DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.
2008-01-01
We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less
10 CFR 1015.210 - Liquidation of collateral.
Code of Federal Regulations, 2010 CFR
2010-01-01
... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...
Strategic Response to Energy-Related Security Threats in the US Department of Defense
2014-10-15
generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis
Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B
2008-10-01
Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.
Smart Grid Communications Security Project, U.S. Department of Energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, Frank
There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less
Code of Federal Regulations, 2011 CFR
2011-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Code of Federal Regulations, 2013 CFR
2013-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Code of Federal Regulations, 2012 CFR
2012-07-01
... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
Security in Wireless Sensor Networks Employing MACGSP6
ERIC Educational Resources Information Center
Nitipaichit, Yuttasart
2010-01-01
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
High tonnage forest biomass production systems from southern pine energy plantations
P. Jernigan; T. Gallagher; Dana Mitchell; L. Teeter
2011-01-01
The topic of declining fossil fuels and the absolute need for renewable energy sources is very evident in todayâs society. The utilization of bio-fuels is necessary to meet goals set forth in the Energy Independence and Security Act of 2007. Included in the act are standards in which bio-fuels will play a major role in ensuring national energy security and the...
Distance bounded energy detecting ultra-wideband impulse radio secure protocol.
Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J
2014-01-01
We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quirk, W.J.; Canada, J.; de Vore, L.
1994-04-01
This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.
Urbanization, Extreme Climate Hazards and Food, Energy Water Security
NASA Astrophysics Data System (ADS)
Romero-Lankao, P.; Davidson, D.; McPhearson, T.
2016-12-01
Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?
Engage States on Energy Assurance and Energy Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kara Colton; John Ratliff; Sue Gander
2008-09-30
The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-12-30
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-01-01
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831
2009-01-01
This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.
Keeping the Future Bright: Department of Defense (DOD) Sustainable Energy Strategy for Installations
2016-04-04
sustainable energy included renewable energy sources, such as hydroelectricity, solar energy, wind energy, wave power, geothermal energy, bioenergy, tidal...energy, including bioftiel and other alternative sources (wind. solar, and geothermal ).27 The SECNAV made security and independence the two energy...Navy’s China Lake geothermal power plant in California is DOD’s largest renewable energy project supplying nearly half of DOD’s renewable energy
Gasoline: The Achilles Heel of U.S. Energy Security
2010-03-01
reduce demand for petroleum, improve energy efficiency, and develop feasible alternative energy solutions to include emission capture technologies. The...United States remains the largest consumer of energy products in the world and is the second leading producer of green house gas (GHG) emissions ...energy solutions to include emission capture technologies. The United States remains the largest consumer of energy products in the world and is the
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
NASA Astrophysics Data System (ADS)
Alif, S. M.; Nugroho, A. P.; Leksono, B. E.
2018-03-01
Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.
2014-01-01
kW) and Energy (kWh) Charges, Including Time-of-Use Energy Charges X X X X X Power Factor Improvement X X Emergency Demand Response... Capacity Market) X X X X X Other Capacity Sales X X X Frequency Regulation X X X X Spinning/Synchronous Reserve X X Blackstart Capacity X X X...Policy, Organizational, and Other Factors that can Accelerate Prudent Electricity Security Asset Investments and Uses 0% 2% 4% 6% 8% 10% 12% 14% 16
Code of Federal Regulations, 2013 CFR
2013-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2012 CFR
2012-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2014 CFR
2014-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2010 CFR
2010-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2011 CFR
2011-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830
Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.
2016 National Algal Biofuels Technology Review
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barry, Amanda; Wolfe, Alexis; English, Christine
The Bioenergy Technologies Office (BETO) of the U.S. Department of Energy (DOE), Office of Energy Efficiency and Renewable Energy, is committed to advancing the vision of a viable, sustainable domestic biomass industry that produces renewable biofuels, bioproducts, and biopower; enhances U.S. energy security; reduces our dependence on fossil fuels; provides environmental benefits; and creates economic opportunities across the nation. BETO’s goals are driven by various federal policies and laws, including the Energy Independence and Security Act of 2007 (EISA). To accomplish its goals, BETO has undertaken a diverse portfolio of research, development, and demonstration (RD&D) activities, in partnership with nationalmore » laboratories, academia, and industry.« less
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.
Zhang, Guomei; Sun, Hao
2016-12-16
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
Zhang, Guomei; Sun, Hao
2016-01-01
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Consequences of a refusal to complete a CI evaluation including a polygraph examination. 709.14 Section 709.14 Energy DEPARTMENT OF ENERGY COUNTERINTELLIGENCE EVALUATION PROGRAM CI Evaluation Protocols and Protection of National Security § 709.14 Consequences of a...
Naval War College Review. Volume 64, Number 2, Spring 2011
2011-01-01
to revolutionize the African maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial...strategy for a maritime economy that includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global...transport in its core function); tourism ; energy; infrastructure (ports); cooperation on safety, security, and environmental protection; tariff harmonization
Energy technology evaluation report: Energy security
NASA Astrophysics Data System (ADS)
Koopman, R.; Lamont, A.; Schock, R.
1992-09-01
Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.
NASA Astrophysics Data System (ADS)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede
2015-12-01
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less
Laboratory Directed Research and Development FY2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, W; Sketchley, J; Kotta, P
2012-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2008-04-30
This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.
U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun
2009-10-07
The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less
10 CFR 217.2 - Priorities and allocations authority.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 3 2012-01-01 2012-01-01 false Priorities and allocations authority. 217.2 Section 217.2 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM General § 217.2 Priorities and... Security with respect to essential civilian needs supporting national defense, including civil defense and...
10 CFR 217.2 - Priorities and allocations authority.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 3 2014-01-01 2014-01-01 false Priorities and allocations authority. 217.2 Section 217.2 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM General § 217.2 Priorities and... Security with respect to essential civilian needs supporting national defense, including civil defense and...
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
NASA Astrophysics Data System (ADS)
Vanham, Davy
2017-04-01
The first part of this presentation analyses which water footprint (WF) components are necessary in WF accounting to provide relevant information to address the Sustainable Development Goals (SDG's) water security (SDG 6), food security (SDG 2) and energy security (SDG 7) in a nexus setting. It is strongly based on the publication Vanham (2016) http://dx.doi.org/10.1016/j.ecoser.2015.08.003. First, the nexus links between (1) the planetary boundary freshwater resources (green and blue water resources) and (2) food, energy and blue water security are discussed. Second, it is shown which water uses are mostly represented in WF accounting. General water management and WF studies only account for the water uses agriculture, industry and domestic water. Important water uses are however mostly not identified as separate entities or even included, i.e. green and blue water resources for aquaculture, wild foods, biofuels, hydroelectric cooling, hydropower, recreation/tourism, forestry (for energy and other biomass uses) and navigation. Third, therefore a list of essential separate components to be included within WF accounting is presented. The latter would be more coherent with the water-food-energy-ecosystem nexus. The second part of the presentation gives a brief overview of the recently published Urban Water Atlas for Europe. It shows for a selected city which WF components are represented and which not. As such, it also identifies research gaps.
Access to primary energy sources - the basis of national energy security
NASA Astrophysics Data System (ADS)
Szlązak, Jan; Szlązak, Rafał A.
2017-11-01
National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.
legislation dates back to the Clean Air Act of 1970, which created initiatives to reduce mobile sources of acts also include provisions related to alternative fuel vehicles (AFVs) and infrastructure. The Energy alternative fuel use and infrastructure development. The Energy Independence and Security Act of 2007 included
2011-01-01
maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial infrastructure and efficiency. There...includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global partners where they can best...refugees, human rights, transparency, and accountability Infrastructure and Energy: transport (including maritime transport in its core function); tourism
Input from Key Stakeholders in the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.
Audit of the management and cost of the Department of Energy`s protective forces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-07-01
The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in fullmore » production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.« less
10 CFR 719.2 - What are the definitions of terms used in this part?
Code of Federal Regulations, 2011 CFR
2011-01-01
... Energy, including the National Nuclear Security Administration. Department counsel means the individual... 10 Energy 4 2011-01-01 2011-01-01 false What are the definitions of terms used in this part? 719.2 Section 719.2 Energy DEPARTMENT OF ENERGY CONTRACTOR LEGAL MANAGEMENT REQUIREMENTS General Provisions...
10 CFR 719.2 - What are the definitions of terms used in this part?
Code of Federal Regulations, 2012 CFR
2012-01-01
... Energy, including the National Nuclear Security Administration. Department counsel means the individual... 10 Energy 4 2012-01-01 2012-01-01 false What are the definitions of terms used in this part? 719.2 Section 719.2 Energy DEPARTMENT OF ENERGY CONTRACTOR LEGAL MANAGEMENT REQUIREMENTS General Provisions...
10 CFR 719.2 - What are the definitions of terms used in this part?
Code of Federal Regulations, 2010 CFR
2010-01-01
... Energy, including the National Nuclear Security Administration. Department counsel means the individual... 10 Energy 4 2010-01-01 2010-01-01 false What are the definitions of terms used in this part? 719.2 Section 719.2 Energy DEPARTMENT OF ENERGY CONTRACTOR LEGAL MANAGEMENT REQUIREMENTS General Provisions...
10 CFR 719.2 - What are the definitions of terms used in this part?
Code of Federal Regulations, 2013 CFR
2013-01-01
... Energy, including the National Nuclear Security Administration. Department counsel means the individual... 10 Energy 4 2013-01-01 2013-01-01 false What are the definitions of terms used in this part? 719.2 Section 719.2 Energy DEPARTMENT OF ENERGY CONTRACTOR LEGAL MANAGEMENT REQUIREMENTS General Provisions...
10 CFR 217.44 - Instances where assistance may not be provided.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 3 2013-01-01 2013-01-01 false Instances where assistance may not be provided. 217.44 Section 217.44 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Special Priorities... where assistance may not be provided include situations when a person is attempting to: (a) Secure a...
10 CFR 217.44 - Instances where assistance may not be provided.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 3 2014-01-01 2014-01-01 false Instances where assistance may not be provided. 217.44 Section 217.44 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Special Priorities... where assistance may not be provided include situations when a person is attempting to: (a) Secure a...
10 CFR 217.44 - Instances where assistance may not be provided.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 3 2012-01-01 2012-01-01 false Instances where assistance may not be provided. 217.44 Section 217.44 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Special Priorities... where assistance may not be provided include situations when a person is attempting to: (a) Secure a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1998-11-01
The Board`s mission is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. The annual report of the Board presents information on regulatory requirements; nuclear facilities, from uranium mines to nuclear power plants and related operations; regulation of nuclear materials; radioactive waste management; compliance monitoring; research; non-proliferation, safeguards and security; international activities, and public information. A financial statement is also included.
How does India’s Energy Security Affect her National Security?
2008-12-01
these are referred to as biogases . Sources of biogas include swamps, marshes, and landfills as well as sewage sludge and manure by way of anaerobic...along with the acquisition of equity shares in oil and gas reserves overseas.6 The two most attractive sources of energy for India are Iran and the...jointly bidding for oil exploration rights in some regions like Africa and Siberia. On the other hand, the same two companies have bid against each
Hydrological sciences and water security: An overview
NASA Astrophysics Data System (ADS)
Young, G.; Demuth, S.; Mishra, A.; Cudennec, C.
2015-04-01
This paper provides an introduction to the concepts of water security including not only the risks to human wellbeing posed by floods and droughts, but also the threats of inadequate supply of water in both quantity and quality for food production, human health, energy and industrial production, and for the natural ecosystems on which life depends. The overall setting is one of constant change in all aspects of Earth systems. Hydrological systems (processes and regimes) are changing, resulting from varying and changing precipitation and energy inputs, changes in surface covers, mining of groundwater resources, and storage and diversions by dams and infrastructures. Changes in social, political and economic conditions include population and demographic shifts, political realignments, changes in financial systems and in trade patterns. There is an urgent need to address hydrological and social changes simultaneously and in combination rather than as separate entities, and thus the need to develop the approach of `socio-hydrology'. All aspects of water security, including the responses of both UNESCO and the International Association of Hydrological Sciences (IAHS) to the concepts of socio-hydrology, are examined in detailed papers within the volume titled Hydrological Sciences and Water Security: Past, Present and Future.
OPSAID Initial Design and Testing Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A.; Stamp, Jason Edwin; Chavez, Adrian R.
