated modeling approach for optimal management of water, energy and food security nexus
NASA Astrophysics Data System (ADS)
Zhang, Xiaodong; Vesselinov, Velimir V.
2017-03-01
Water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-period socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. The obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.
NASA Astrophysics Data System (ADS)
Sagonas, Kostas; Pafilis, Panayiotis; Valakos, Efstratios D.
2015-10-01
Living on islands entails numerous challenges for animals, among which resource scarcity stands out. In order to survive, animals have to optimize energy acquisition. We examined the impact of insularity on digestion comparing a series of physiological and morphological traits of adult males between insular and mainland populations of the Balkan green lizard. Island lizards had longer gastrointestinal tracts and gut passage times and higher digestive efficiencies. The dissection of the hindgut revealed an unexpected finding, the presence of cecal valves that were more frequent in island lizards. Thanks to all above islanders retain food for longer periods and thus maximize energy income and increase the amount of the extracted nutrients. That way, they secure energy income from the limited, in time and quantity, food resources of the islands.
Energy performance of areas for urban development (Arkhangelsk is given as example)
NASA Astrophysics Data System (ADS)
Popova, Olga; Glebova, Yulia
2017-01-01
The present research provides an overview and analysis of the legal framework and the technology to increase energy save and energy efficiency. The challenges of the mentioned activities implementation in urban areas are revealed in the paper. A comparison was made of the principal methods of increasing energy efficiency that is based on payback period. The basic shortcomings of the methods used are found. The way of capital reproducing assets acquisition is proposed with consideration of the rate of wear and tear and upgrading of urban residential development. The present research aims at characterizing energy sustainability of urban areas for forming the information basis that identifies capital construction projects together within the urban area. A new concept - area energy sustainability is introduced in the study to use system-structural approach to energy saving and energy efficiency. Energy sustainability of the area as an integral indicator of the static characteristics of the territory is considered as a complex involving the following terms: energy security, energy intensity and energy efficiency dynamic indicators of all the components of the power system of the area. Dimensions and parameters of energy sustainability of the area are determined. Arkhangelsk is given as example.
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
Protecting water and wastewater infrastructure from cyber attacks
NASA Astrophysics Data System (ADS)
Panguluri, Srinivas; Phillips, William; Cusimano, John
2011-12-01
Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.
Mobile healthcare applications: system design review, critical issues and challenges.
Baig, Mirza Mansoor; GholamHosseini, Hamid; Connolly, Martin J
2015-03-01
Mobile phones are becoming increasingly important in monitoring and delivery of healthcare interventions. They are often considered as pocket computers, due to their advanced computing features, enhanced preferences and diverse capabilities. Their sophisticated sensors and complex software applications make the mobile healthcare (m-health) based applications more feasible and innovative. In a number of scenarios user-friendliness, convenience and effectiveness of these systems have been acknowledged by both patients as well as healthcare providers. M-health technology employs advanced concepts and techniques from multidisciplinary fields of electrical engineering, computer science, biomedical engineering and medicine which benefit the innovations of these fields towards healthcare systems. This paper deals with two important aspects of current mobile phone based sensor applications in healthcare. Firstly, critical review of advanced applications such as; vital sign monitoring, blood glucose monitoring and in-built camera based smartphone sensor applications. Secondly, investigating challenges and critical issues related to the use of smartphones in healthcare including; reliability, efficiency, mobile phone platform variability, cost effectiveness, energy usage, user interface, quality of medical data, and security and privacy. It was found that the mobile based applications have been widely developed in recent years with fast growing deployment by healthcare professionals and patients. However, despite the advantages of smartphones in patient monitoring, education, and management there are some critical issues and challenges related to security and privacy of data, acceptability, reliability and cost that need to be addressed.
Biosensors for Sustainable Food Engineering: Challenges and Perspectives.
Neethirajan, Suresh; Ragavan, Vasanth; Weng, Xuan; Chand, Rohit
2018-03-12
Current food production faces tremendous challenges from growing human population, maintaining clean resources and food qualities, and protecting climate and environment. Food sustainability is mostly a cooperative effort resulting in technology development supported by both governments and enterprises. Multiple attempts have been promoted in tackling challenges and enhancing drivers in food production. Biosensors and biosensing technologies with their applications, are being widely applied to tackling top challenges in food production and its sustainability. Consequently, a growing demand in biosensing technologies exists in food sustainability. Microfluidics represents a technological system integrating multiple technologies. Nanomaterials, with its technology in biosensing, is thought to be the most promising tool in dealing with health, energy, and environmental issues closely related to world populations. The demand of point of care (POC) technologies in this area focus on rapid, simple, accurate, portable, and low-cost analytical instruments. This review provides current viewpoints from the literature on biosensing in food production, food processing, safety and security, food packaging and supply chain, food waste processing, food quality assurance, and food engineering. The current understanding of progress, solution, and future challenges, as well as the commercialization of biosensors are summarized.
Security Planning and Policies to Meet the Challenges of Climate Change
2010-07-01
Security Climate change poses challenges to societies and governments that go far beyond the alteration of our environment. The physical impacts of...capacity of governments to respond. In this sense, the growing likelihood of events such as mass migrations, crop failures, economic shocks, public...riots and violence, floods and other natural disasters, widespread epidemics, and competition for resources pose serious challenges for governments and
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
Application Security Automation
ERIC Educational Resources Information Center
Malaika, Majid A.
2011-01-01
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freund, M.T.; Wise, J.A.; Ulibarri, C.A.
This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less
Arctic Climate Systems Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ivey, Mark D.; Robinson, David G.; Boslough, Mark B.
2015-03-01
This study began with a challenge from program area managers at Sandia National Laboratories to technical staff in the energy, climate, and infrastructure security areas: apply a systems-level perspective to existing science and technology program areas in order to determine technology gaps, identify new technical capabilities at Sandia that could be applied to these areas, and identify opportunities for innovation. The Arctic was selected as one of these areas for systems level analyses, and this report documents the results. In this study, an emphasis was placed on the arctic atmosphere since Sandia has been active in atmospheric research in themore » Arctic since 1997. This study begins with a discussion of the challenges and benefits of analyzing the Arctic as a system. It goes on to discuss current and future needs of the defense, scientific, energy, and intelligence communities for more comprehensive data products related to the Arctic; assess the current state of atmospheric measurement resources available for the Arctic; and explain how the capabilities at Sandia National Laboratories can be used to address the identified technological, data, and modeling needs of the defense, scientific, energy, and intelligence communities for Arctic support.« less
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
3 CFR - The Energy Independence and Security Act of 2007
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...
The pivotal and paradoxical role of phosphorus in a resilient water-energy-food security nexus
USDA-ARS?s Scientific Manuscript database
We make the case that phosphorus (P) is inextricably linked to an increasingly fragile, interconnected and interdependent ‘nexus’ of water, energy, and food security. While there are many other drivers that influence water, energy, and food security, P plays a unique and under-recognized role within...
2011-11-29
economies need in ways that are imperiling the climate its environment needs. 2 The climate - change dimension • Global climate is changing rapidly compared...cloudy & clear • humid & dry • drizzles & downpours • snowfall, snowpack, & snowmelt • breezes, blizzards, tornadoes, & typhoons Climate change means...droughts • heat waves • pest outbreaks • coastal erosion • coral bleaching events • power of typhoons & hurricanes • geographic range of tropical pathogens
Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose
2014-01-06
This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols.
Insider Threat Security Reference Architecture
2012-04-01
this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture
Security Certification Challenges in a Cloud Computing Delivery Model
2010-04-27
Relevant Security Standards, Certifications, and Guidance NIST SP 800 series ISO /IEC 27001 framework Cloud Security Alliance Statement of...CSA Domains / Cloud Features ISO 27001 Cloud Service Provider Responsibility Government Agency Responsibility Analyze Security gaps Compensating
AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges
2002-07-25
circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify
The unavoidable challenge: US transportation sector's addiction
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-09-26
Driven by two powerful forces, the quest for energy security and the need for cleaner air, the U.S. Department of Energy, various state and local agencies, and business and industry are seeking ways to significantly reduce the dependence on oil as a transportation fuel. This issue of ED features the latest research findings on methanol, compressed natural gas, and electricity, focusing on a just-completed DOE study and report. This issue also presents the following: (1) the ED Refining Netback Data Series for the US Gulf and West Coasts, Rotterdam, and Singapore as of September 7, 1990; and (2) the EDmore » Fuel Price/Tax Series for countries of the Western Hemisphere, September 1990 edition. 5 figs., 5 tabs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.
2008-01-01
We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less
Modelling the energy future of Switzerland after the phase out of nuclear power plants
NASA Astrophysics Data System (ADS)
Diaz, Paula; Van Vliet, Oscar
2015-04-01
In September 2013, the Swiss Federal Office of Energy (SFOE) published the final report of the proposed measures in the context of the Energy Strategy 2050 (ES2050). The ES2050 draws an energy scenario where the nuclear must be substituted by alternative sources. This implies a fundamental change in the energy system that has already been questioned by experts, e.g. [Piot, 2014]. Therefore, we must analyse in depth the technical implications of change in the Swiss energy mix from a robust baseload power such as nuclear, to an electricity mix where intermittent sources account for higher rates. Accomplishing the ES2050 imply difficult challenges, since nowadays nuclear power is the second most consumed energy source in Switzerland. According to the SFOE, nuclear accounts for a 23.3% of the gross production, only surpassed by crude oil products (43.3%). Hydropower is the third source more consumed, representing approximately the half of the nuclear (12.2%). Considering that Switzerland has almost reached the maximum of its hydropower capacity, renewables are more likely to be the alternative when the nuclear phase out takes place. Hence, solar and wind power will play an important role in the future Swiss energy mix, even though currently new renewables account for only 1.9% of the gross energy consumption. In this study we look for realistic and efficient combinations of energy resources to substitute nuclear power. Energy modelling is a powerful tool to design an energy system with high energy security that avoids problems of intermittency [Mathiesen & Lund, 2009]. In Switzerland, energy modelling has been used by the government [Abt et. al., 2012] and also has significant relevance in academia [Mathys, 2012]. Nevertheless, we detected a gap in the study of the security in energy scenarios [Busser, 2013]. This study examines the future electricity production of Switzerland using Calliope, a multi-scale energy systems model, developed at Imperial College, London and HES [Pfenninger, 2015]. It has been specifically design to represent high shares of renewable energy, allowing for the estimation of the Swiss energy transition with high level of detail. Calliope includes topology characteristics of the electricity system, and variability of radiation and wind, which enables the analysis of intermittency in renewable electricity sources, in order to fulfil the electricity demand at all hours. Three energy scenarios are modelled; first, the higher energy production of renewables in Switzerland and the import of natural gas to supply the demand; second, imports of wind power from North Sea with high level of intermittency; and third, imports of solar power from North Africa, with less intermittency but with higher risk of internal turmoil. To summarise, we analyse in detail the energy scenarios of Switzerland when the nuclear power plants will be ceased. A gap currently present in academia, such as the future energy security in Switzerland, is covered by our Calliope modelling. References: Abt, M.; E. Bernhard, A. Kolliker, T. Roth, M. Spicher, L. Stieger, Volkswirtschaftliche Massnahmenanalyse zur Energiestrategie 2050: Tiel I: Gesamtergebnisse und Empfehlungen, Staatssekretariat fur Wirtschaft SECO, Bern, CH, 2012. Busser, M; T. Kaiser, E. Wassermann, K. Ammon, S. Reichen, A. Gunzinger, et al., Energiestrategie 2050 aus Sicht des Energie Trialogs, Energie Trialog Schweiz, 2013. Mathiesen, B. V. and Lund, H. Comparative analyses of seven technologies to facilitate the integration of fluctuating renewable energy sources. IET Renew. Power Gen. 3, 190-204 (2009). Mathys, N. 2012. Modelling contributions to the Swiss energy and environmental challenge. Special issue on energy modelling_introductory article.Swiss journal of economics and statistics. Pfenninger, Stefan. 2015. Calliope: a multi-scale energy systems (MUSES) modeling framework. Available at: http://www.callio.pe/ Piot, M. Energiestrategie 2050 der Schweiz, in: 13. Symp. Energieinnovation, Graz, AT, 2014: p. 28.
Aviation Security: Efforts to Measure Effectiveness and Address Challenges
2003-11-05
AND SUBTITLE AVIATION SECURITY Efforts to Meassure Effectiveness and Address Challenges 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...screeners in becoming more adept at detecting hard -to-spot threat objects. However, TIP was shut down immediately following the September 11
Towards Integrating Distributed Energy Resources and Storage Devices in Smart Grid.
Xu, Guobin; Yu, Wei; Griffith, David; Golmie, Nada; Moulema, Paul
2017-02-01
Internet of Things (IoT) provides a generic infrastructure for different applications to integrate information communication techniques with physical components to achieve automatic data collection, transmission, exchange, and computation. The smart grid, as one of typical applications supported by IoT, denoted as a re-engineering and a modernization of the traditional power grid, aims to provide reliable, secure, and efficient energy transmission and distribution to consumers. How to effectively integrate distributed (renewable) energy resources and storage devices to satisfy the energy service requirements of users, while minimizing the power generation and transmission cost, remains a highly pressing challenge in the smart grid. To address this challenge and assess the effectiveness of integrating distributed energy resources and storage devices, in this paper we develop a theoretical framework to model and analyze three types of power grid systems: the power grid with only bulk energy generators, the power grid with distributed energy resources, and the power grid with both distributed energy resources and storage devices. Based on the metrics of the power cumulative cost and the service reliability to users, we formally model and analyze the impact of integrating distributed energy resources and storage devices in the power grid. We also use the concept of network calculus, which has been traditionally used for carrying out traffic engineering in computer networks, to derive the bounds of both power supply and user demand to achieve a high service reliability to users. Through an extensive performance evaluation, our data shows that integrating distributed energy resources conjointly with energy storage devices can reduce generation costs, smooth the curve of bulk power generation over time, reduce bulk power generation and power distribution losses, and provide a sustainable service reliability to users in the power grid.
Towards Integrating Distributed Energy Resources and Storage Devices in Smart Grid
Xu, Guobin; Yu, Wei; Griffith, David; Golmie, Nada; Moulema, Paul
2017-01-01
Internet of Things (IoT) provides a generic infrastructure for different applications to integrate information communication techniques with physical components to achieve automatic data collection, transmission, exchange, and computation. The smart grid, as one of typical applications supported by IoT, denoted as a re-engineering and a modernization of the traditional power grid, aims to provide reliable, secure, and efficient energy transmission and distribution to consumers. How to effectively integrate distributed (renewable) energy resources and storage devices to satisfy the energy service requirements of users, while minimizing the power generation and transmission cost, remains a highly pressing challenge in the smart grid. To address this challenge and assess the effectiveness of integrating distributed energy resources and storage devices, in this paper we develop a theoretical framework to model and analyze three types of power grid systems: the power grid with only bulk energy generators, the power grid with distributed energy resources, and the power grid with both distributed energy resources and storage devices. Based on the metrics of the power cumulative cost and the service reliability to users, we formally model and analyze the impact of integrating distributed energy resources and storage devices in the power grid. We also use the concept of network calculus, which has been traditionally used for carrying out traffic engineering in computer networks, to derive the bounds of both power supply and user demand to achieve a high service reliability to users. Through an extensive performance evaluation, our data shows that integrating distributed energy resources conjointly with energy storage devices can reduce generation costs, smooth the curve of bulk power generation over time, reduce bulk power generation and power distribution losses, and provide a sustainable service reliability to users in the power grid1. PMID:29354654
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gerald Hill; Kenneth Nemeth; Gary Garrett
The Southern States Energy Board's (SSEB) 'Regional Effort to Deploy Clean Coal Technologies' program began on June 1, 2003, and was completed on January 31, 2009. The project proved beneficial in providing state decision-makers with information that assisted them in removing barriers or implementing incentives to deploy clean coal technologies. This was accomplished through two specific tasks: (1) domestic energy security and diversity; and (2) the energy-water interface. Milestones accomplished during the project period are: (1) Presentations to Annual Meetings of SSEB Members, Associate Member Meetings, and the Gasification Technologies Council. (2) Energy: Water reports - (A) Regional Efforts tomore » Deploy Clean Coal Technologies: Impacts and Implications for Water Supply and Quality. June 2004. (B) Energy-Water Interface Challenges: Coal Bed Methane and Mine Pool Water Characterization in the Southern States Region. 2004. (C) Freshwater Availability and Constraints on Thermoelectric Power Generation in the Southeast U.S. June 2008. (3) Blackwater Interactive Tabletop Exercise - Decatur, Georgia April 2007. (4) Blackwater Report: Blackwater: Energy and Water Interdependency Issues: Best Practices and Lessons Learned. August 2007. (5) Blackwater Report: BLACKWATER: Energy Water Interdependency Issues REPORT SUMMARY. April 2008.« less
Health, Well-Being and Energy Poverty in Europe: A Comparative Study of 32 European Countries.