2007-11-01
Process Control System (PCS) security is critical to our national security. Yet, there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy's Office of Electricity Delivery and Reliability, aims to address this issue through developing and testing an open source architecture for PCS security. Sandia National Laboratories, along with a team of PCS vendors and owners, have developed and tested this PCS security architecture. This report describes their progress to date.2 AcknowledgementsThe authors acknowledgemore » and thank their colleagues for their assistance with the OPSAID project.Sandia National Laboratories: Alex Berry, Charles Perine, Regis Cassidy, Bryan Richardson, Laurence PhillipsTeumim Technical, LLC: Dave TeumimIn addition, the authors are greatly indebted to the invaluable help of the members of the OPSAID Core Team. Their assistance has been critical to the success and industry acceptance of the OPSAID project.Schweitzer Engineering Laboratory: Rhett Smith, Ryan Bradetich, Dennis GammelTelTone: Ori Artman Entergy: Dave Norton, Leonard Chamberlin, Mark AllenThe authors would like to acknowledge that the work that produced the results presented in this paper was funded by the U.S. Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) as part of the National SCADA Test Bed (NSTB) Program. Executive SummaryProcess control systems (PCS) are very important for critical infrastructure and manufacturing operations, yet cyber security technology in PCS is generally poor. The OPSAID (Open PCS (Process Control System) Security Architecture for Interoperable Design) program is intended to address these security shortcomings by accelerating the availability and deployment of comprehensive security technology for PCS, both for existing PCS and inherently secure PCS in the future. All activities are closely linked to industry outreach and advisory efforts.Generally speaking, the OPSAID project is focused on providing comprehensive security functionality to PCS that communicate using IP. This is done through creating an interoperable PCS security architecture and developing a reference implementation, which is tested extensively for performance and reliability.This report first provides background on the PCS security problem and OPSAID, followed by goals and objectives of the project. The report also includes an overview of the results, including the OPSAID architecture and testing activities, along with results from industry outreach activities. Conclusion and recommendation sections follow. Finally, a series of appendices provide more detailed information regarding architecture and testing activities.Summarizing the project results, the OPSAID architecture was defined, which includes modular security functionality and corresponding component modules. The reference implementation, which includes the collection of component modules, was tested extensively and proved to provide more than acceptable performance in a variety of test scenarios. The primary challenge in implementation and testing was correcting initial configuration errors.OPSAID industry outreach efforts were very successful. A small group of industry partners were extensively involved in both the design and testing of OPSAID. Conference presentations resulted in creating a larger group of potential industry partners.Based upon experience implementing and testing OPSAID, as well as through collecting industry feedback, the OPSAID project has done well and is well received. Recommendations for future work include further development of advanced functionality, refinement of interoperability guidance, additional laboratory and field testing, and industry outreach that includes PCS owner education. 4 5 --This page intentionally left blank --« less
Modeling the Effects of Pelleting on the Logistics of Distillers Grains Shipping
USDA-ARS?s Scientific Manuscript database
The energy security needs of energy importing nations continue to escalate. It is clear that biofuels can help meet some of the increasing need for energy. Theoretically, these can be produced from a variety of biological materials, including agricultural residues (such as corn stover and wheat st...
Research Staff | Energy Systems Integration Facility | NREL
Research Staff Research Staff NREL's Energy Systems Integration directorate includes the Power investments in advanced energy research, and the security and resilience team under the DOE's multi-lab effort to modernize the nation's electrical grid. juan.torres@nrel.gov | 303-275-3094 ESI Research
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Sandia National Laboratories: Directed-energy tech receives funding to
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
Materials @ LANL: Solutions for National Security Challenges
NASA Astrophysics Data System (ADS)
Teter, David
2012-10-01
Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.
How the Energy Independence and Security Act of 2007 Affects Light Bulbs
Inefficient light bulbs are being phased out under the New Light Bulb Law. It does not sweepingly ban incandescent bulbs, just those not energy efficient (with some exemptions). It also includes many provisions not pertaining to lighting.
Energy Security: Emerging Challenges and Opportunities
2010-08-01
46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy
Resilient Core Networks for Energy Distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kuntze, Nicolai; Rudolph, Carsten; Leivesley, Sally
2014-07-28
Abstract—Substations and their control are crucial for the availability of electricity in today’s energy distribution. Ad- vanced energy grids with Distributed Energy Resources require higher complexity in substations, distributed functionality and communication between devices inside substations and between substations. Also, substations include more and more intelligent devices and ICT based systems. All these devices are connected to other systems by different types of communication links or are situated in uncontrolled environments. Therefore, the risk of ICT based attacks on energy grids is growing. Consequently, security measures to counter these risks need to be an intrinsic part of energy grids. Thismore » paper introduces the concept of a Resilient Core Network to interconnected substations. This core network provides essen- tial security features, enables fast detection of attacks and allows for a distributed and autonomous mitigation of ICT based risks.« less
ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marra, J.
2010-09-29
Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less
Science and Strategic - Climate Implications
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Moran, E. H.
2008-12-01
Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.
Energy Security of Army Installations & Islanding Methodologies
2012-01-16
islanding of energy generation and distribution networks including electricity, natural gas , steam , liquid fuel, water, and others for the diverse...in geopolitics and war/peace/terrorism Breakthrough in reformation process of synthetic fuel production Hydrogen focused energy sector Oil and gas ...of synthetic AMf Q production Hydrogen focused energy sector D Of and gas remain available and cost-effective Natural Gas prices cut In
Energy Independence and Security Act of 2007
This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.
NREL: International Activities Home Page
key international strategic objectives: economic development, energy security, and environmental protection at home and abroad. NREL's international work spans our full range of capabilities, which includes three primary areas of expertise: research and development, energy analysis, and commercialization and
2013-04-01
products for energy generation, including solar, wind , and gas turbines , energy storage, power conversion, grid integration, and software for...potential security advantages over centralized systems • DER promote fuel diversity (e.g., biomass, landfill gas, flare gas, wind , solar) and...therefore reduce overall energy price volatility • Renewable DER such as wind and solar photovoltaics provide emissions-free energy • DER offer a quicker
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Evaluation of Roadmap to Achieve Energy Delivery Systems Cybersecurity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.
The Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) Cybersecurity for Energy Delivery Systems (CEDS) program is currently evaluating the Roadmap to Achieve Energy Delivery Systems Cybersecurity document that sets a vision and outlines a set of milestones. The milestones are divided into five strategic focus areas that include: 1. Build a Culture of Security; 2. Assess and Monitor Risk; 3. Develop and Implement New Protective Measures to Reduce Risk; 4. Manage Incidents; and 5. Sustain Security Improvements. The most current version of the roadmap was last updated in September of 2016. Sandia National Laboratories (SNL) has beenmore » tasked with revisiting the roadmap to update the current state of energy delivery systems cybersecurity protections. SNL is currently working with previous and current partners to provide feedback on which of the roadmap milestones have been met and to identify any preexisting or new gaps that are not addressed by the roadmap. The specific focus areas SNL was asked to evaluate are: 1. Develop and Implement New Protective Measures to Reduce Risk and 2. Sustain Security Improvements. SNL has formed an Industry Advisory Board (IAB) to assist in answering these questions. The IAB consists of previous partners on past CEDS funded efforts as well as new collaborators that have unique insights into the current state of cybersecurity within energy delivery systems. The IAB includes asset owners, utilities and vendors of control systems. SNL will continue to maintain regular communications with the IAB to provide various perspectives on potential future updates to further improve the breadth of cybersecurity coverage of the roadmap.« less
BIOSEP: A NEW ETHANOL RECOVERY TECHNOLOGY FOR SMALL SCALE RURAL PRODUCTION OF ETHANOL FROM BIOMASS
Research activities on bioethanol have increased substantially as a result of the current concerns with energy security. Inexpensive biomass including forest residues, mill residues, agricultural residues, urban wood wastes and dedicated energy corps that exists in abundance acr...
Population growth and global security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mumford, S.
A new threat to international and domestic security has emerged in the past three decades: uncontrolled world population growth. Current world population growth control efforts are ineffective. Unchecked growth will threaten global security by depleting food, energy, and other resources. Immigration is another complicating factor that is straining the carrying capacity of some overpopulated regions. Barriers to effective action include the desire of decision-makers to avoid the controversy of abortion and the role of the Catholic church in lobbying against birth control. (3 graphs, 12 photos, 2 tables)
10 CFR 1046.4 - Use of number and gender.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Use of number and gender. 1046.4 Section 1046.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS General § 1046.4 Use of number and gender. As used in this part, words in the singular also include the plural and words in the...
10 CFR 1046.4 - Use of number and gender.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Use of number and gender. 1046.4 Section 1046.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS (Eff. until 3-10-14) General § 1046.4 Use of number and gender. As used in this part, words in the singular also include the...
10 CFR 1046.4 - Use of number and gender.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Use of number and gender. 1046.4 Section 1046.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS General § 1046.4 Use of number and gender. As used in this part, words in the singular also include the plural and words in the...
10 CFR 1046.4 - Use of number and gender.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Use of number and gender. 1046.4 Section 1046.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS General § 1046.4 Use of number and gender. As used in this part, words in the singular also include the plural and words in the...
10 CFR 1046.4 - Use of number and gender.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Use of number and gender. 1046.4 Section 1046.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS General § 1046.4 Use of number and gender. As used in this part, words in the singular also include the plural and words in the...
Carbon sequestration potential of poplar energy crops in the Midwest, USA
R.S. Jr. Zalesny; W.L. Headlee; R.B. Hall; D.R. Coyle
2010-01-01
Energy use and climate change mitigation are closely linked via ecological, social, and economic factors, including carbon management. Energy supply is a key 21st century National security issue for the United States; identifying and developing woody feedstocks for transportation fuels and combined heat and power operations are a crucial component of the future...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Energy Conversion in Natural and Artificial Photosynthesis
McConnell, Iain; Li, Gonghu; Brudvig, Gary W.
2010-01-01
Summary Modern civilization is dependent upon fossil fuels, a nonrenewable energy source originally provided by the storage of solar energy. Fossil fuel dependence has severe consequences including energy security issues and greenhouse gas emissions. The consequences of fossil fuel dependence could be avoided by fuel-producing artificial systems that mimic natural photosynthesis, directly converting solar energy to fuel. This review describes the three key components of solar energy conversion in photosynthesis: light harvesting, charge separation, and catalysis. These processes are compared in natural and artificial systems. Such a comparison can assist in understanding the general principles of photosynthesis and in developing working devices including photoelectrochemical cells for solar energy conversion. PMID:20534342
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
Johnson, Terry A.; Replogle, William C.; Bernardez, Luis J.
2004-06-01
An in-vacuum radiation exposure shutter device can be employed to regulate a large footprint light beam. The shutter device includes (a) a source of radiation that generates an energy beam; (2) a shutter that includes (i) a frame defining an aperture toward which the energy beam is directed and (ii) a plurality of blades that are secured to the frame; and (3) device that rotates the shutter to cause the plurality of blades to intercept or allow the energy beam to travel through the aperture. Each blade can have a substantially planar surface and the plurality of blades are secured to the frame such that the planar surfaces of the plurality of blades are substantially parallel to each other. The shutter device is particularly suited for operation in a vacuum environment and can achieve shuttering speeds from about 0.1 second to 0.001 second or faster.
Laboratory-Directed Research and Development 2016 Summary Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pillai, Rekha Sukamar; Jacobson, Julie Ann
The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclearmore » Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world’s energy future and secure our critical infrastructure. Operating since 1949, INL is the nation’s leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL’s research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy, enable clean energy deployment, and secure and modernize critical infrastructure. INL’s research, development, and demonstration capabilities, its resources, and its unique geography enable integration of scientific discovery, innovation, engineering, operations, and controls into complex large-scale testbeds for discovery, innovation, and demonstration of transformational clean energy and security concepts. These attributes strengthen INL’s leadership as a demonstration laboratory. As a national resource, INL also applies its capabilities and skills to the specific needs of other federal agencies and customers through DOE’s Strategic Partnership Program.« less
Information security of power enterprises of North-Arctic region
NASA Astrophysics Data System (ADS)
Sushko, O. P.
2018-05-01
The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.
NASA Astrophysics Data System (ADS)
Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.
2017-10-01
The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.
Weather extremes could affect agriculture
NASA Astrophysics Data System (ADS)
Balcerak, Ernie
2012-05-01
As Earth's climate warms, agricultural producers will need to adapt. Changes, especially increases in extreme events, are already having an impact on food production, according to speakers at a 1 May session on agriculture and food security at the AGU Science Policy Conference. Christopher Field, director of the Department of Global Ecology at the Carnegie Institution for Science of Washington, D. C., pointed out the complex factors that come into play in understanding food security, including spatially varying controls and stresses, incomplete models, and the potential for threshold responses. Factors that are likely to cause problems include increasing population; increasing preference for meat, which needs more land and energy inputs to produce; climate change; and increasing use of agricultural lands for biomass energy.
US public perspectives on security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.
2012-02-01
We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American publicmore » in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Topics covered include: energy security; clean energy and low carbon; energy for growth and poverty reduction in Africa; financing of energy efficiency; SMEs for decentralised energy service provision; potential for biofuels in developing countries; clean energy and sustainable development; clean energy finance and private equity funds; power generation and low carbon technologies; beyond traditional finance; rehabilitation and emission control in thermal power plants; and carbon finance. The presentations are mainly in ppt (Power Point) or pdf (Acrobat) format. Some videos of the conference are also available on the website.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Alajmi, Naser; Elleithy, Khaled
2015-01-01
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499
Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
Alajmi, Naser; Elleithy, Khaled
2015-11-19
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.