Thomson, Harriet; Snell, Carolyn; Bouzarovski, Stefan
2017-05-31
Despite growing pan-European interest in and awareness of the wide-ranging health and well-being impacts of energy poverty-which is characterised by an inability to secure adequate levels of energy services in the home-the knowledge base is largely British-centric and dominated by single-country studies. In response, this paper investigates the relationship between energy poverty, health and well-being across 32 European countries, using 2012 data from the European Quality of Life Survey. We find an uneven concentration of energy poverty, poor health, and poor well-being across Europe, with Eastern and Central Europe worst affected. At the intersection of energy poverty and health, there is a higher incidence of poor health (both physical and mental) amongst the energy poor populations of most countries, compared to non-energy poor households. Interestingly, we find the largest disparities in health and well-being levels between energy poor and non-energy poor households occur within relatively equal societies, such as Sweden and Slovenia. As well as the unique challenges brought about by rapidly changing energy landscapes in these countries, we also suggest the relative deprivation theory and processes of social comparison hold some value in explaining these findings.
AGU, Science and Engagement with the Energy Industry
NASA Astrophysics Data System (ADS)
Leinen, M.; Davidson, E. A.
2016-12-01
The relationship between science and society evolves over time and the social, political, and economic factors shaping this relationship are complex. When problems facing society become more challenging, the public, NGOs, and policy makers call for science to more directly inform solutions, to assure accountability for the use of funds and to address conflicts of interest. But when policy solutions for such challenges require significant economic and societal tradeoffs, discussion of the science can become polarized and politicized. When this occurs, AGU's policies that uphold the highest standards of scientific integrity, address conflicts of interests and promote independence for members are even more important. These policies are implemented through processes for: a) control of science presented at meeting and in publications; b) requirements for data cited in publications to be publicly accessible, and c) an organizational support policy that prohibits sponsors from influencing science presented in AGU programs. The private sector wields vast influence on human behavior and governmental policy through commerce and lobbying. These actions can be controversial when the profit motive appears incongruent with other societal opinions of what is in the public interest. Climate change is an example of this tension, where the economic exploitation of fossil fuels has complex effects on food and energy security as well as on the environment. Nonetheless, the AGU Board unanimously agreed that given our mission to advance science to create a more sustainable earth, engagement of the private sector rather than disengagement is the best way to influence decision makers on all sides because we believe that the private sector needs to be part of any solutions. We plan to use our convening power and scientific authority to bring together diverse views on climate change solutions from the private, NGO, policy, decision-maker and scientific sectors to begin a substantial, responsible and on-going dialogue. We want this dialogue to inform issues of energy, environment, security and the associated economic and societal benefits and tradeoffs in addressing climate change. AGU will share our initial ideas for convening such engagement and in the future will inform our membership on the successes and the on-going challenges.
He, Ying; Johnson, Chris
2017-12-01
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
OPSAID Initial Design and Testing Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A.; Stamp, Jason Edwin; Chavez, Adrian R.
2007-11-01
Process Control System (PCS) security is critical to our national security. Yet, there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy's Office of Electricity Delivery and Reliability, aims to address this issue through developing and testing an open source architecture for PCS security. Sandia National Laboratories, along with a team of PCS vendors and owners, have developed and tested this PCS security architecture. This report describes their progress to date.2 AcknowledgementsThe authors acknowledgemore » and thank their colleagues for their assistance with the OPSAID project.Sandia National Laboratories: Alex Berry, Charles Perine, Regis Cassidy, Bryan Richardson, Laurence PhillipsTeumim Technical, LLC: Dave TeumimIn addition, the authors are greatly indebted to the invaluable help of the members of the OPSAID Core Team. Their assistance has been critical to the success and industry acceptance of the OPSAID project.Schweitzer Engineering Laboratory: Rhett Smith, Ryan Bradetich, Dennis GammelTelTone: Ori Artman Entergy: Dave Norton, Leonard Chamberlin, Mark AllenThe authors would like to acknowledge that the work that produced the results presented in this paper was funded by the U.S. Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) as part of the National SCADA Test Bed (NSTB) Program. Executive SummaryProcess control systems (PCS) are very important for critical infrastructure and manufacturing operations, yet cyber security technology in PCS is generally poor. The OPSAID (Open PCS (Process Control System) Security Architecture for Interoperable Design) program is intended to address these security shortcomings by accelerating the availability and deployment of comprehensive security technology for PCS, both for existing PCS and inherently secure PCS in the future. All activities are closely linked to industry outreach and advisory efforts.Generally speaking, the OPSAID project is focused on providing comprehensive security functionality to PCS that communicate using IP. This is done through creating an interoperable PCS security architecture and developing a reference implementation, which is tested extensively for performance and reliability.This report first provides background on the PCS security problem and OPSAID, followed by goals and objectives of the project. The report also includes an overview of the results, including the OPSAID architecture and testing activities, along with results from industry outreach activities. Conclusion and recommendation sections follow. Finally, a series of appendices provide more detailed information regarding architecture and testing activities.Summarizing the project results, the OPSAID architecture was defined, which includes modular security functionality and corresponding component modules. The reference implementation, which includes the collection of component modules, was tested extensively and proved to provide more than acceptable performance in a variety of test scenarios. The primary challenge in implementation and testing was correcting initial configuration errors.OPSAID industry outreach efforts were very successful. A small group of industry partners were extensively involved in both the design and testing of OPSAID. Conference presentations resulted in creating a larger group of potential industry partners.Based upon experience implementing and testing OPSAID, as well as through collecting industry feedback, the OPSAID project has done well and is well received. Recommendations for future work include further development of advanced functionality, refinement of interoperability guidance, additional laboratory and field testing, and industry outreach that includes PCS owner education. 4 5 --This page intentionally left blank --« less
2014-12-12
and military doctrines , all contribute to slowing down the process of military integration in Southeast Asia. This thesis will argue for the...prevented Cambodia from playing a more constructive part in the ASEAN security stage. Indonesia, an archipelagic state with a thousand islands, is the...second largest archipelagic state in Southeast Asia, faces many security challenges. As a “typhoon-torn” country, it will benefit from a stronger
Applied Mathematics at the U.S. Department of Energy: Past, Present and a View to the Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, D L; Bell, J; Estep, D
2008-02-15
Over the past half-century, the Applied Mathematics program in the U.S. Department of Energy's Office of Advanced Scientific Computing Research has made significant, enduring advances in applied mathematics that have been essential enablers of modern computational science. Motivated by the scientific needs of the Department of Energy and its predecessors, advances have been made in mathematical modeling, numerical analysis of differential equations, optimization theory, mesh generation for complex geometries, adaptive algorithms and other important mathematical areas. High-performance mathematical software libraries developed through this program have contributed as much or more to the performance of modern scientific computer codes as themore » high-performance computers on which these codes run. The combination of these mathematical advances and the resulting software has enabled high-performance computers to be used for scientific discovery in ways that could only be imagined at the program's inception. Our nation, and indeed our world, face great challenges that must be addressed in coming years, and many of these will be addressed through the development of scientific understanding and engineering advances yet to be discovered. The U.S. Department of Energy (DOE) will play an essential role in providing science-based solutions to many of these problems, particularly those that involve the energy, environmental and national security needs of the country. As the capability of high-performance computers continues to increase, the types of questions that can be answered by applying this huge computational power become more varied and more complex. It will be essential that we find new ways to develop and apply the mathematics necessary to enable the new scientific and engineering discoveries that are needed. In August 2007, a panel of experts in applied, computational and statistical mathematics met for a day and a half in Berkeley, California to understand the mathematical developments required to meet the future science and engineering needs of the DOE. It is important to emphasize that the panelists were not asked to speculate only on advances that might be made in their own research specialties. Instead, the guidance this panel was given was to consider the broad science and engineering challenges that the DOE faces and identify the corresponding advances that must occur across the field of mathematics for these challenges to be successfully addressed. As preparation for the meeting, each panelist was asked to review strategic planning and other informational documents available for one or more of the DOE Program Offices, including the Offices of Science, Nuclear Energy, Fossil Energy, Environmental Management, Legacy Management, Energy Efficiency & Renewable Energy, Electricity Delivery & Energy Reliability and Civilian Radioactive Waste Management as well as the National Nuclear Security Administration. The panelists reported on science and engineering needs for each of these offices, and then discussed and identified mathematical advances that will be required if these challenges are to be met. A review of DOE challenges in energy, the environment and national security brings to light a broad and varied array of questions that the DOE must answer in the coming years. A representative subset of such questions includes: (1) Can we predict the operating characteristics of a clean coal power plant? (2) How stable is the plasma containment in a tokamak? (3) How quickly is climate change occurring and what are the uncertainties in the predicted time scales? (4) How quickly can an introduced bio-weapon contaminate the agricultural environment in the US? (5) How do we modify models of the atmosphere and clouds to incorporate newly collected data of possibly of new types? (6) How quickly can the United States recover if part of the power grid became inoperable? (7) What are optimal locations and communication protocols for sensing devices in a remote-sensing network? (8) How can new materials be designed with a specified desirable set of properties? In comparing and contrasting these and other questions of importance to DOE, the panel found that while the scientific breadth of the requirements is enormous, a central theme emerges: Scientists are being asked to identify or provide technology, or to give expert analysis to inform policy-makers that requires the scientific understanding of increasingly complex physical and engineered systems. In addition, as the complexity of the systems of interest increases, neither experimental observation nor mathematical and computational modeling alone can access all components of the system over the entire range of scales or conditions needed to provide the required scientific understanding.« less
46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.
Code of Federal Regulations, 2010 CFR
2010-10-01
... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information Security...
NREL: News - New Energy Systems Enhance National Security
resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy
Urbanization, Extreme Climate Hazards and Food, Energy Water Security
NASA Astrophysics Data System (ADS)
Romero-Lankao, P.; Davidson, D.; McPhearson, T.
2016-12-01
Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?
Climate challenges, vulnerabilities, and food security
Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad
2016-01-01
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017
Climate challenges, vulnerabilities, and food security.
Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad
2016-01-12
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke
2011-10-01
In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.
ERIC Educational Resources Information Center
Cummings, E. Mark
2003-01-01
Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…
Security Metrics: A Solution in Search of a Problem
ERIC Educational Resources Information Center
Rosenblatt, Joel
2008-01-01
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Current frontiers and future directions of telecoupling research
NASA Astrophysics Data System (ADS)
Liu, J.
2016-12-01
The world has been increasingly interconnected over long distances though processes such as international trade, migration, telecommunication, and disease spread. However, previous studies often focused on socioeconomic or environmental issues of distant processes. While these studies have generated useful information for individual disciplines, integrating socioeconomic and environmental information is essential for holistic understanding of complex global challenges and unbiased decision making to address the challenges. To advance integrated research, the framework of telecoupling (socioeconomic and environmental interactions over distances) has been developed to explicitly address both socioeconomic and environmental issues simultaneously. Although the framework is relatively new, it has already been applied to tackle a variety of globally important issues, such as food security, water resources, energy sustainability, land use, international trade (e.g., food, forest products, energy, wildlife, industrial products), species invasion, investment, ecosystem services, conservation, information dissemination, and tourism. These applications have identified many important research gaps (e.g. spillover systems) and hidden linkages (e.g. feedbacks) among distant areas of the world with profound implications for sustainable development, ecosystem health, and human well-being. While working with telecoupling presents more challenges than focusing only on disciplinary issues, support from funding agencies has helped accelerate research on telecoupling and more efforts are being aimed at framework quantification and operationalization. The presenter will provide an overview of the current frontiers, discuss future research directions, and highlight emerging opportunities and challenges in telecoupling research and governance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Philip; Bush, John; Bowerman, Biays
The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.« less
NASA Astrophysics Data System (ADS)
Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti
2016-04-01
This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.
Making Technology Work for Campus Security
ERIC Educational Resources Information Center
Floreno, Jeff; Keil, Brad
2010-01-01
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
DOT National Transportation Integrated Search
2003-09-09
Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...
ERIC Educational Resources Information Center
Abelson, Philip H.
1973-01-01
Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)
76 FR 37343 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...
The EGS Data Collaboration Platform: Enabling Scientific Discovery
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weers, Jonathan D; Johnston, Henry; Huggins, Jay V
Collaboration in the digital age has been stifled in recent years. Reasonable responses to legitimate security concerns have created a virtual landscape of silos and fortified castles incapable of sharing information efficiently. This trend is unfortunately opposed to the geothermal scientific community's migration toward larger, more collaborative projects. To facilitate efficient sharing of information between team members from multiple national labs, universities, and private organizations, the 'EGS Collab' team has developed a universally accessible, secure data collaboration platform and has fully integrated it with the U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) and the National Geothermal Data Systemmore » (NGDS). This paper will explore some of the challenges of collaboration in the modern digital age, highlight strategies for active data management, and discuss the integration of the EGS Collab data management platform with the GDR to enable scientific discovery through the timely dissemination of information.« less
Spectral unfolding of fast neutron energy distributions
NASA Astrophysics Data System (ADS)
Mosby, Michelle; Jackman, Kevin; Engle, Jonathan
2015-10-01
The characterization of the energy distribution of a neutron flux is difficult in experiments with constrained geometry where techniques such as time of flight cannot be used to resolve the distribution. The measurement of neutron fluxes in reactors, which often present similar challenges, has been accomplished using radioactivation foils as an indirect probe. Spectral unfolding codes use statistical methods to adjust MCNP predictions of neutron energy distributions using quantified radioactive residuals produced in these foils. We have applied a modification of this established neutron flux characterization technique to experimentally characterize the neutron flux in the critical assemblies at the Nevada National Security Site (NNSS) and the spallation neutron flux at the Isotope Production Facility (IPF) at Los Alamos National Laboratory (LANL). Results of the unfolding procedure are presented and compared with a priori MCNP predictions, and the implications for measurements using the neutron fluxes at these facilities are discussed.
Smart Operations in Distributed Energy Resources System
NASA Astrophysics Data System (ADS)
Wei, Li; Jie, Shu; Zhang-XianYong; Qing, Zhou
Smart grid capabilities are being proposed to help solve the challenges concerning system operations due to that the trade-offs between energy and environmental needs will be constantly negotiated while a reliable supply of electricity needs even greater assurance in case of that threats of disruption have risen. This paper mainly explores models for distributed energy resources system (DG, storage, and load),and also reviews the evolving nature of electricity markets to deal with this complexity and a change of emphasis on signals from these markets to affect power system control. Smart grid capabilities will also impact reliable operations, while cyber security issues must be solved as a culture change that influences all system design, implementation, and maintenance. Lastly, the paper explores significant questions for further research and the need for a simulation environment that supports such investigation and informs deployments to mitigate operational issues as they arise.
Inertial-confinement fusion with lasers
NASA Astrophysics Data System (ADS)
Betti, R.; Hurricane, O. A.
2016-05-01
The quest for controlled fusion energy has been ongoing for over a half century. The demonstration of ignition and energy gain from thermonuclear fuels in the laboratory has been a major goal of fusion research for decades. Thermonuclear ignition is widely considered a milestone in the development of fusion energy, as well as a major scientific achievement with important applications in national security and basic sciences. The US is arguably the world leader in the inertial confinement approach to fusion and has invested in large facilities to pursue it, with the objective of establishing the science related to the safety and reliability of the stockpile of nuclear weapons. Although significant progress has been made in recent years, major challenges still remain in the quest for thermonuclear ignition via laser fusion. Here, we review the current state of the art in inertial confinement fusion research and describe the underlying physical principles.
Characterization of spectrometric photon-counting X-ray detectors at different pitches
NASA Astrophysics Data System (ADS)
Jurdit, M.; Brambilla, A.; Moulin, V.; Ouvrier-Buffet, P.; Radisson, P.; Verger, L.
2017-09-01
There is growing interest in energy-sensitive photon-counting detectors based on high flux X-ray imaging. Their potential applications include medical imaging, non-destructive testing and security. Innovative detectors of this type will need to count individual photons and sort them into selected energy bins, at several million counts per second and per mm2. Cd(Zn)Te detector grade materials with a thickness of 1.5 to 3 mm and pitches from 800 μm down to 200 μm were assembled onto interposer boards. These devices were tested using in-house-developed full-digital fast readout electronics. The 16-channel demonstrators, with 256 energy bins, were experimentally characterized by determining spectral resolution, count rate, and charge sharing, which becomes challenging at low pitch. Charge sharing correction was found to efficiently correct X-ray spectra up to 40 × 106 incident photons.s-1.mm-2.