U. S. statutes of general interest to safeguards and security officers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cadwell, J.J.
1988-01-01
A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section dealsmore » with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words.« less
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Wide-area situation awareness in electric power grid
NASA Astrophysics Data System (ADS)
Greitzer, Frank L.
2010-04-01
Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.
Energy conversion in natural and artificial photosynthesis.
McConnell, Iain; Li, Gonghu; Brudvig, Gary W
2010-05-28
Modern civilization is dependent upon fossil fuels, a nonrenewable energy source originally provided by the storage of solar energy. Fossil-fuel dependence has severe consequences, including energy security issues and greenhouse gas emissions. The consequences of fossil-fuel dependence could be avoided by fuel-producing artificial systems that mimic natural photosynthesis, directly converting solar energy to fuel. This review describes the three key components of solar energy conversion in photosynthesis: light harvesting, charge separation, and catalysis. These processes are compared in natural and in artificial systems. Such a comparison can assist in understanding the general principles of photosynthesis and in developing working devices, including photoelectrochemical cells, for solar energy conversion. 2010 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
1996-12-31
There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
Engineering cyanobacteria for fuels and chemicals production.
Zhou, Jie; Li, Yin
2010-03-01
The world's energy and global warming crises call for sustainable, renewable, carbon-neutral alternatives to replace fossil fuel resources. Currently, most biofuels are produced from agricultural crops and residues, which lead to concerns about food security and land shortage. Compared to the current biofuel production system, cyanobacteria, as autotrophic prokaryotes, do not require arable land and can grow to high densities by efficiently using solar energy, CO(2), water, and inorganic nutrients. Moreover, powerful genetic techniques of cyanobacteria have been developed. For these reasons, cyanobacteria, which carry out oxygenic photosynthesis, are attractive hosts for production of fuels and chemicals. Recently, several chemicals including ethanol, isobutanol and isoprene have been produced by engineered cyanobacteria directly using solar energy, CO(2), and water. Cyanobacterium is therefore a potential novel cell factory for fuels and chemicals production to address global energy security and climate change issues.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
Providing security assurance in line with national DBT assumptions
NASA Astrophysics Data System (ADS)
Bajramovic, Edita; Gupta, Deeksha
2017-01-01
As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.
P.L. 110-140, "Energy Independence and Security Act of 2007", 2007
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-19
The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...
10 CFR 95.49 - Security of automatic data processing (ADP) systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...
Green Banks | State, Local, and Tribal Governments | NREL
, and a commercial property assessed clean energy (PACE) product for a variety of different energy , Green Banks can help to help secure private capital by a number of different means including lowering Formation State and local governments have established Green Banks under a variety of different structures
Predicting Human Thermal Comfort in Automobiles
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rugh, J.; Bharathan, D.; Chaney, L.
The objects of this report are to: (1) increase national energy security by reducing fuel use for vehicle climate control systems; (2) show/demonstrate technology that can reduce the fuel used by LD vehicles' ancillary systems; and (3) develop tools to evaluate the effectiveness of energy-efficient systems including--comfort, cost, practicality, ease-of-use, and reliability.
Fundamental Studies of Beta Phase Decomposition Modes in Titanium Alloys
1989-01-31
and H. I. Aaronson, "The Carbon-Carbon Interaction Energy in Alpha Fe- C Alloys", Acta Met., in press. Raju V. Ramanujan , H. I. Aaronson and P. H. Leo...ACCESSIO% %. C 20332 61102F 2306 Al 11 TITLE (Include Security Classification) FUNDAMENTAL STUDIES OF BETA PHASE DECOMPOSITION MODES IN TITANIUM ALLOYS 12...SECUR1Tv CLASSiI-CAtION M) UNCLASSIFIED/UNLIMITED C SAME AS RPT C ] YfC ’SERS UNCLASSIFIED 22a NAME OF RESPONSIBLE INOI’JIDUAL 22b TELEPwONE (Include Area
Student Experiential Opportunities in National Security Careers
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less
Materials for Photovoltaic Applications
NASA Astrophysics Data System (ADS)
Dimova-Malinovska, Doriana
Energy priorities are changing nowadays. As mankind will probably have to face energy crisis, factors such as energy independence, energy security, stability of energy supply and the variety of energy sources become much more vital these days. Photovoltaics is exceptional compared to other renewable sources of energy due to its wide opportunity to gain energetic and environmental benefits. An overview of the present state of knowledge of the materials aspects of photovoltaic cells will be given, and new semiconductor materials, including nanomaterials, with potential for application in photovoltaic devices will be identified.
ERIC Educational Resources Information Center
Piper, Jim
1998-01-01
Discusses the importance of paying attention to facility requirements when selecting windows during a school building retrofit. Facility requirements to consider include security needs, lighting, energy conservation, and ease the cost of maintenance. (GR)
Solar energy an investment in our nations energy and economic security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnett, A.; Sklar, A.
1996-07-01
The solar energy industries are engaged in aggressive efforts to develop, validate, and deploy solar energy systems for a wide variety of applications in every sector of the economy. In many cases, efforts are in partnership with the United States Departmet of Energy (DOE) and it`s laboratories. These partnerships are heavily cost shared by industry and were entered into with good faith by companies and corporations willing to include their significant cost-share in their budget planning.
Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now
Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas
2006-10-01
In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
China’s Energy Security: The Grand Hedging Strategy
2010-05-01
spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenberg, Raymond; Wright, Kyle A.; McCaw, Erica E.
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide. Internationally, over 40 countries are cooperating with GTRI to enhance the security of these materials. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials, including orphaned and disused high-activity sources. GTRI began cooperation with the Republic of Colombia in April 2004. This cooperation has been a resounding success by securing forty high-risk sites, consolidating disused/orphan sources at an interim secure national storage facility, and developing a comprehensive approach to security, training, and sustainability.more » In 2005 the Colombian Ministry of Mines and Energy requested the Department of Energy’s support in the construction of a new Central Storage Facility (CSF). In December 2005, the Ministry selected to construct this facility at the Institute of Geology and Mining (Ingeominas) site in Bogota. This site already served as Colombia’s national repository, where disused sources were housed in various buildings around the complex. The CSF project was placed under contract in May 2006, but environmental issues and public protests, which led to a class action lawsuit against the Colombian Government, forced the Ministry to quickly suspend activities, thereby placing the project in jeopardy. Despite these challenges, however, the Ministry of Mines and Energy worked closely with public and environmental authorities to resolve these issues, and continued to be a strong advocate of the GTRI program. In June 2008, the Ministry of Mines and Energy was granted the construction and environmental licenses. As a result, construction immediately resumed and the CSF was completed by December 2008. A commissioning ceremony was held for the new facility in January 2009, which was attended by representatives from the Department of Energy, U.S. Embassy, and the Ministry of Mines and Energy, including the Minister and Vice Minister.« less
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Human Reliability Program Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, John; Rogers, Erin; Gerke, Gretchen
A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less
Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Ronald; Liu, Yung; Shuler, J.M.
Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institutemore » (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.« less
The security energy encryption in wireless power transfer
NASA Astrophysics Data System (ADS)
Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.
2017-09-01
This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.
Report on the first Quadrennial Technology Review (QTR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2011-09-30
Access to clean, affordable, secure, and reliable energy has been a cornerstone of America’s economic growth. The Nation’s systems that produce, store, transmit, and use energy are falling short of U.S. needs. Maintaining energy security, bolstering U.S. competitiveness, and mitigating the environmental impacts of energy are long-standing challenges. Governments, consumers, and the private sector have worked for decades to address these challenges, yet they remain among the Nation’s most pressing issues. President Obama has articulated broad national energy goals for reducing U.S. dependence on oil, reducing pollution, and investing in research and development (R&D) for clean-energy technologies in the Unitedmore » States to create jobs. These include: Reducing oil imports by one-third by 2025; Supporting the deployment of 1 million electric vehicles on the road by 2015; Making non-residential buildings 20% more energy efficient by 2020; Deriving 80% of America's electricity from clean-energy sources by 2035; and Reducing greenhouse gas emissions by 175 by 2020 and 83% of 2050, from a 2005 baseline.« less
Energy Structure and Energy Security under Climate Mitigation Scenarios in China
Matsumoto, Ken’ichi
2015-01-01
This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094
DOE Office of Scientific and Technical Information (OSTI.GOV)
evelo, stacie; Miller, Mark L.
2015-05-01
This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to localmore » and regional residents are discussed.« less
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
1992-06-01
AD-A256 202 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS - _ ’. AN ENERGY ANALYSIS OF THE PSEUDO WIGNER - VILLE DISTRIBUTION IN SUPPORT OF...NO 11 TITLE (Include Security Classification) AN ENERGY ANALYSIS OF THE PSEUDO WIGNER - VILLE DISTRIBUTION IN SUPPORT OF MACHINERY MONITORING AND...block number) FIELD GROUP SUB-GROUP machinery monitoring, transient, pseudo wigner - ville distribution , machinery diagnostics 19 ABSTRACT (Continue on
Enabling Secure High-Performance Wireless Ad Hoc Networking
2003-05-29
destinations, consuming energy and available bandwidth. An attacker may similarly create a routing black hole, in which all packets are dropped: by sending...of the vertex cut, for example by forwarding only routing packets and not data packets, such that the nodes waste energy forwarding packets to the...with limited resources, including network bandwidth and the CPU processing capacity, memory, and battery power ( energy ) of each individual node in the
2016 Billion-Ton Report: Advancing Domestic Resources for a Thriving Bioeconomy (Executive Summary)
Langholtz, Matthew; Stokes, Bryce; Eaton, Laurence
2016-10-01
We report that consumption of renewable energy in the United States is the highest in history, contributing to energy security, greenhouse gas reductions, and other social, economic, and environmental benefits. The largest single source of renewable energy is biomass, representing 3.9 quadrillion of 9.6 quadrillion British thermal units (Btu) in 2015. Biomass includes agricultural and forestry resources, municipal solid waste (MSW), and algae.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rodriguez, Salvador B.
Smart grids are a crucial component for enabling the nation’s future energy needs, as part of a modernization effort led by the Department of Energy. Smart grids and smart microgrids are being considered in niche applications, and as part of a comprehensive energy strategy to help manage the nation’s growing energy demands, for critical infrastructures, military installations, small rural communities, and large populations with limited water supplies. As part of a far-reaching strategic initiative, Sandia National Laboratories (SNL) presents herein a unique, three-pronged approach to integrate small modular reactors (SMRs) into microgrids, with the goal of providing economically-competitive, reliable, andmore » secure energy to meet the nation’s needs. SNL’s triad methodology involves an innovative blend of smart microgrid technology, high performance computing (HPC), and advanced manufacturing (AM). In this report, Sandia’s current capabilities in those areas are summarized, as well as paths forward that will enable DOE to achieve its energy goals. In the area of smart grid/microgrid technology, Sandia’s current computational capabilities can model the entire grid, including temporal aspects and cyber security issues. Our tools include system development, integration, testing and evaluation, monitoring, and sustainment.« less
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2012 CFR
2012-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2014 CFR
2014-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2013 CFR
2013-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2011 CFR
2011-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2010 CFR
2010-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
ASEAN Standby Force: Taking Southeast Asia Security to the Next Level
2013-03-01
official policy or position of the Department of the Army, Department of Defense, or the U.S. Government . U.S. Army War College CARLISLE BARRACKS...regional community environment. These forums have addressed issues including the Asian financial crisis, food and energy security, human trafficking ...its policies toward China, in light of its growing economic might and military power in the Pacific.35 In China, the government welcomed Mr. Obama’s
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
..., including the natural environment, agriculture and forestry, energy, land cover and land use, water..., atmospheric science, land use and land cover change; assessment process experts, including people who are...; homeland security; environmental justice and cultural resources and indigenous perspectives. Persons with a...
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freund, M.T.; Wise, J.A.; Ulibarri, C.A.
This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
33 CFR 148.710 - What environmental conditions must be satisfied?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security and other national policy goals and objectives, including energy sufficiency... to prevent or minimize adverse impacts on the marine environment (33 U.S.C. 1503(c)(3), 1504(f) and...
3 CFR - The Energy Independence and Security Act of 2007
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...
The pivotal and paradoxical role of phosphorus in a resilient water-energy-food security nexus
USDA-ARS?s Scientific Manuscript database
We make the case that phosphorus (P) is inextricably linked to an increasingly fragile, interconnected and interdependent ‘nexus’ of water, energy, and food security. While there are many other drivers that influence water, energy, and food security, P plays a unique and under-recognized role within...
Socioeconomic indicators for sustainable design and commercial development of algal biofuel systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Efroymson, Rebecca Ann; Dale, Virginia H.; Langholtz, Matthew H.
Socio-economic sustainability indicators that have been proposed previously for terrestrial bioenergy were evaluated for applicability to algal biofuels. Indicators developed for terrestrial bioenergy were found to be appropriate and sufficient for algae biofuels, meeting the selection criteria of practicality, wide applicability, predictability in response to management, anticipation of future changes, adaptability to multiple scales where possible, ability to integrate multiple dimensions, and non-redundancy. The 16 indicators fall into the categories of social well-being, energy security, external trade, profitability, resource conservation, and social acceptability. None of the indicators have yet been measured in published sustainability assessments for commercial facilities. Indicators estimatedmore » for various scenarios in the scientific literature include the profitability indicators return on investment and net present value, and the resource conservation indicator, fossil energy return on investment. The food security indicator, percent change in food price volatility, is easy to estimate at zero if agricultural lands are not used. Some indicators, such as the energy security indicators energy security premium and fuel price volatility and the external trade indicators terms of trade and trade volume cannot be projected into the future with accuracy, so they will not be measured prior to significant commercialization of algal biofuels. Furthermore, the list of proposed sustainability indicators may be adjusted to particular purposes and contexts. Together with environmental sustainability indicators, these socioeconomic sustainability indicators should contribute to sustainability assessments for algal biofuels.« less
Socioeconomic indicators for sustainable design and commercial development of algal biofuel systems
Efroymson, Rebecca Ann; Dale, Virginia H.; Langholtz, Matthew H.
2016-05-10
Socio-economic sustainability indicators that have been proposed previously for terrestrial bioenergy were evaluated for applicability to algal biofuels. Indicators developed for terrestrial bioenergy were found to be appropriate and sufficient for algae biofuels, meeting the selection criteria of practicality, wide applicability, predictability in response to management, anticipation of future changes, adaptability to multiple scales where possible, ability to integrate multiple dimensions, and non-redundancy. The 16 indicators fall into the categories of social well-being, energy security, external trade, profitability, resource conservation, and social acceptability. None of the indicators have yet been measured in published sustainability assessments for commercial facilities. Indicators estimatedmore » for various scenarios in the scientific literature include the profitability indicators return on investment and net present value, and the resource conservation indicator, fossil energy return on investment. The food security indicator, percent change in food price volatility, is easy to estimate at zero if agricultural lands are not used. Some indicators, such as the energy security indicators energy security premium and fuel price volatility and the external trade indicators terms of trade and trade volume cannot be projected into the future with accuracy, so they will not be measured prior to significant commercialization of algal biofuels. Furthermore, the list of proposed sustainability indicators may be adjusted to particular purposes and contexts. Together with environmental sustainability indicators, these socioeconomic sustainability indicators should contribute to sustainability assessments for algal biofuels.« less
Threats to US energy security: the challenge of Arab oil
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.
1979-08-13
Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.
On securing wireless sensor network--novel authentication scheme against DOS attacks.
Raja, K Nirmal; Beno, M Marsaline
2014-10-01
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
NREL: News - New Energy Systems Enhance National Security
resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy
Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke
2011-10-01
In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.
The Policy Trade-off Between Energy Security and Climate Change in the GCC States
NASA Astrophysics Data System (ADS)
Shahbek, Shaikha Ali
Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.
TERROR 2000: The Future Face of Terrorism
1994-06-24
defused a crude bomb planted near the local office of Ameri- can Airlines. In the other, two men attacked a Malaysian security guard stationed on the...Security system will be reformed. Those reforms will include means testing and taxation of benefits. 4. Rural land is being colonized by suburbs and...its present liabilities in the U.S. to become a major source of energy. .64 2018 57.43 US 4. Electric cars, augmented by solar panels, become available
2000-01-01
business of national security. The seven volumes contained herein analyze key organizations and processes throughout the Federal government, to include...Secretary of State (S) Chapter 2 – Under Secretary for Political Affairs (P) Chapter 3 – Under Secretary for Economic, Business and Agricultural Affairs...vulnerabilities of the evolving global economic infrastructure; E. Energy will continue to have a major strategic significance; F. All borders will be more
Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges
2010-07-01
the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
NASA Astrophysics Data System (ADS)
Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti
2016-04-01
This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...
Low-Impact Space Weather Sensors and the U.S. National Security Spacecraft
2016-09-01
aircraft. Even the CIA’s supersonic and stealthy A-12 Oxcart and the Air Force’s SR-71 were vulnerable by the time they became operational. The...thrusters that expel the energy providing thrust. Multiple sources of energy can be used for propellant, including solid and liquid fueled thrusters...dynamic space weather. At its core, this great ball of gas produces significant energy through nuclear fusion that converts hydrogen to helium, the two
ERIC Educational Resources Information Center
Abelson, Philip H.
1973-01-01
Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)
76 FR 37343 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-01-01
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the first quarter of fiscal year 1994 (October through December, 1993). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in five areas: (1) Safeguards Technology, (2) Safeguards and Decision Support, (3) Computer Security, (4) DOE Automated Physical Security, and (5) DOE Automated Visitor Access Control System. This report describes the activities in each of these five areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the First Quarter of Fiscal Year 1997 (October through December, 1996). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in four areas: (1) safeguards technology; (2) safeguards and material accountability; (3) computer security--distributed systems; and (4) physical and personnel security support. The remainder of this report describes the activities in each of these four areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less
Energy Security Strategies: An Analysis of Tanzania and Mozambique
2016-06-01
prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall
Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun
2017-06-01
Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.
United States Energy Policy: Security Not Independence
2013-03-01
the ecosystem. Examples include fish migration considerations for hydropower, birds and bats being killed in wind turbine blades, and many of the U.S...declining oil imports, and domestic energy exploration will remain American priorities. He went on to list wind , solar, clean coal, and biofuels as...crops - Winds not constant or reliable -Impact to ecosystem -Unsightly addition to landscape Solar16 -Renewable and clean -Minimal impact to
Russian Political, Economic, and Security Issues and U.S. Interests
2014-03-05
tourism , health resorts, energy and mining, and light industry. It also calls for encouraging ethnic Russians to resettle in the area. The strategy... tourism industry, terrorist designations, and preparations for the Sochi Olympics. Additional BPC activity in counter- terrorism included several joint...recognize Kosovo’s independence; cut off or reduced energy supplies in disputes with Ukraine and Belarus; boosted ties with Cuba and Venezuela; and
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farnham, Irene; Rehfeldt, Kenneth
The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix
Global renewable energy-based electricity generation and smart grid system for energy security.
Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.
Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security
Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201
The connection between water and energy in cities: a review.
Kenway, S J; Lant, P A; Priestley, A; Daniels, P
2011-01-01
We have only rudimentary understanding of the complex and pervasive connections between water and energy in cities. As water security now threatens energy and economic security, this is a major omission. Understanding the water-energy nexus is necessary if we want to contribute to solving water and energy issues simultaneously; if we want to stop moving problems from one resource dimension to another. This is particularly relevant in the Australian context where energy use for water supplies is forecast to rapidly escalate, growing around 300% from 2007 levels, by 2030. This paper presents a literature review with an aim of characterising the research to date with a particular focus on cities, the major centres of consumption and growth. It systematically analyses a wide range of papers and summarises the diverse objectives, dimensions, and scale of the research to-date together with knowledge gaps. There are many major gaps. These include energy use associated with water in industrial and commercial operations as well as socio-political perspectives. A major gap is the lack of a unifying theoretical framework and consistent methodology for analysis. This is considered a prerequisite for quantitative trans-city comparisons.
Ethanol for a sustainable energy future.
Goldemberg, José
2007-02-09
Renewable energy is one of the most efficient ways to achieve sustainable development. Increasing its share in the world matrix will help prolong the existence of fossil fuel reserves, address the threats posed by climate change, and enable better security of the energy supply on a global scale. Most of the "new renewable energy sources" are still undergoing large-scale commercial development, but some technologies are already well established. These include Brazilian sugarcane ethanol, which, after 30 years of production, is a global energy commodity that is fully competitive with motor gasoline and appropriate for replication in many countries.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...
Idaho National Laboratory Mission Accomplishments, Fiscal Year 2015
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allen, Todd Randall; Wright, Virginia Latta
A summary of mission accomplishments for the research organizations at the Idaho National Laboratory for FY 2015. Areas include Nuclear Energy, National and Homeland Security, Science and Technology Addressing Broad DOE Missions; Collaborations; and Stewardship and Operation of Research Facilities.
Federal agencies are required to reduce stormwater runoff from federal development and redevelopment projects to protect water resources. Options include a variety of stormwater management practices like green infrastructure or low impact development
Disarmament, Security and Development
ERIC Educational Resources Information Center
Bulletin of the Atomic Scientists, 1976
1976-01-01
Provided is a summary of the 26th Pugwash Conference on Science and World Affairs held August 26-31, 1976, in Muhlhausen, East Germany. World problems discussed included: arms limitations, military research and development, nuclear test ban, alternative energy sources, and genetic engineering. (SL)
Sandia National Laboratories: National Security Programs
policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We
NASA Astrophysics Data System (ADS)
Beaubouef, Bruce Andre
The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only brought the issue of national energy autonomy into the realm of national security considerations, but also allowed for an unprecedented level of government intervention into the marketplace of oil and energy in peacetime. The federal government assumed the role of protecting and serving the interests of energy consumers, a role which had previously been the sole purview of the private sector. What resulted was a complex, chaotic, and controversial regulatory nightmare that highlighted the deficiencies of micro-management, and stoked the political momentum for deregulation in the 1980s, which continued into the 1990s. Gradually, government micro-management of the energy economy was abandoned. That left the SPR, a passive, market-conforming policy tool as the government's primary mechanism for combating energy crises. (Abstract shortened by UMI.)
Town Hall with Secretary Moniz
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moniz, Ernest; Poneman, Daniel
In a town hall meeting with Department staff, Energy Secretary Ernest Moniz spoke about his plans for a reorganization of the Energy Department’s management structure. The plans will help better achieve the Department’s key priorities and those of the President, including implementing the President’s Climate Action Plan, “all of the above” energy strategy and nuclear security agenda. After his remarks, Moniz, joined by Deputy Secretary Dan Poneman, took questions from the audience in the Forrestal Auditorium as well as email questions from other Department locations.
2013-06-19
restriction. At that time, Congress also amended the “Declaration of Policy” to include renewable energy sources “ biomass ” and “more efficient energy...minimum mandates for advanced biofuels are one billion gallons for biomass -based diesel, 16 billion gallons for cellulosic fuels, and four billion...biofuels-and- the-u-s-military-has-it-wrong/ 162 BARTIS, supra note 159. 163 United to Purchase Biofuels from AltAir Fuels, BIOMASS MAGAZINE (July 1
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective
NASA Astrophysics Data System (ADS)
Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha
2017-07-01
Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.
Energy Security is National Security
2011-03-11
made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
Schramm, E; Mühlberger, F; Mitschke, S; Reichardt, G; Schulte-Ladbeck, R; Pütz, M; Zimmermann, R
2008-02-01
Several ionization potentials (IPs) of security relevant substances were determined with single photon ionization time of flight mass spectrometry (SPI-TOFMS) using monochromatized synchrotron radiation from the "Berliner Elektronenspeicherring-Gesellschaft für Synchrotronstrahlung" (BESSY). In detail, the IPs of nine explosives and related compounds, seven narcotics and narcotics precursors, and one chemical warfare agent (CWA) precursor were determined, whereas six IPs already known from the literature were verified correctly. From seven other substances, including one CWA precursor, the IP could not be determined as the molecule ion peak could not be detected. For these substances the appearance energy (AE) of a main fragment was determined. The analyzed security-relevant substances showed IPs significantly below the IPs of common matrix compounds such as nitrogen and oxygen. Therefore, it is possible to find photon energies in between, whereby the molecules of interest can be detected with SPI in very low concentrations due to the shielding of the matrix. All determined IPs except the one of the explosive EGDN were below 10.5 eV. Hence, laser-generated 118 nm photons can be applied for detecting almost all security-relevant substances by, e.g., SPI-TOFMS.
Dynamic security contingency screening and ranking using neural networks.
Mansour, Y; Vaahedi, E; El-Sharkawi, M A
1997-01-01
This paper summarizes BC Hydro's experience in applying neural networks to dynamic security contingency screening and ranking. The idea is to use the information on the prevailing operating condition and directly provide contingency screening and ranking using a trained neural network. To train the two neural networks for the large scale systems of BC Hydro and Hydro Quebec, in total 1691 detailed transient stability simulation were conducted, 1158 for BC Hydro system and 533 for the Hydro Quebec system. The simulation program was equipped with the energy margin calculation module (second kick) to measure the energy margin in each run. The first set of results showed poor performance for the neural networks in assessing the dynamic security. However a number of corrective measures improved the results significantly. These corrective measures included: 1) the effectiveness of output; 2) the number of outputs; 3) the type of features (static versus dynamic); 4) the number of features; 5) system partitioning; and 6) the ratio of training samples to features. The final results obtained using the large scale systems of BC Hydro and Hydro Quebec demonstrates a good potential for neural network in dynamic security assessment contingency screening and ranking.