Curiac, Daniel-Ioan
2016-04-07
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.
Risks and responses to universal drinking water security.
Hope, Robert; Rouse, Michael
2013-11-13
Risks to universal drinking water security are accelerating due to rapid demographic, climate and economic change. Policy responses are slow, uneven and largely inadequate to address the nature and scale of the global challenges. The challenges relate both to maintaining water security in increasingly fragile supply systems and to accelerating reliable access to the hundreds of millions who remain water-insecure. A conceptual framework illustrates the relationship between institutional, operational and financial risks and drinking water security outcomes. We apply the framework to nine case studies from rural and urban contexts in South Asia and sub-Saharan Africa. Case studies are purposively selected based on established and emerging examples of political, technological or institutional reforms that address water security risks. We find broad evidence that improved information flows reduce institutional costs and promote stronger and more transparent operational performance to increase financial sustainability. However, political barriers need to be overcome in all cases through internal or external interventions that require often decadal time frames and catalytic investments. No single model exists, though there is sufficient evidence to demonstrate that risks to drinking water security can be reduced even in the most difficult and challenging contexts.
2004-05-03
A special thanks to all of these folks (Glenn Starnes, Lee Gutierrez, Bill Rapp, Joel Hillison, Carlos Gomez, Steve Fraunfelter, Janie Hopkins, Dave ...DiClemente, Joe Nunez, John Bonin , and Steve Nerheim). viii INFORMATION TECHNOLOGY CHALLENGES FACING THE STRATEGIC LEADERS OF HOMELAND SECURITY IN THE 21ST
NASA Astrophysics Data System (ADS)
Alif, S. M.; Nugroho, A. P.; Leksono, B. E.
2018-03-01
Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Energy Security Strategies: An Analysis of Tanzania and Mozambique
2016-06-01
prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall
Security: Progress and Challenges
ERIC Educational Resources Information Center
Luker, Mark A.
2004-01-01
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Global renewable energy-based electricity generation and smart grid system for energy security.
Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.
Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security
Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
Treading lightly on shifting ground: The direction and motivation of future geological research
Witt, A.C.
2011-01-01
The future of the geosciences and geological research will involve complex scientific challenges, primarily concerning global and regional environmental issues, in the next 20-30 years. It is quite reasonable to suspect, based on current political and socioeconomic events, that young geoscientists will be faced with and involved in helping to resolve some well defined problems: water and energy security, the effects of anthropogenic climate change, coastal sea level rise and development, and the mitigation of geohazards. It is how we choose to approach these challenges that will define our future. Interdisciplinary applied research, improved modeling and prediction augmented with faster and more sophisticated computing, and a greater role in creating and guiding public policy, will help us achieve our goals of a cleaner and safer Earth environment in the next 30 years. In the far future, even grander possibilities for eliminating the risk of certain geohazards and finding sustainable solutions to our energy needs can be envisioned. Looking deeper into the future, the possibilities for geoscience research push the limits of the imagination.
Challenges and Responses to Asian Food Security
NASA Astrophysics Data System (ADS)
Teng, Paul P. S.; Oliveros, Jurise A. P.
2015-10-01
Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Necefer, Len Edward; Jones, Thomas Elisha
American Indian tribes possess lands rich with renewable energy (RE) resources. Tribes have great potential and need to develop these resources, yet face a host of barriers that continue to impede development. Understanding these challenges as well as the pathways that can be taken to overcome them may facilitate more economic development to meet community needs and better position tribes to play a role in securing a low-carbon energy future for the United States. This paper presents the results of an expert elicitation of 24 tribal energy experts from federal, tribal, academic, and private industry backgrounds to identify barriers andmore » opportunities for federally recognized tribes in the lower 48 states. Experts identified a number of unique challenges facing tribes including financing and funding, infrastructure, tribal leadership and staff, state-level influence, and partnerships. Cultural factors were seen only to be of concern with large-scale development. Tribal sovereignty is a significant motivation for RE development and has yet to be fully realized. Cultural considerations are critical to the success of future projects; smaller residential and community-scale projects may be a better fit. Improving partnerships between tribes and the private sector can increase RE deployment and overcome historical distrust. States can have a double-ended influence on projects within tribal lands through taxation.« less
Sandia National Laboratories: National Security Programs
policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We
10 CFR 1015.210 - Liquidation of collateral.
Code of Federal Regulations, 2010 CFR
2010-01-01
... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...
Integrated Modeling Approach for Optimal Management of Water, Energy and Food Security Nexus
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Xiaodong; Vesselinov, Velimir Valentinov
We report that water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-periodmore » socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. Lastly, the obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.« less
Integrated Modeling Approach for Optimal Management of Water, Energy and Food Security Nexus
Zhang, Xiaodong; Vesselinov, Velimir Valentinov
2016-12-28
We report that water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-periodmore » socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. Lastly, the obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.« less
NASA's Research in Aircraft Vulnerability Mitigation
NASA Technical Reports Server (NTRS)
Allen, Cheryl L.
2005-01-01
Since its inception in 1958, the National Aeronautics and Space Administration s (NASA) role in civil aeronautics has been to develop high-risk, high-payoff technologies to meet critical national aviation challenges. Following the events of Sept. 11, 2001, NASA recognized that it now shared the responsibility for improving homeland security. The NASA Strategic Plan was modified to include requirements to enable a more secure air transportation system by investing in technologies and collaborating with other agencies, industry, and academia. NASA is conducting research to develop and advance innovative and commercially viable technologies that will reduce the vulnerability of aircraft to threats or hostile actions, and identify and inform users of potential vulnerabilities in a timely manner. Presented in this paper are research plans and preliminary status for mitigating the effects of damage due to direct attacks on civil transport aircraft. The NASA approach to mitigation includes: preventing loss of an aircraft due to a hit from man-portable air defense systems; developing fuel system technologies that prevent or minimize in-flight vulnerability to small arms or other projectiles; providing protection from electromagnetic energy attacks by detecting directed energy threats to aircraft and on/off-board systems; and minimizing the damage due to high-energy attacks (explosions and fire) by developing advanced lightweight, damage-resistant composites and structural concepts. An approach to preventing aircraft from being used as weapons of mass destruction will also be discussed.
Biomanufacturing: history and perspective.
Zhang, Yi-Heng Percival; Sun, Jibin; Ma, Yanhe
2017-05-01
Biomanufacturing is a type of manufacturing that utilizes biological systems (e.g., living microorganisms, resting cells, animal cells, plant cells, tissues, enzymes, or in vitro synthetic (enzymatic) systems) to produce commercially important biomolecules for use in the agricultural, food, material, energy, and pharmaceutical industries. History of biomanufacturing could be classified into the three revolutions in terms of respective product types (mainly), production platforms, and research technologies. Biomanufacturing 1.0 focuses on the production of primary metabolites (e.g., butanol, acetone, ethanol, citric acid) by using mono-culture fermentation; biomanufacturing 2.0 focuses on the production of secondary metabolites (e.g., penicillin, streptomycin) by using a dedicated mutant and aerobic submerged liquid fermentation; and biomanufacturing 3.0 focuses on the production of large-size biomolecules-proteins and enzymes (e.g., erythropoietin, insulin, growth hormone, amylase, DNA polymerase) by using recombinant DNA technology and advanced cell culture. Biomanufacturing 4.0 could focus on new products, for example, human tissues or cells made by regenerative medicine, artificial starch made by in vitro synthetic biosystems, isobutanol fermented by metabolic engineering, and synthetic biology-driven microorganisms, as well as exiting products produced by far better approaches. Biomanufacturing 4.0 would help address some of the most important challenges of humankind, such as food security, energy security and sustainability, water crisis, climate change, health issues, and conflict related to the energy, food, and water nexus.