Advanced Communication and Control Solutions of Distributed Energy Resources (DER)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Asgeirsson, Haukur; Seguin, Richard; Sherding, Cameron
2007-01-10
This report covers work performed in Phase II of a two phase project whose objective was to demonstrate the aggregation of multiple Distributed Energy Resources (DERs) and to offer them into the energy market. The Phase I work (DE-FC36-03CH11161) created an integrated, but distributed, system and procedures to monitor and control multiple DERs from numerous manufacturers connected to the electric distribution system. Procedures were created which protect the distribution network and personnel that may be working on the network. Using the web as the communication medium for control and monitoring of the DERs, the integration of information and security wasmore » accomplished through the use of industry standard protocols such as secure SSL,VPN and ICCP. The primary objective of Phase II was to develop the procedures for marketing the power of the Phase I aggregated DERs in the energy market, increase the number of DER units, and implement the marketing procedures (interface with ISOs) for the DER generated power. The team partnered with the Midwest Independent System Operator (MISO), the local ISO, to address the energy market and demonstrate the economic dispatch of DERs in response to market signals. The selection of standards-based communication technologies offers the ability of the system to be deployed and integrated with other utilities’ resources. With the use of a data historian technology to facilitate the aggregation, the developed algorithms and procedures can be verified, audited, and modified. The team has demonstrated monitoring and control of multiple DERs as outlined in phase I report including procedures to perform these operations in a secure and safe manner. In Phase II, additional DER units were added. We also expanded on our phase I work to enhance communication security and to develop the market model of having DERs, both customer and utility owned, participate in the energy market. We are proposing a two-part DER energy market model--a utility need business model and an independent energy aggregator-business model. The approach of developing two group models of DER energy participation in the market is unique. The Detroit Edison (DECo, Utility)-led team includes: DTE Energy Technologies (Dtech, DER provider), Electrical Distribution Design (EDD, Virginia Tech company supporting EPRI’s Distribution Engineering Workstation, DEW), Systems Integration Specialists Company (SISCO, economic scheduling and real-time protocol integrator), and OSIsoft (PI software system for managing real-time information). This team is focused on developing the application engineering, including software systems necessary for DER’s integration, control and sale into the market place. Phase II Highlights Installed and tested an ICCP link with SSL (security) between DECo, the utility, and DTE Energy Technologies (DTECH), the aggregator, making DER data available to the utility for both monitoring and control. Installed and tested PI process book with circuit & DER operational models for DECo SOC/ROC operator’s use for monitoring of both utility circuit and customer DER parameters. The PI Process Book models also included DER control for the DECo SOC/ROC operators, which was tested and demonstrated control. The DER Tagging and Operating Procedures were developed, which allowed that control to be done in a safe manner, were modified for required MOC/MISO notification procedures. The Distribution Engineering Workstation (DEW) was modified to include temperature normalized load research statistics, using a 30 hour day-ahead weather feed. This allowed day-ahead forecasting of the customer load profile and the entire circuit to determine overload and low voltage problems. This forecast at the point of common coupling was passed to DTech DR SOC for use in their economic dispatch algorithm. Standard Work Instructions were developed for DER notification, sale, and operation into the MISO market. A software mechanism consisting of a suite of new and revised functionality was developed that integrated with the local ISO such that offers can be made electronically without human intervention. A suite of software was developed by DR SOC enabling DER usage in real time and day-ahead: Generation information file exchange with PI and the utility power flow A utility day-ahead information file Energy Offer Web Service Market Result Web Service Real-Time Meter Data Web Service Real-Time Notification Web Service Registered over 20 DER with MISO in Demand Response Market and demonstrated electronic sale to MISO.« less
Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad
2008-10-01
The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...
76 FR 30326 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...
Transportation Energy Security and Climate Change Mitigation Act of 2007
DOT National Transportation Integrated Search
2008-09-29
The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...
2016-10-28
assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy
17 CFR 229.1201 - (Item 1201) General instructions to oil and gas industry-specific disclosures.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K... geothermal steam or water, need not include such disclosure. (b) To the extent that Items 1202 through 1208...
17 CFR 229.1201 - (Item 1201) General instructions to oil and gas industry-specific disclosures.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K... geothermal steam or water, need not include such disclosure. (b) To the extent that Items 1202 through 1208...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-20
...Where appropriate, the U.S. Department of Energy (DOE) has proposed to amend its test procedures for residential dishwashers, dehumidifiers, and conventional cooking products (which includes cooktops, ovens, and ranges) to include provisions for measuring standby mode and off mode energy consumption, as required by the Energy Independence and Security Act of 2007 (EISA 2007). These test procedure amendments would incorporate by reference certain provisions of the International Electrotechnical Commission (IEC) Standard 62301, ``Household electrical appliances--Measurement of standby power.'' Since publication of DOE's initial proposal in December 2010, the IEC has replaced the First Edition of this standard with the current Second Edition. This supplemental notice of proposed rulemaking proposes to incorporate the latest edition of IEC Standard 62301.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
Code of Federal Regulations, 2010 CFR
2010-01-01
... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...
Cyber Security Audit and Attack Detection Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dale
2012-05-31
This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.
Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use
NASA Astrophysics Data System (ADS)
National Research Council
2011-11-01
The U.S. Congress directed the U.S. Department of the Treasury to arrange for a review by the National Academy of Sciences to define and evaluate the health, environmental, security, and infrastructural external costs and benefits associated with the production and consumption of energy--costs and benefits that are not or may not be fully incorporated into the market price of energy, into the federal tax or fee, or into other applicable revenue measures related to production and consumption of energy. In response, the National Research Council established the Committee on Health, Environmental, and Other External Costs and Benefits of Energy Production and Consumption, which prepared the report summarized in this chapter. The report estimates dollar values for several major components of these costs. The damages the committee was able to quantify were an estimated $120 billion in the U.S. in 2005, a number that reflects primarily health damages from air pollution associated with electricity generation and motor vehicle transportation. The figure does not include damages from climate change, harm to ecosystems, effects of some air pollutants such as mercury, and risks to national security, which the report examines but does not monetize.
78 FR 40131 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-03
... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
77 FR 35366 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
A Food in Health Security (FIHS) platform in the Asia-Pacific Region: the way forward.
Wahlqvist, Mark L; Keatinge, John Donough H; Butler, Colin D; Friel, Sharon; McKay, John; Easdown, Warwick; Kuo, Ken N; Huang, Ching-jang; Pan, Wen-Harn; Yang, Ray-Yu; Lee, Meei-Shyuan; Chang, Hsing-Yi; Chiu, Ya-Wen; Jaron, Dov; Krawinkel, Michael; Barlow, Snow; Walsh, Greg; Chiang, Tung-liang; Huang, Po-Chao; Li, Duo
2009-01-01
The advent of multiple global crises, especially those of climate change, economics, energy, water, food and health evident in 2008, is of considerable moment to those who are suffering their consequences and for those with responsibility and interest in the systems affected. A coalition of parties in the Asia Pacific Region who work in the food and health systems met in August, 2009 in Taiwan and instigated a Food in Health Security (FIHS) Network which might join with other like-minded networks in and beyond the region. Sustainable health has many dimensions, among which food and nutrition is often neglected; there is a wide spectrum of nutritionally-related disorders. Malnutrition remains the global concern for agricultural research and development scientists and linkage with the health sector is key to progress. The disconnect between agricultural and health sectors negatively impacts consumer nutrition and health. Ethical and equity affect food and health systems. Food and health security is attainable only when the underlying social inequities are addressed; it is an ethical issue as reflected in the UN Universal declaration of Human Rights which includes the right to food for health and well-being. Food and health security are part of the larger security agenda and merit corresponding attention. Policy recommendations with immediacy are greater investment in combined food and health research; an Asia Pacific security agenda which emphasizes planetary, human, health and food security as relevant to traditional defence security; and community and household security measures which include maternal literacy, communication technology and entrepreneurial opportunity.
Basic Science for a Secure Energy Future
NASA Astrophysics Data System (ADS)
Horton, Linda
2010-03-01
Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-05-16
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-01-01
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841
NASA Astrophysics Data System (ADS)
Zhang, Q.; Song, W.; Yang, J.
2017-12-01
Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy will ameliorate the ecological environment, on the contrary, high-intensity human activities will make it tends to deteriorate. This research would provide scientific guidance and suggestions for the ecological environment protection and sustainable development of Xinjiang.
10 CFR 824.9 - Hearing Counsel.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...
10 CFR 824.9 - Hearing Counsel.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage - 2004
2005-04-01
Administration ( DTSA ) • Department of Energy (DOE) • Department of Justice (DOJ) • Department of State, including the Bureau of Intelligence and...Threat Reduction Agency DTSA Defense Technology Security Administration EAR Export Administration Regulations 18 EEA Economic Espionage Act of 1996
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
10 CFR 1.46 - Office of Nuclear Security and Incident Response.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...
Assurance of energy efficiency and data security for ECG transmission in BASNs.
Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa
2012-04-01
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halbgewachs, Ronald D.; Chavez, Adrian R.
Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
Instrumentation, Control, and Intelligent Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-09-01
Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cizewski, J.A., E-mail: cizewski@rutgers.edu
The Stewardship Science Academic Alliances (SSAA) were inaugurated in 2002 by the National Nuclear Security Administration of the U. S. Department of Energy. The purpose is to enhance connections between NNSA laboratories and the activities of university scientists and their students in research areas important to NNSA, including low-energy nuclear science. This paper highlights some of the ways that the SSAA fosters education and training of graduate students and postdoctoral scholars in low-energy nuclear science, preparing them for careers in fundamental and applied research and development.
NASA Astrophysics Data System (ADS)
Dayananda, Karanam Ravichandran; Straub, Jeremy
2017-05-01
This paper proposes a new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches. It uses a mobile data collector (MDC) to collect information in order to save energy of sensor nodes in a wireless sensor network (WSN) as, in most networks, these sensor nodes have limited energy. Wireless sensor networks are prone to security problems because, among other things, it is possible to use a rogue sensor node to eavesdrop on or alter the information being transmitted. To prevent this, this paper introduces a security algorithm for MDC-based WSNs. A key use of this algorithm is to protect the confidentiality of the information sent by the sensor nodes. The sensor nodes are deployed in a random fashion and form group structures called clusters. Each cluster has a cluster head. The cluster head collects data from the other nodes using the time-division multiple access protocol. The sensor nodes send their data to the cluster head for transmission to the base station node for further processing. The MDC acts as an intermediate node between the cluster head and base station. The MDC, using its dynamic acyclic graph path, collects the data from the cluster head and sends it to base station. This approach is useful for applications including warfighting, intelligent building and medicine. To assess the proposed system, the paper presents a comparison of its performance with other approaches and algorithms that can be used for similar purposes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, K.; Markel, T.; Simpson, M.
The U.S. Army's Fort Carson installation was selected to serve as a prototype for net zero energy assessment and planning. NREL performed the comprehensive assessment to appraise the potential of Fort Carson to achieve net zero energy status through energy efficiency, renewable energy, and electric vehicle integration. This report summarizes the results of the assessment and provides energy recommendations. This study is part of a larger cross-laboratory effort that also includes an assessment of renewable opportunities at seven other DoD Front Range installations, a microgrid design for Fort Carson critical loads and an assessment of regulatory and market-based barriers tomore » a regional secure smart grid.« less
NASA Astrophysics Data System (ADS)
Lim, Shinling
In an effort to keep America's addiction to oil under control, federal and state governments have implemented a variety of policy measures including those that determine the composition of motor gasoline sold at the pump. Biofuel blending mandates known as Renewable Fuel Standards (RFS) are designed to reduce the amount of foreign crude oil needed to be imported as well as to boost the local ethanol and corn industry. Yet beyond looking at changes in gasoline prices associated with increased ethanol production, there have been no empirical studies that examine effects of state-level RFS implementation on gasoline consumption. I estimate a Generalized Least Squares model for the gasoline demand for the 1993 to 2010 period with state and time fixed effects controlling for RFS. States with active RFS are Minnesota, Hawaii, Missouri, Florida, Washington, and Oregon. I find that, despite the onset of federal biofuel mandates across states in 2007 and the lower energy content of blended gasoline, being in a state that has implemented RFS is associated with 1.5% decrease in gasoline consumption (including blended gasoline). This is encouraging evidence for efforts to lessen dependence on gasoline and has positive implications for energy security.
Frankel, Leslie A.; Hughes, Sheryl O.; O'Connor, Teresia M.; Power, Thomas G.; Fisher, Jennifer O.; Hazen, Nancy L.
2012-01-01
The following article examines the role of parents in the development of children's self-regulation of energy intake. Various paths of parental influence are offered based on the literature on parental influences on children's emotion self-regulation. The parental paths include modeling, responses to children's behavior, assistance in helping children self-regulate, and motivating children through rewards and punishments. Additionally, sources of variation in parental influences on regulation are examined, including parenting style, child temperament, and child-parent attachment security. Parallels in the nature of parents' role in socializing children's regulation of emotions and energy intake are examined. Implications for future research are discussed. PMID:22545206
10 CFR 706.12 - Administrative Law Judges.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...
10 CFR 706.12 - Administrative Law Judges.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...
10 CFR 706.12 - Administrative Law Judges.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...
10 CFR 706.12 - Administrative Law Judges.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...
10 CFR 706.12 - Administrative Law Judges.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...
The Energy and Security Nexus: A Strategic Dilemma
2011-07-15
substantial natural gas reserves which can be exploited if we solve problems associated with hydraulic fracturing and competition over water. Other parts of...between energy, water, and security. Sometimes water is diverted to produce energy as in the case of hydropower, hydraulic fracturing , irrigation of
77 FR 65602 - Chimera Energy Corporation; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Chimera Energy Corporation; Order of... lack of current and accurate information concerning the securities of Chimera Energy Corporation (``Chimera'') because of questions regarding the accuracy of statements by Chimera in press releases to...
Conservation: Toward firmer ground
NASA Technical Reports Server (NTRS)
1975-01-01
The following aspects of energy conservation were discussed: conservation history and goals, conservation modes, conservation accounting-criteria, and a method to overcome obstacles. The conservation modes tested fall into one of the following categories: reduced energy consumption, increased efficiency of energy utilization, or substitution of one or more forms of energy for another which is in shorter supply or in some sense thought to be of more value. The conservation accounting criteria include net energy reduction, economic, and technical criteria. A method to overcome obstacles includes (approaches such as: direct personal impact (life style, income, security, aspiration), an element of crisis, large scale involvement of environmental, safety, and health issues, connections to big government, big business, big politics, involvement of known and speculative science and technology, appeal to moral and ethical standards, the transient nature of opportunities to correct the system.
Evaluating knowledge benefits of automotive lightweighting materials R&D projects.
Peretz, Jean H; Das, Sujit; Tonn, Bruce E
2009-08-01
This paper presents a set of metrics used to evaluate short-run knowledge benefits that accrued from research and development (R&D) projects funded in fiscal years 2000-2004 by automotive lightweighting materials (ALM) of the U.S. Department of Energy (DOE). Although DOE presents to Congress energy, environmental, and security benefits and costs of its R&D efforts under the Government Performance and Results Act, DOE has yet to include knowledge benefits in that report [U.S. Department of Energy. (2007). Projected benefits of federal energy efficiency and renewable energy programs: FY2008 budget request. NREL/TP-640-41347 (March). Washington, DC: National Renewable Energy Laboratory for DOE Energy Efficiency and Renewable Energy. Retrieved February 12, 2007 from http://www1.eere.energy.gov/ba/pba/2008_benefits.html]. ALM focuses on development and validation of advanced technologies that significantly reduce automotive vehicle body and chassis weight without compromising other attributes such as safety, performance, recyclability, and cost [U.S. Department of Energy. (2005a). Automotive lightweighting materials 2004 annual progress report. Washington, DC: DOE Energy Efficiency and Renewable Energy. Retrieved March 30, 2005 from http://www.eere.energy.gov/vehiclesandfuels/resources/fcvt_alm_fy04.shtml]. The ultimate goal of ALM to have lightweighter materials in vehicles hinges on many issues, including the (1) collaborative nature of ALMs R&D with the automobile industry and (2) manufacturing knowledge gained through the R&D effort. The ALM projects evaluated in this paper yielded numerous knowledge benefits in the short run. While these knowledge benefits are impressive, there remains uncertainty about whether the research will lead to incorporation of lightweight materials by the Big Three automakers into their manufacturing process and introduction of lightweight vehicles into the marketplace. The uncertainty illustrates a difference between (1) knowledge benefits and (2) energy, environmental, and security benefits emanating from R&D.
Neutron Imaging Developments at LANSCE
NASA Astrophysics Data System (ADS)
Nelson, Ron; Hunter, James; Schirato, Richard; Vogel, Sven; Swift, Alicia; Ickes, Tim; Ward, Bill; Losko, Adrian; Tremsin, Anton
2015-10-01
Neutron imaging is complementary to x-ray imaging because of its sensitivity to light elements and greater penetration of high-Z materials. Energy-resolved neutron imaging can provide contrast enhancements for elements and isotopes due to the variations with energy in scattering cross sections due to nuclear resonances. These cross section differences exist due to compound nuclear resonances that are characteristic of each element and isotope, as well as broader resonances at higher energies. In addition, multi-probe imaging, such as combined photon and neutron imaging, is a powerful tool for discerning properties and features in materials that cannot be observed with a single probe. Recently, we have demonstrated neutron imaging, both radiography and computed tomography, using the moderated (Lujan Center) and high-energy (WNR facility) neutron sources at LANSCE. Flat panel x-ray detectors with suitable scintillator-converter screens provide good sensitivity for both low and high neutron energies. Micro-Channel-Plate detectors and iCCD scintillator camera systems that provide the fast time gating needed for energy-resolved imaging have been demonstrated as well. Examples of recent work will be shown including fluid flow in plants and imaging through dense thick objects. This work is funded by the US Department of Energy, National Nuclear Security Administration, and performed by Los Alamos National Security LLC under Contract DE-AC52-06NA25396.
Modelling impacts of second generation bioenergy production on Ecosystem Services in Europe
NASA Astrophysics Data System (ADS)
Henner, D. N.; Smith, P.; Davies, C.; McNamara, N. P.
2016-12-01
Bioenergy crops are an important source of renewable energy and likely to play a major role in transitioning to a lower CO2 energy system. There is, however, uncertainty about the impacts of the growth of bioenergy crops on broader sustainability encompassed by ecosystem services, further enhanced by ongoing climate change. The goal of this project is to develop a comprehensive model that covers ecosystem services at a continental scale including biodiversity and pollination, water and air security, erosion control and soil security, GHG emissions, soil C and cultural services like tourism value. The technical distribution potential and likely yield of second generation energy crops, such as Miscanthus, Short Rotation Coppice (SRC; willow and poplar) was modelled using ECOSSE, DayCent, SalixFor and MiscanFor models. In addition, methods like water footprint tools, tourism value maps and ecosystem valuation tools and models are utilised. We will present results for synergies and trade-offs between land use change and ecosystem services, impact on food security and land management. Further, we will show modelled yield maps for different cultivars of Miscanthus, willow and poplar in Europe and constraint/opportunity maps based on projected yield and other factors e.g. total economic value, technical potential, current land use, climate change and trade-offs and synergies. It will be essential to include multiple ecosystem services when assessing the potential for bioenergy production/expansion that does not impact other land uses or provisioning services. Considering that the soil GHG balance is dominated by change in soil organic carbon (SOC) and the difference among Miscanthus and SRC is largely determined by yield, an important target for management of perennial energy crops is to achieve the best possible yield using the most appropriate energy crop and cultivar for the local situation. This research could inform future policy decisions on bioenergy crops in Europe.
76 FR 30325 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
..., 2011. For the Department of Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for [[Page 30326
NASA Astrophysics Data System (ADS)
Salloum, Ahmed
Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models. Various scenarios were investigated to capture and compare between the impacts of base-case and post-contingency relaxations on real-time system performance, including the presence of both relaxations simultaneously. The effect of penalty prices on the number and magnitude of relaxations was investigated as well.
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
An evaluation of the NASA Tech House, including live-in test results, volume 1
NASA Technical Reports Server (NTRS)
Abbott, I. H. A.; Hopping, K. A.; Hypes, W. D.
1979-01-01
The NASA Tech House was designed and constructed at the NASA Langley Research Center, Hampton, Virginia, to demonstrate and evaluate new technology potentially applicable for conservation of energy and resources and for improvements in safety and security in a single-family residence. All technology items, including solar-energy systems and a waste-water-reuse system, were evaluated under actual living conditions for a 1 year period with a family of four living in the house in their normal lifestyle. Results are presented which show overall savings in energy and resources compared with requirements for a defined similar conventional house under the same conditions. General operational experience and performance data are also included for all the various items and systems of technology incorporated into the house design.
advanced lean burn vehicles. Fleets that use fuel blends containing at least 20% biodiesel (B20) may earn Energy Independence and Security Act of 2007, including fleet management plan requirements (Section 142 infrastructure installation requirements (Section 246). For more information, see the Federal Fleet Management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evelo, Stacie
This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2015, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61.
7 CFR 273.9 - Income and deductions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security benefits; strike benefits; foster care payments for children or adults who are considered members..., as specified in § 273.11(k), shall be included as income. (ii) Child support payments received by...: (A) Medical assistance; (B) Child care assistance; (C) Energy assistance as defined in paragraph (c...
Test and Evaluation of Architecture-Aware Compiler Environment
2011-11-01
biology, medicine, social sciences , and security applications. Challenges include extremely large graphs (the Facebook friend network has over...Operations with Temporal Binning ....................................................................... 32 4.12 Memory behavior and Energy per...five challenge problems empirically, exploring their scaling properties, computation and datatype needs, memory behavior , and temporal behavior
Safety and Security Interface Technology Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...
10 CFR 1046.12 - Physical fitness training program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...
10 CFR 1046.12 - Physical fitness training program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...
Science Programs Applied Energy Programs Civilian Nuclear Energy Programs Laboratory Directed Research Energy United States of America National Nuclear Security Administration Visit Blogger Join Us on key role in national security and nuclear deterrence in an increasingly dangerous and unstable world
Department of Energy: Nuclear S&T workforce development programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Michelle; Bala, Marsha; Beierschmitt, Kelly
The U.S. Department of Energy (DOE) national laboratories use their expertise in nuclear science and technology (S&T) to support a robust national nuclear S&T enterprise from the ground up. Traditional academic programs do not provide all the elements necessary to develop this expertise, so the DOE has initiated a number of supplemental programs to develop and support the nuclear S&T workforce pipeline. This document catalogs existing workforce development programs that are supported by a number of DOE offices (such as the Offices of Nuclear Energy, Science, Energy Efficiency, and Environmental Management), and by the National Nuclear Security Administration (NNSA) andmore » the Naval Reactor Program. Workforce development programs in nuclear S&T administered through the Department of Homeland Security, the Nuclear Regulatory Commission, and the Department of Defense are also included. The information about these programs, which is cataloged below, is drawn from the program websites. Some programs, such as the Minority Serving Institutes Partnership Programs (MSIPPs) are available through more than one DOE office, so they appear in more than one section of this document.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lawton, Craig R.; Welch, Kimberly M.; Kerper, Jessica
2010-06-01
The Department of Defense's (DoD) Energy Posture identified dependence of the US Military on fossil fuel energy as a key issue facing the military. Inefficient energy consumption leads to increased costs, effects operational performance and warfighter protection through large and vulnerable logistics support infrastructures. Military's use of energy is a critical national security problem. DoD's proposed metrics Fully Burdened Cost of Fuel and Energy Efficiency Key Performance Parameter (FBCF and Energy KPP) are a positive step to force energy use accountability onto Military programs. The ability to measure impacts of sustainment are required to fully measure Energy KPP. Sandia's workmore » with Army demonstrates the capability to measure performance which includes energy constraint.« less
Ecological Monitoring and Compliance Program 2015 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Ostler, W. Kent; Anderson, David C.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2015. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2015, all applicable laws, regulations, andmore » permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2013 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Anderson, David C.; Greger, Paul D.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2013. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2013, allmore » applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2011 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, D. J.; Anderson, D. C.; Hall, D. B.
The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, monitors the ecosystem of the Nevada National Security Site and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program's activities conducted by National Security Technologies, LLC, during calendar year 2011. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test and Evaluation Complex. Duringmore » 2011, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2016 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek; Perry, Jeanette; Ostler, W. Kent
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2016. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2016, all applicable laws, regulations, andmore » permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory, Louis
2014-12-02
This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annualmore » summaries for FY 2014.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krenzien, Susan; Marutzky, Sam
This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and correctivemore » action tracking was instituted.« less
A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
Energy Relations in Russia: Administration, Politics and Security
ERIC Educational Resources Information Center
Makarychev, Andrey
2005-01-01
This chapter analyses energy relations through a prism of three interlinked concepts: administration, politics and security. This triad describes the basic approaches to questions about technical, politicised and securitised energy. These three concepts are logically linked to one another and represent an elementary matrix; a prism through which…
10 CFR 824.1 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Purpose and scope. 824.1 Section 824.1 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... Act relating to the security or safeguarding of Restricted Data or other classified information, shall...