NASA Astrophysics Data System (ADS)
Valles Sosa, Claudia Evangelina
Bioenergy has become an important alternative source of energy to alleviate the reliance on petroleum energy. Bioenergy offers diminishing climate change by reducing Green House Gas Emissions, as well as providing energy security and enhancing rural development. The Energy Independence and Security Act mandate the use of 21 billion gallons of advanced biofuels including 16 billion gallons of cellulosic biofuels by the year 2022. It is clear that Biomass can make a substantial contribution to supply future energy demand in a sustainable way. However, the supply of sustainable energy is one of the main challenges that mankind will face over the coming decades. For instance, many logistical challenges will be faced in order to provide an efficient and reliable supply of quality feedstock to biorefineries. 700 million tons of biomass will be required to be sustainably delivered to biorefineries annually to meet the projected use of biofuels by the year of 2022. Approaching this complex logistic problem as a multi-commodity network flow structure, the present work proposes the use of a genetic algorithm as a single objective optimization problem that considers the maximization of profit and the present work also proposes the use of a Multiple Objective Evolutionary Algorithm to simultaneously maximize profit while minimizing global warming potential. Most transportation optimization problems available in the literature have mostly considered the maximization of profit or the minimization of total travel time as potential objectives to be optimized. However, on this research work, we take a more conscious and sustainable approach for this logistic problem. Planners are increasingly expected to adopt a multi-disciplinary approach, especially due to the rising importance of environmental stewardship. The role of a transportation planner and designer is shifting from simple economic analysis to promoting sustainability through the integration of environmental objectives. To respond to these new challenges, the Modified Multiple Objective Evolutionary Algorithm for the design optimization of a biomass to bio-refinery logistic system that considers the simultaneous maximization of the total profit and the minimization of three environmental impacts is presented. Sustainability balances economic, social and environmental goals and objectives. There exist several works in the literature that have considered economic and environmental objectives for the presented supply chain problem. However, there is a lack of research performed in the social aspect of a sustainable logistics system. This work proposes a methodology to integrate social aspect assessment, based on employment creation. Finally, most of the assessment methodologies considered in the literature only contemplate deterministic values, when in realistic situations uncertainties in the supply chain are present. In this work, Value-at-Risk, an advanced risk measure commonly used in portfolio optimization is included to consider the uncertainties in biofuel prices, among the others.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bazillian, Morgan; Pedersen, Ascha Lychett; Pless, Jacuelyn
Shale gas resource potential in China is assessed to be large, and its development could have wide-ranging economic, environmental, and energy security implications. Although commercial scale shale gas development has not yet begun in China, it holds the potential to change the global energy landscape. Chinese decision-makers are wrestling with the challenges associated with bringing the potential to reality: geologic complexity; infrastructure and logistical difficulties; technological, institutional, social and market development issues; and environmental impacts, including greenhouse gas emissions, impacts on water availability and quality, and air pollution. This paper briefly examines the current situation and outlook for shale gasmore » in China, and explores existing and potential avenues for international cooperation. We find that despite some barriers to large-scale development, Chinese shale gas production has the potential to grow rapidly over the medium-term.« less
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
NASA Astrophysics Data System (ADS)
Rose, K.; Rowan, C.; Rager, D.; Dehlin, M.; Baker, D. V.; McIntyre, D.
2015-12-01
Multi-organizational research teams working jointly on projects often encounter problems with discovery, access to relevant existing resources, and data sharing due to large file sizes, inappropriate file formats, or other inefficient options that make collaboration difficult. The Energy Data eXchange (EDX) from Department of Energy's (DOE) National Energy Technology Laboratory (NETL) is an evolving online research environment designed to overcome these challenges in support of DOE's fossil energy goals while offering improved access to data driven products of fossil energy R&D such as datasets, tools, and web applications. In 2011, development of NETL's Energy Data eXchange (EDX) was initiated and offers i) a means for better preserving of NETL's research and development products for future access and re-use, ii) efficient, discoverable access to authoritative, relevant, external resources, and iii) an improved approach and tools to support secure, private collaboration and coordination between multi-organizational teams to meet DOE mission and goals. EDX presently supports fossil energy and SubTER Crosscut research activities, with an ever-growing user base. EDX is built on a heavily customized instance of the open source platform, Comprehensive Knowledge Archive Network (CKAN). EDX connects users to externally relevant data and tools through connecting to external data repositories built on different platforms and other CKAN platforms (e.g. Data.gov). EDX does not download and repost data or tools that already have an online presence. This leads to redundancy and even error. If a relevant resource already has an online instance, is hosted by another online entity, EDX will point users to that external host either using web services, inventorying URLs and other methods. EDX offers users the ability to leverage private-secure capabilities custom built into the system. The team is presently working on version 3 of EDX which will incorporate big data analytical capabilities amongst other advanced features.
States of Cybersecurity: Electricity Distribution System Discussions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pena, Ivonne; Ingram, Michael; Martin, Maurice
State and local entities that oversee the reliable, affordable provision of electricity are faced with growing and evolving threats from cybersecurity risks to our nation's electricity distribution system. All-hazards system resilience is a shared responsibility among electric utilities and their regulators or policy-setting boards of directors. Cybersecurity presents new challenges and should be a focus for states, local governments, and Native American tribes that are developing energy-assurance plans to protect critical infrastructure. This research sought to investigate the implementation of governance and policy at the distribution utility level that facilitates cybersecurity preparedness to inform the U.S. Department of Energy (DOE),more » Office of Energy Policy and Systems Analysis; states; local governments; and other stakeholders on the challenges, gaps, and opportunities that may exist for future analysis. The need is urgent to identify the challenges and inconsistencies in how cybersecurity practices are being applied across the United States to inform the development of best practices, mitigations, and future research and development investments in securing the electricity infrastructure. By examining the current practices and applications of cybersecurity preparedness, this report seeks to identify the challenges and persistent gaps between policy and execution and reflect the underlying motivations of distinct utility structures as they play out at the local level. This study aims to create an initial baseline of cybersecurity preparedness within the distribution electricity sector. The focus of this study is on distribution utilities not bound by the cybersecurity guidelines of the North American Electric Reliability Corporation (NERC) to examine the range of mechanisms taken by state regulators, city councils that own municipal utilities, and boards of directors of rural cooperatives.« less
Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective
NASA Astrophysics Data System (ADS)
Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha
2017-07-01
Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.
National Security Science and Technology Initiative: Air Cargo Screening
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Philip R; White, Tim; Cespedes, Ernesto
The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive benchmarks combinations, and conducted modeling and simulation studies to begin populating the matrix of commodities, threats, and detection technologies. (4) Designed and fabricated basic (homogeneous) commodity test pallets and fabricated inert stimulants to support experiments and to validate modeling/simulation results. (5) Developed/expanded the team's capabilities to conduct full-scale imaging (neutron and x-ray) experiments of air cargo commodities and explosive benchmarks. (6) Conducted experiments to improve the collection of trace particles of explosives from a variety of surfaces representative of air cargo materials by means of mechanical (air/vibration/pressure), thermal, and electrostatic methods. Air cargo screening is a difficult challenge that will require significant investment in both research and development to find a suitable solution to ensure the safety of passengers without significantly hindering the flow of commodities. The initiative funded by Battelle has positioned this group to make major contributions in meeting the air cargo challenge by developing collaborations, developing laboratory test systems, improving knowledge of the challenges (both technical and business) for air cargo screening, and increasing the understanding of the capabilities for current inspection methods (x-ray radiography, x-ray backscatter, etc.) and potential future inspection methods (neutron radiography, fusion of detector modalities, advanced trace detection, etc.). Lastly, air cargo screening is still an issue that will benefit from collaboration between Department of Energy Laboratories and Battelle. On January 7, 2010, DHS Secretary Napolitano joined White House Press Secretary Robert Gibbs and Assistant to the President for Counterterrorism and Homeland Security John Brennan to announce several recommendations DHS has made to the President for improving the technology and procedures used to protect air travel from acts of terrorism. (This announcement followed the 25 Dec'09 Delta/Northwest Airlines Flight 253 terror attack.) Secretary Napolitano outlined five recommendations DHS will pursue to enhance the safety of the traveling public. One of the five recommendations, read as follows: 'Establish a partnership on aviation security between DHS and the Department of Energy and its National Laboratories in order to develop new and more effective technologies to deter and disrupt known threats and proactively anticipate and protect against new ways by which terrorists could seek to board an aircraft.' In conclusion, it appears very timely that Battelle and its DOE lab partners initiated a serious collaboration on the air cargo topic, and that we should continue to work toward future collaboration in response to the government's needs.« less
The Grand Challenges of WCRP and the Climate Observing System of the Future
NASA Astrophysics Data System (ADS)
Brasseur, G. P.