10 CFR 824.5 - Investigations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...
10 CFR 824.5 - Investigations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...
77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
... DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Amended Record of Decision. SUMMARY: The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) is...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...
78 FR 8682 - Americas Energy Company-AECo; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Americas Energy Company--AECo; Order of... lack of current and accurate information concerning the securities of Americas Energy Company-AECo (``Americas'') because Americas has not filed any periodic reports since the period ended September 30, 2011...
American perspectives on security : energy, environment, nuclear weapons, and terrorism : 2010.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.
2011-03-01
We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findingsmore » from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pfaltzgraff, Robert L
2006-10-22
This conference's focus was the peaceful uses of the atom and their implications for nuclear science, energy security, nuclear medicine and national security. The conference also provided the setting for the presentation of the prestigious Enrico Fermi Prize, a Presidential Award which recognizes the contributions of distinguished members of the scientific community for a lifetime of exceptional achievement in the science and technology of nuclear, atomic, molecular, and particle interactions and effects. An impressive group of distinguished speakers addressed various issues that included: the impact and legacy of the Eisenhower Administrationâs âAtoms for Peaceâ concept, the current and future rolemore » of nuclear power as an energy source, the challenges of controlling and accounting for existing fissile material, and the horizons of discovery for particle or high-energy physics. The basic goal of the conference was to examine what has been accomplished over the past fifty years as well as to peer into the future to gain insights into what may occur in the fields of nuclear energy, nuclear science, nuclear medicine, and the control of nuclear materials.« less
Hydrogen Production from Nuclear Energy
NASA Astrophysics Data System (ADS)
Walters, Leon; Wade, Dave
2003-07-01
During the past decade the interest in hydrogen as transportation fuel has greatly escalated. This heighten interest is partly related to concerns surrounding local and regional air pollution from the combustion of fossil fuels along with carbon dioxide emissions adding to the enhanced greenhouse effect. More recently there has been a great sensitivity to the vulnerability of our oil supply. Thus, energy security and environmental concerns have driven the interest in hydrogen as the clean and secure alternative to fossil fuels. Remarkable advances in fuel-cell technology have made hydrogen fueled transportation a near-term possibility. However, copious quantities of hydrogen must be generated in a manner independent of fossil fuels if environmental benefits and energy security are to be achieved. The renewable technologies, wind, solar, and geothermal, although important contributors, simply do not comprise the energy density required to deliver enough hydrogen to displace much of the fossil transportation fuels. Nuclear energy is the only primary energy source that can generate enough hydrogen in an energy secure and environmentally benign fashion. Methods of production of hydrogen from nuclear energy, the relative cost of hydrogen, and possible transition schemes to a nuclear-hydrogen economy will be presented.
Neutron and Gamma Imaging for National Security Applications
NASA Astrophysics Data System (ADS)
Hornback, Donald
2017-09-01
The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.
NASA Astrophysics Data System (ADS)
Moran, E. H.; Tindall, J. A.; Campbell, A. A.
2010-12-01
ABSTRACT Energy and water security and sustainability have become a national and global priority. The continued security and economic health of any country depends on a sustainable supply of both energy and water because these two critical natural resources are inexorably linked. The production of energy requires large volumes of water while the treatment and distribution of water is equally dependent upon readily available, low-cost energy. In the U.S. and other countries, irrigated agriculture and thermoelectric generation withdrawals of fresh water are approximately equal however; they are growing due to increasing population. Within the U.S. electricity production requires about 190,000 million gallons of freshwater per day, accounting for over 40 percent of all daily freshwater withdrawals in the U.S. The indirect use of water (home lighting and electric appliances) is approximately equal to its direct use (watering lawns and taking showers). Current trends of water use and availability suggest that meeting future water and energy demands to support continued economic global development will require improved utilization and management of both energy and water resources. Primary concerns include: (1) Increasing populations require more food and energy; this may cause direct competition between the two largest water users for limited water resources (energy and agriculture); (2) Population growth and economic expansion projections indicate the U.S. alone will require an additional 393,000 MW of new generating capacity (equivalent to about 1,000 new 400 MW plants) by the year 2020 - other countries particularly India and China have similar trends; and (3) Potential environmental and ecological restrictions on the use of water for power generation such as the restrictions on cooling water withdrawals and cooling water use for nuclear power plants to protect aquatic species and habitat and the environment may reduce usable supplies. The U.S. and other Nation's abilities to meet the increasing demand for affordable water and energy are being seriously challenged by these emerging issues. This research presents potential solutions for security and sustainability of these systems, which are a pressing global priority.
Reconciling food security and bioenergy: priorities for action
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.
Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less
Reconciling food security and bioenergy: priorities for action
Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.; ...
2016-06-14
Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less
Why food in health security (FIHS)?
Wahlqvist, Mark L
2009-01-01
Health is intrinsic to human security (HumS) although it is somewhat anthropocentric and about our own psychosocial and biomedical status more than various external threats. The 1994 United Nations Development Program definition of HumS includes economic, food, environmental, personal, community and political security with freedom from fear and want. Environmental factors are critical for health security (HealS), especially with widespread socio-economic difficulty, and health systems less affordable or accessible. The nexus between nutritionally-related disorders and infectious disease is the most pervasive world health problem. Most if not all of the Millennium Development Goals are food-linked. Maternal nutrition has life-long health effects on the yet-to-be born child. The mix of essential nutrient deprivation and energy imbalance is rife across many societies. Food systems require deeper understanding and governance to overcome these food-related health risks which are matters of food security (FoodS). Nutritionally-related Disability Adjusted Life Years (DALYS) are improving markedly in many parts of the world, along with poverty and hunger reduction and health system advances. But recent economic, energy, food, water, climate change and health crises along with conflict are limiting. It is time for international and regional understanding of how households and communities can collectively manage these threats in affordable and sustainable ways. There is untapped problem-solving capacity at the international local level if supported by combined food--health systems expertise, innovation, infrastructure and governance. Principles of equity and ethics must apply. The Food in Health Security (FIHS) roundtable aims to develop a Network to facilitate this process.
15 CFR 700.20 - Use of priority ratings.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities for Energy Programs § 700.20 Use of... maintenance of energy facilities. ...
Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
Tsoukalas, Lefteri
2018-01-24
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.
Food security, selection, and healthy eating in a Pacific Community in Auckland New Zealand.
Rush, Elaine; Puniani, Naita; Snowling, Neil; Paterson, Janis
2007-01-01
When an infant is brought home to the family, it is often a time of emotional, economic and physical stress due to the extra demands placed on parents. Household food security means "access at all times to enough and nutritionally appropriate food to provide the energy and nutrients needed to maintain an active and healthy life". Questions about food security were asked of 1376 Pacific Island mothers (as part of the Pacific Island Family Study) approximately six weeks after the birth of their baby. Due to lack of money food sometimes ran out in 39.8% of households and in a further 3.8% food often ran out. Variety of foods was limited by lack of money in 39.3%. Foods that were still bought when money was limited included bread (97%), milk (95%), meat and chicken (91%), vegetables and fruit (83%), rice or pasta (82%), breakfast cereals (69%), fish or shellfish (50%) and biscuits or chips (44%). Alcohol (1%), soft drinks (11%), ice cream (12%) and fruit juice (21%) were the least often bought. Energy density (MJ/kg) and nutrient-density of typical foods limited by lack of money were analysed. Rice, bread and fatty meats provided the most calories per dollar and fruit and vegetables the least. The best protein-value for money was from minced beef, chicken and tinned tuna and the most fibre-rich foods included baked beans and mixed vegetables. Food security is a major problem for Pacific families. The environment of food availability, choice and cost requires attention to help close the health gap.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wong, Amy S.; Powell, Kimberly S.
Los Alamos National Laboratory's newest facility, the Radiological Laboratory Utility Office Building (RLUOB), is also its first to achieve both the Leadership in Energy and Environmental Design (LEED) status and LEED Gold certification from the U.S. Green Building Council (USGBC). From its robust design to its advanced scientific equipment, RLUOB is essential to the Laboratory's national security mission in support of the National Nuclear Security Administration's (NNSA) nuclear weapons program. At more than 200,000 square feet, this building is the only radiological facility within the Department of Energy to have attained LEED Gold, which contributes to NNSA's achievement towards themore » high performance sustainable building goals outlined in Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance. 'As we celebrate RLUOB being completed almost one year ahead of schedule and having achieved LEED certification at the Gold level, we approach our plutonium mission at Los Alamos and NNSA with a great sense of achievement,' said Don Cook, NNSA's deputy administrator for defense programs. 'RLUOB adds a major component to NNSA's plutonium support capability and RLUOB demonstrates our commitment in helping to deliver President Obama's nuclear security agenda which includes ensuring the safety, security and effectiveness of the nuclear deterrent without testing.' The facility contains laboratories for analytical chemistry and materials characterization of special nuclear material, along with space for offices, training and emergency operations. Its multi-functional purpose makes RLUOB a unique project for which LEED certification was sought. 'LEED certification was a huge goal and one we sought from the very beginning of this project,' said Laboratory Director Charlie McMillan. 'It's an important step forward, allowing us to advance national security science in modern, safer, more efficient infrastructure.' The Laboratory's project team and its contractor partners, especially in coordination with Jacobs Engineering, focused on green design and construction in LEED categories, such as sustainable sites, water efficiency, energy and atmosphere, materials and resources, indoor environmental quality and innovation in design. RLUOB's features include: (1) Building envelope design (orientation, materials and insulation) yielded a 20 percent improvement in energy performance; (2) Incorporation of building materials with 24 percent recycled content; (3) Diversion of 72 percent of construction-generated materials through reuse, recycle and salvage; (4) Roofing comprised of 93 percent highly-reflective materials to reduce heat island effects; (5) High efficiency, gas-fired hot water boilers, air-cooled chillers, thermal storage systems and variable frequency drives for compressors, fans and pumps; (6) Energy efficient lighting for interiors, exteriors, process glove boxes and fume hoods; (7) Water efficient fixtures resulting in 30 percent reduction in usage; (8) Low emission paints and carpeting for improved indoor air quality; (9) Landscaping that doesn't require permanent irrigation; (10) Enhanced building system commissioning; and (11) Comprehensive transportation alternatives, including public transportation, bicycle storage and changing rooms, and a refueling station for government vehicles using alternative fuels. 'RLUOB's LEED certification demonstrates tremendous leadership in green building,' says Rick Fedrizzi, president and CEO of USGBC. 'The urgency of our mission has challenged the industry to move faster and reach further than ever before, and RLUOB serves as a prime example of just how much we can accomplish.'« less
10 CFR 25.17 - Approval for processing applicants for access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Approval for processing applicants for access... Authorizations § 25.17 Approval for processing applicants for access authorization. (a) Access authorizations... request by a letter that includes the name, Social Security number and level of access authorization. (c...
18 CFR 367.1240 - Account 124, Other investments.
Code of Federal Regulations, 2011 CFR
2011-04-01
... investments. 367.1240 Section 367.1240 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... ACT Balance Sheet Chart of Accounts Other Property and Investments § 367.1240 Account 124, Other investments. (a) This account must include the book cost of investments in securities issued or assumed by non...
Outdoor Testing Areas | Energy Systems Integration Facility | NREL
of engineers running tests on plug-in hybrid electric vehicles at the Medium-Voltage Outdoor Test large microgrids hub, located in the outdoor low-voltage test yard, includes underground trench access pits for full enclosure of rotating machinery under test. Key Infrastructure Secured underground pits
Code of Federal Regulations, 2010 CFR
2010-10-01
... Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND.... Financial incentives for timely mission accomplishment or cost effectiveness shall never compromise or..., undue risk to the common defense and security. In addition, this category includes performance failures...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND.... Financial incentives for timely mission accomplishment or cost effectiveness shall never compromise or..., undue risk to the common defense and security. In addition, this category includes performance failures...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND.... Financial incentives for timely mission accomplishment or cost effectiveness shall never compromise or..., undue risk to the common defense and security. In addition, this category includes performance failures...
10 CFR 440.22 - Eligible dwelling units.
Code of Federal Regulations, 2011 CFR
2011-01-01
... been completed on a dwelling containing a unit occupied by an eligible household, the tenants in that unit (including households paying for their energy through their rent) will not be subjected to rent... accordance with this section. (c) In order to secure the Federal investment made under this part and address...
Sorghum production and anthracnose disease management in future global energy and food security
USDA-ARS?s Scientific Manuscript database
Sorghum is the fifth most important cereal crop in world commerce with uses ranging from animal feed, food, in brewery, and recently as a potential source of biofuel. With the expected increase in the world's population, crop production outputs must be increased. Annual cereal production, including...
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
Development of a food security measurement tool for New Zealand households.