2017-12-01
The successful implementation the Paris agreement on climate change (COP21) calls for a well-designed global monitoring system of essential climate variables, climate processes and Earth system budgets. The Grand Challenges implemented by the World Climate Research Programme (WCRP) provide an opportunity to investigate issues of high societal relevance, directly related to sea level rise, droughts, floods, extreme heat events, food security, and fresh water availability. These challenges would directly benefit from a well-designed suite of systematic climate observations. Quantification of the evolution of the global energy, water and carbon budgets as well as the development and the production of near-term and regional climate predictions require that a comprehensive, focused, multi-platform observing system (satellites, ground-based and in situ observations) be established in an international context. This system must be accompanied by the development of climate services that should translate and disseminate scientific outcomes as actionable information for users and stakeholders.
2010-11-30
legislature should help the government secure approval of its policy agenda, the political crisis left the new President with daunting challenges...The Lobo government faces significant challenges in fostering economic development in one of the hemisphere’s poorest countries; securing...indicators. The government has little room to address these issues as the country’s fiscal balance has deteriorated in recent years despite benefiting
Energy Security is National Security
2011-03-11
made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
Biosensors for Sustainable Food Engineering: Challenges and Perspectives
Ragavan, Vasanth; Weng, Xuan; Chand, Rohit
2018-01-01
Current food production faces tremendous challenges from growing human population, maintaining clean resources and food qualities, and protecting climate and environment. Food sustainability is mostly a cooperative effort resulting in technology development supported by both governments and enterprises. Multiple attempts have been promoted in tackling challenges and enhancing drivers in food production. Biosensors and biosensing technologies with their applications, are being widely applied to tackling top challenges in food production and its sustainability. Consequently, a growing demand in biosensing technologies exists in food sustainability. Microfluidics represents a technological system integrating multiple technologies. Nanomaterials, with its technology in biosensing, is thought to be the most promising tool in dealing with health, energy, and environmental issues closely related to world populations. The demand of point of care (POC) technologies in this area focus on rapid, simple, accurate, portable, and low-cost analytical instruments. This review provides current viewpoints from the literature on biosensing in food production, food processing, safety and security, food packaging and supply chain, food waste processing, food quality assurance, and food engineering. The current understanding of progress, solution, and future challenges, as well as the commercialization of biosensors are summarized. PMID:29534552
Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose
2014-01-01
This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols. PMID:24399155
Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J
2017-09-19
Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
Curiac, Daniel-Ioan
2016-01-01
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601
Common Capabilities for Trust and Security in Service Oriented Infrastructures
NASA Astrophysics Data System (ADS)
Brossard, David; Colombo, Maurizio
In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.
ERIC Educational Resources Information Center
Lopez, Robert H.
2012-01-01
The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jacobs, R
The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less
Energy Security, Innovation & Sustainability Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
More than a dozen energy experts convened in Houston, Texas, on February 13, 2009, for the first in a series of four regionally-based energy summits being held by the Council on Competitiveness. The Southern Energy Summit was hosted by Marathon Oil Corporation, and participants explored the public policy, business and technological challenges to increasing the diversity and sustainability of U.S. energy supplies. There was strong consensus that no single form of energy can satisfy the projected doubling, if not tripling, of demand by the year 2050 while also meeting pressing environmental challenges, including climate change. Innovative technology such as carbonmore » capture and storage, new mitigation techniques and alternative forms of energy must all be brought to bear. However, unlike breakthroughs in information technology, advancing broad-based energy innovation requires an enormous scale that must be factored into any equation that represents an energy solution. Further, the time frame for developing alternative forms of energy is much longer than many believe and is not understood by the general public, whose support for sustainability is critical. Some panelists estimated that it will take more than 50 years to achieve the vision of an energy system that is locally tailored and has tremendous diversity in generation. A long-term commitment to energy sustainability may also require some game-changing strategies that calm volatile energy markets and avoid political cycles. Taking a page from U.S. economic history, one panelist suggested the creation of an independent Federal Energy Reserve Board not unlike the Federal Reserve. The board would be independent and influence national decisions on energy supply, technology, infrastructure and the nation's carbon footprint to better calm the volatile energy market. Public-private efforts are critical. Energy sustainability will require partnerships with the federal government, such as the U.S. Department of Energy's National Laboratories, that can provide real-world improvements in both the short- and long-term. Indeed, the roles of government and the private sector in energy sustainability were brought into sharper focus by the pending American Recovery and Reinvestment Act of 2009, also known as the economic stimulus bill. There was cautious optimism that the bill was moving the nation in the right direction by way of focusing on greater energy efficiency, alternative forms of energy and improved infrastructure. Nevertheless, there was concern over Congress picking energy winners and losers. Instead, Congress should challenge industry to produce solutions that will create a clear path forward to energy sustainability that the American people can support.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...
76 FR 30326 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...
Transportation Energy Security and Climate Change Mitigation Act of 2007
DOT National Transportation Integrated Search
2008-09-29
The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kirk, Bernadette Lugue; Eipeldauer, Mary D; Whitaker, J Michael
In 2007, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) Office of Nonproliferation and International Security (NA-24) completed a comprehensive review of the current and potential future challenges facing the international safeguards system. The review examined trends and events impacting the mission of international safeguards and the implications of expanding and evolving mission requirements on the legal authorities and institutions that serve as the foundation of the international safeguards system, as well as the technological, financial, and human resources required for effective safeguards implementation. The review's findings and recommendations were summarized in the report, 'International Safeguards: Challenges and Opportunitiesmore » for the 21st Century (October 2007)'. One of the report's key recommendations was for DOE/NNSA to launch a major new program to revitalize the international safeguards technology and human resource base. In 2007, at the International Atomic Energy Agency's General Conference, then Secretary of Energy Samuel W. Bodman announced the newly created Next Generation Safeguards Initiative (NGSI). NGSI consists of five program elements: (1) Policy development and outreach; (2) Concepts and approaches; (3) Technology and analytical methodologies; (4) Human resource development; and (5) Infrastructure development. The ensuing report addresses the 'Human Resource Development (HRD)' component of NGSI. The goal of the HRD as defined in the NNSA Program Plan (November 2008) is 'to revitalize and expand the international safeguards human capital base by attracting and training a new generation of talent.' One of the major objectives listed in the HRD goal includes education and training, outreach to universities, professional societies, postdoctoral appointments, and summer internships at national laboratories. ORNL is a participant in the NGSI program, together with several DOE laboratories such as Pacific Northwest National Laboratory (PNNL), Lawrence Livermore National Laboratory (LLNL), Brookhaven National Laboratory (BNL), and Los Alamos National Laboratory (LANL). In particular, ORNL's participation encompasses student internships, postdoctoral appointments, collaboration with universities in safeguards curriculum development, workshops, and outreach to professional societies through career fairs.« less
2016-10-28
assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
Code of Federal Regulations, 2010 CFR
2010-01-01
... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...
Health, Well-Being and Energy Poverty in Europe: A Comparative Study of 32 European Countries
Thomson, Harriet; Snell, Carolyn; Bouzarovski, Stefan
2017-01-01
Despite growing pan-European interest in and awareness of the wide-ranging health and well-being impacts of energy poverty—which is characterised by an inability to secure adequate levels of energy services in the home—the knowledge base is largely British-centric and dominated by single-country studies. In response, this paper investigates the relationship between energy poverty, health and well-being across 32 European countries, using 2012 data from the European Quality of Life Survey. We find an uneven concentration of energy poverty, poor health, and poor well-being across Europe, with Eastern and Central Europe worst affected. At the intersection of energy poverty and health, there is a higher incidence of poor health (both physical and mental) amongst the energy poor populations of most countries, compared to non-energy poor households. Interestingly, we find the largest disparities in health and well-being levels between energy poor and non-energy poor households occur within relatively equal societies, such as Sweden and Slovenia. As well as the unique challenges brought about by rapidly changing energy landscapes in these countries, we also suggest the relative deprivation theory and processes of social comparison hold some value in explaining these findings. PMID:28561767
Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.
Cyber Security Audit and Attack Detection Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dale
2012-05-31
This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.
Efficient material decomposition method for dual-energy X-ray cargo inspection system
NASA Astrophysics Data System (ADS)
Lee, Donghyeon; Lee, Jiseoc; Min, Jonghwan; Lee, Byungcheol; Lee, Byeongno; Oh, Kyungmin; Kim, Jaehyun; Cho, Seungryong
2018-03-01
Dual-energy X-ray inspection systems are widely used today for it provides X-ray attenuation contrast of the imaged object and also its material information. Material decomposition capability allows a higher detection sensitivity of potential targets including purposely loaded impurities in agricultural product inspections and threats in security scans for example. Dual-energy X-ray transmission data can be transformed into two basis material thickness data, and its transformation accuracy heavily relies on a calibration of material decomposition process. The calibration process in general can be laborious and time consuming. Moreover, a conventional calibration method is often challenged by the nonuniform spectral characteristics of the X-ray beam in the entire field-of-view (FOV). In this work, we developed an efficient material decomposition calibration process for a linear accelerator (LINAC) based high-energy X-ray cargo inspection system. We also proposed a multi-spot calibration method to improve the decomposition performance throughout the entire FOV. Experimental validation of the proposed method has been demonstrated by use of a cargo inspection system that supports 6 MV and 9 MV dual-energy imaging.
Strategic Response to Energy-Related Security Threats in the US Department of Defense
2014-10-15
generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis
NASA Astrophysics Data System (ADS)
Aggarwal, R.
2013-12-01
Given the critical - but often subtle - feedbacks between water, energy, and food security, a nexus approach that integrates management and governance across sectors and scales is increasingly being advocated in research and policy circles. As a first step, such an approach calls for an integrated multi-disciplinary assessment of the externalities across sectors and tradeoffs involved in enhancing security in one sector on the other sectors. Recent research efforts have focused on understanding these tradeoffs, say, through estimating the energy costs of expanding irrigation for greater food security; or estimating the embodied land and water costs in increased energy production. While such efforts have increased awareness about the inter-connectedness of such issues, the fundamental question of how such an understanding influences decision-making and how it can lead to coordinated action towards a transition to more sustainable pathways still remains largely unanswered. The long legacy of sectoral organization of political and bureaucratic structures has led to a fragmentary policy and institutional landscape, on which cross-sectoral public action and coordination poses several challenges. Moreover, poorly defined property rights, imperfect or absent markets, and uncertainty about resource dynamics imply that economic signals about relative scarcity in one sector are not necessarily clear to decision makers in the other sectors. In this study, we examine these issues related to water-energy food nexus in the context of semi-arid groundwater irrigated regions of western and southern India. Using a social-ecological systems framework, we begin by characterizing some of the key inter-dependencies among food, water, and energy at the farm household, village and state level. We then examine the factors that influence decision-making at these levels, and the extent to which these decisions internalize the externalities. Specifically, we examine the role of energy pricing and rationing policy on groundwater withdrawals and type of crops grown. Finally, we examine several emerging examples of innovative policies and institutions that have leveraged the synergies among sectors. Although these examples do not necessarily provide optimal solutions, these provide some clues as to how decision- making within individual sectors can be influenced through institutional and policy design to transition towards more sustainable pathways in a second best world. We conclude by exploring what lessons these cases might hold for navigating these tradeoffs in other contexts.
78 FR 40131 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-03
... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
77 FR 35366 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
The energy cost of water independence: the case of Singapore.
Vincent, Lenouvel; Michel, Lafforgue; Catherine, Chevauché; Pauline, Rhétoré
2014-01-01
Finding alternative resources to secure or increase water availability is a key issue in most urban areas. This makes the research of alternative and local water resources of increasing importance. In the context of political tension with its main water provider (Malaysia), Singapore has been implementing a comprehensive water policy for some decades, which relies on water demand management and local water resource mobilisation in order to reach water self-sufficiency by 2060. The production of water from alternative resources through seawater desalination or water reclamation implies energy consumptive technologies such as reverse osmosis. In the context of increasing energy costs and high primary energy dependency, this water self-sufficiency objective is likely to be an important challenge for Singapore. The aim of this paper is to quantify the long-term impact of Singapore's water policy on the national electricity bill and to investigate the impact of Singapore's projects to reduce its water energy footprint. We estimate that 2.0% of the Singaporean electricity demand is already dedicated to water and wastewater treatment processes. If its water-energy footprint dramatically increases in the coming decades, ambitious research projects may buffer the energy cost of water self-sufficiency.
Global carbon management using air capture and geosequestration at remote locations
NASA Astrophysics Data System (ADS)
Lackner, K. S.; Goldberg, D.
2014-12-01
CO2 emissions need not only stop; according the IPCC, emissions need to turn negative. This requires means to remove CO2 from air and store it safely and permanently. We outline a combination of secure geosequestration and direct capture of CO2 from ambient air to create negative emissions at remote locations. Operation at remote sites avoids many difficulties associated with capture at the source, where space for added equipment is limited, good storage sites are in short supply, and proximity to private property engenders resistance. Large Igneous Provinces have been tested as secure CO2 reservoirs. CO2 and water react with reservoir rock to form stable carbonates, permanently sequestering the carbon. Outfitting reservoirs in large igneous provinces far from human habitation with ambient air capture systems creates large CO2 sequestration sites. Their remoteness offers advantages in environmental security and public acceptance and, thus, can smooth the path toward CO2 stabilization. Direct capture of CO2 from ambient air appears energetically and economically viable and could be scaled up quickly. Thermodynamic energy requirements are very small and a number of approaches have shown to be energy efficient in practice. Sorbent technologies include supported organoamines, alkaline brines, and quaternary ammonium based ion-exchange resins. To demonstrate that the stated goals of low cost and low energy consumption can be reached at scale, public research and demonstration projects are essential. We suggest co-locating air capture and geosequestration at sites where renewable energy resources can power both activities. Ready renewable energy would also allow for the co-production of synthetic fuels. Possible locations with large wind and basalt resources include Iceland and Greenland, the north-western United States, the Kerguelen plateau, Siberia and Morocco. Capture and sequestration in these reservoirs could recover all of the emissions of the 20th century and still contribute to a carbon neutral economy throughout the 21st century. Mobilizing industrial infrastructure to these areas poses a challenge. However, the urgency of the climate problem requires immediate action, with economic incentives and commitments to site evaluation and engineering development.
USDA-ARS?s Scientific Manuscript database
The impetus behind the global food security challenge is direct, with the necessity to feed over 9 billion people by 2050. Developing a food-secure world, where people have access to a safe and sustainable food supply is the principal goal of this challenge. To achieve this end, beef production ent...
Options for Synthetic DNA Order Screening, Revisited.
DiEuliis, Diane; Carter, Sarah R; Gronvall, Gigi Kwik
2017-01-01
Gene synthesis providers affiliated with the International Gene Synthesis Consortium (IGSC) voluntarily screen double-stranded DNA (dsDNA) synthesis orders over 200 bp to check for matches to regulated pathogens and to screen customers. Questions have been raised, however, about the continuing feasibility and effectiveness of screening. There are technical challenges (e.g., oligonucleotides and tracts of DNA less than 200 bp are not screened) and corporate challenges (e.g., the costs of screening are high, but other costs are dropping, so screening is an increasing portion of operating costs). In this article, we describe tangible actions that should be taken to (i) preserve the effectiveness of DNA order screening as a security tool and (ii) develop additional mechanisms to increase the safety and security of DNA synthesis technologies. Screening is not a perfect solution to DNA synthesis security challenges, but we believe it is still a valuable addition to security, and it can remain effective for some time.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-05-16
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-01-01
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841
Secure Infrastructure-Less Network (SINET)
2017-06-01
Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the
Security. Review Software for Advanced CHOICE. CHOICE (Challenging Options in Career Education).
ERIC Educational Resources Information Center
Pitts, Ilse M.; And Others
CHOICE Security is an Apple computer game activity designed to help secondary migrant students memorize their social security numbers and reinforce job and role information presented in "Career Notes, First Applications." The learner may choose from four time options and whether to have the social security number visible on the screen or…
DOT National Transportation Integrated Search
2010-03-17
The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...
The Threat of Security: Hindering Technology Integration in the Classroom
ERIC Educational Resources Information Center
Robinson, LeAnne K.; Brown, Abbie; Green, Tim
2007-01-01
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.
Code of Federal Regulations, 2011 CFR
2011-10-01
... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Interagency Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information...
The African Peace and Security Architecture: Myth or Reality
2013-03-01
resolving the conflicts. Efforts by African leaders to create continental peace and security mechanisms failed miserably . Consequently, Africans depended...Framework Document, October 2001), 14. 6 Andre Le Sage, “Africa’s Irregular Security Threats: Challenges for U.S. Engagement,” (Strategic Forum
10 CFR 824.9 - Hearing Counsel.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...
10 CFR 824.9 - Hearing Counsel.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...