Parnell, Winsome R; Gray, Andrew R
2014-10-28
To determine the prevalence of household food insecurity in New Zealand (NZ), eight food security statements were included in the 1997 National Nutrition Survey of adults. Rasch model analysis was performed to determine whether each food security statement (addressing a food security attribute) was discrete and could be ranked on a unidimensional scale. The NZ model had marginal 'household' reliability (0·60-0·66), good item separation (17·20-17·77) and item infit/outfit values between 0·8 and 1·25. Indices could be ranked by level of severity and represent the experience of household food insecurity in NZ. Categories of food security were assigned and used to predict food choice, and energy and nutrient intakes. Compared with fully secure/almost fully secure households, those that were moderately secure or of low security were less likely to consume the recommended daily servings of fruit and vegetables, and more likely to consume fatty meats. Intake of total fat, saturated, monounsaturated and polyunsaturated fat, cholesterol, lactose and vitamin B12 increased with lower levels of food security. Intakes of glucose, fructose and vitamin C were highest in the fully secure/almost fully secure category. This unique eight-component food security measurement tool has less respondent burden than the US Core Food Security Measure. The relationships between the level of food insecurity and food choice and nutrient intakes illustrate that the most food-insecure households have less healthy diets. This relatively brief population-specific measurement tool is suitable to monitor population food security status, and is a useful marker of nutritional status.
Towards a Standard for Highly Secure SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlson, R.
1998-09-25
The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less
The climate change and energy security nexus
DOE Office of Scientific and Technical Information (OSTI.GOV)
King, Marcus Dubois; Gulledge, Jay
2013-01-01
The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategicmore » Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.« less
NASA Astrophysics Data System (ADS)
Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li
2018-06-01
X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.
Feigned Ignorance is Bliss: Chinese Energy Investments in Africa
2008-09-23
foreboding economic competitor on a massive scale. Among such are those in the U.S. who argue that China’s aggressive quest for oil jeopardizes U.S. energy...might offer a glimpse of this reality. According to Anne Korin, Co-Director of the Institute for the Analysis of Global Security, “I don’t think there...largest shareholder in a major consortium in Sudan called the Greater Nile Petroleum Operating Company, which includes as shareholders Petronas
Feasibility of Nuclear Power on U.S. Military Installations. 2nd Revision
2011-03-01
Small Modular Reactor , Military Installation Energy, Energy Assurance 16. SECURITY CLASSIFICATION OF: a. REPORT I b. ABSTRACT U c. THIS PAGE i; 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 98 19a. NAME OF RESPONSIBLE PERSON Knowledge Center/Rhea Stone 19b. TELEPHONE NUMBER (Include area code) 703-824-2110 Standard Form 298 (Rev. 8/98) Prescribed bv ANSI Sid 239.18 Contents Preliminary note: Development and commercial deployment of small modular reactors
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...
U.S. Energy Security -- The Campaign We Must Win
2009-03-23
population.2 Our industry, commerce, transportation and economic livelihood require the uninterrupted supply of energy. In all its forms, energy underpins...mitigate our vulnerability to unstable oil prices. Rising global demand and competition threatens our ability to secure long term economical access... economically while strengthening our enemies. This research paper addresses the effectiveness of U.S. energy policy and proposes a new approach that seeks to
Improving the Quality and Scope of EIA Data
2011-01-01
Section 805(a) of the Energy Independence and Security Act of 2007 (EISA), Public Law 110-1401 requires the U.S. Energy Information Administration (EIA) to establish a five-year plan to enhance the quality and scope of its data collection necessary to ensure that the scope, accuracy, and timeliness of the information needed for efficient functioning of energy markets and related financial operations. This report is in response to section 805(b) of EISA which calls on EIA to submit to Congress the plan established under subsection (a), including a description of any improvements needed to enhance the ability of the Administrator to collect and process energy information in a manner consistent with the needs of energy markets.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1980-01-01
The FY DOE budge totals $12.6 billion in budget authority and $11.1 billion in budget outlays. The budget authority being requested consists of $10.3 billion in new authority and a $2.3 billion reappropriation of expiring funds for the Strategic Petroleum Reserve. Areas covered in the Energy budget are: energy conservation; research, development, and applications; regulation and information; direct energy production; strategic energy production; and energy security reserve. Other areas include: general science, defense activities; departmental administration; and legislative proposal - spent fuel. Budget totals are compared for 1980 and 1981. A detailed discussion of the FY 1981 activities to bemore » undertaken to carry out these activities is provided. (MCW)« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jacobs, R
The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weinstabel, P.E.; Zech, W.
1982-01-01
The total annual demand for wood in Upper Volta is about 4.2 million cubic m solid wood, 94% of the population depends on wood for energy (compared with 84% in the Sahel states as a whole), and more than 30% of income in urban areas is spent on acquiring wood. Any policy aimed at securing adequate food supplies for the population must therefore be accompanied by a programme for safeguarding energy supplies. Measures which should be included in an integrated energy programme are presented and details are given of Upper Volta's forestry programme. 21 references.
Beyond Fossil Fuels: Options and Challenges
NASA Astrophysics Data System (ADS)
Thompson, Levi T.
2007-05-01
Securing our nationâÂÂs energy supply is arguably the most important challenge we face. The source and amount of energy that is available impacts nearly every aspect of our lives including our mobility, health and welfare. Presently, the U.S. depends heavily on foreign energy resources. For example, in 2006, nearly 60 percent of the crude oil consumed in the U.S. was imported; approximately one-quarter of this oil comes from the Persian Gulf. With growing demands from emerging economies, declining environmental quality and potential for global conflict, there is a pressing need to develop a more sustainable energy strategy. This presentation will review options for a sustainable energy economy including the use of hydrogen and fuel cells, and describe some of the key challenges To cite this abstract, use the following reference: http://meetings.aps.org/link/BAPS.2007.OSS07.A1.2
Detector response artefacts in spectral reconstruction
NASA Astrophysics Data System (ADS)
Olsen, Ulrik L.; Christensen, Erik D.; Khalil, Mohamad; Gu, Yun; Kehres, Jan
2017-09-01
Energy resolved detectors are gaining traction as a tool to achieve better material contrast. K-edge imaging and tomography is an example of a method with high potential that has evolved on the capabilities of photon counting energy dispersive detectors. Border security is also beginning to see instruments taking advantage of energy resolved detectors. The progress of the field is halted by the limitations of the detectors. The limitations include nonlinear response for both x-ray intensity and x-ray spectrum. In this work we investigate how the physical interactions in the energy dispersive detectors affect the quality of the reconstruction and how corrections restore the quality. We have modeled detector responses for the primary detrimental effects occurring in the detector; escape peaks, charge sharing/loss and pileup. The effect of the change in the measured spectra is evaluated based on the artefacts occurring in the reconstructed images. We also evaluate the effect of a correction algorithm for reducing these artefacts on experimental data acquired with a setup using Multix ME-100 V-2 line detector modules. The artefacts were seen to introduce 20% deviation in the reconstructed attenuation coefficient for the uncorrected detector. We performed tomography experiments on samples with various materials interesting for security applications and found the SSIM to increase > 5% below 60keV. Our work shows that effective corrections schemes are necessary for the accurate material classification in security application promised by the advent of high flux detectors for spectral tomography
Department of the Navy Transformation Plan FY 2014-2016
2014-01-01
SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our
78 FR 5438 - Proposed Agency Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-25
... DEPARTMENT OF ENERGY National Nuclear Security Administration Proposed Agency Information Collection AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Notice and... techniques or other forms of information technology. DATES: Comments regarding this proposed information...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duggan, R.A.; Jaeger, C.D.; Tolk, K.M.
1996-05-01
The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed inmore » this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.« less
10 CFR 1046.15 - Training and qualification for security skills and knowledge.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Training and qualification for security skills and... SECURITY INTERESTS Protective Force Personnel § 1046.15 Training and qualification for security skills and... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...
The European Union’s Energy Security Challenges
2007-01-26
NATO’s summit in Riga, Latvia in November 2006. Members of the Democratic Leadership in the 110th Congress have signaled their intention to introduce...cooperation through the development of international energy partnerships. Members of the Democratic Leadership in the 110th Congress have signaled their...surrounding global energy supply and demand persist, energy security issues are likely to gain importance in the 110th Congress. Members of the Democratic
Ecological Monitoring and Compliance Program 2010 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, D.J.; Anderson, D.C.; Hall, D.B.
The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2010. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test andmore » Evaluation Complex (NPTEC). During 2010, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2012 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Anderson, David C.; Greger, Paul D.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2012. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring ofmore » the Nonproliferation Test and Evaluation Complex (NPTEC). During 2012, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...
Town Hall with Secretary Moniz
Moniz, Ernest; Poneman, Daniel
2018-04-16
In a town hall meeting with Department staff, Energy Secretary Ernest Moniz spoke about his plans for a reorganization of the Energy Departmentâs management structure. The plans will help better achieve the Departmentâs key priorities and those of the President, including implementing the Presidentâs Climate Action Plan, âall of the aboveâ energy strategy and nuclear security agenda. After his remarks, Moniz, joined by Deputy Secretary Dan Poneman, took questions from the audience in the Forrestal Auditorium as well as email questions from other Department locations.
Jordaan, Sarah M; Diaz Anadon, Laura; Mielke, Erik; Schrag, Daniel P
2013-01-01
The Renewable Fuel Standard (RFS) is among the cornerstone policies created to increase U.S. energy independence by using biofuels. Although greenhouse gas emissions have played a role in shaping the RFS, water implications are less understood. We demonstrate a spatial, life cycle approach to estimate water consumption of transportation fuel scenarios, including a comparison to current water withdrawals and drought incidence by state. The water consumption and land footprint of six scenarios are compared to the RFS, including shale oil, coal-to-liquids, shale gas-to-liquids, corn ethanol, and cellulosic ethanol from switchgrass. The corn scenario is the most water and land intense option and is weighted toward drought-prone states. Fossil options and cellulosic ethanol require significantly less water and are weighted toward less drought-prone states. Coal-to-liquids is an exception, where water consumption is partially weighted toward drought-prone states. Results suggest that there may be considerable water and land impacts associated with meeting energy security goals through using only biofuels. Ultimately, water and land requirements may constrain energy security goals without careful planning, indicating that there is a need to better balance trade-offs. Our approach provides policymakers with a method to integrate federal policies with regional planning over various temporal and spatial scales.
ERIC Educational Resources Information Center
Noah, Philip D., Jr.
2013-01-01
The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…
Massive Open Online Courses for Africa by Africa
ERIC Educational Resources Information Center
Oyo, Benedict; Kalema, Billy Mathias
2014-01-01
Africa is known for inadequate access to all sorts of human needs including health, education, food, shelter, transport, security, and energy. Before the emergence of massive open online courses (MOOCs), open access to higher education (HE) was exclusive of Africa. However, as a generally affordable method of post-secondary education delivery,…
How Lean the Machine: How Agile the Mind?
ERIC Educational Resources Information Center
Atkinson, Simon Reay; Goodger, Amanda; Caldwell, Nicholas; Hossain, Liaquat
2012-01-01
Purpose: Competition for resources appears to be increasing at a time of political, security (including energy, food and climate) and economic change; leading to potential collapse. The purpose of this conceptual paper is to examine the impact of policies exercised at the macro level on methods and processes applied at the micro level through, for…
Sharkey, Joseph R; Nalty, Courtney; Johnson, Cassandra M; Dean, Wesley R
2012-02-20
Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican-origin children. Child-reported food insecurity situations could serve as a screen for nutrition problems in children. Further, the National School Lunch and School Breakfast Programs, which play a major beneficial role in children's weekday intakes, may not be enough to keep pace with the nutritional needs of low and very low food secure Mexican-origin children.
2012-01-01
Background Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Methods Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Results Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. Conclusions This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican-origin children. Child-reported food insecurity situations could serve as a screen for nutrition problems in children. Further, the National School Lunch and School Breakfast Programs, which play a major beneficial role in children's weekday intakes, may not be enough to keep pace with the nutritional needs of low and very low food secure Mexican-origin children. PMID:22348599
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)
2009-01-01
Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d
10 CFR 2.904 - Classification assistance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...
10 CFR 2.904 - Classification assistance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...
Post-Cold War Science and Technology at Los Alamos
NASA Astrophysics Data System (ADS)
Browne, John C.
2002-04-01
Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M
2017-09-04
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-09-28
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin
2016-01-01
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
American Security and the International Energy Situation. Volume 1. Introduction and Summary
1975-04-15
Financial Security 28 Timely Energy Supply Enhancement 31 Prospects for a Price Break M Concluding Remarks ’♦S II. World Energy Interdependence...likely to experience as the level of social and political chaos rises under the pressures of economic contraction, financial hemorrhage, and pervasive...and Consolidated Edison’s punned storage facility planned for Storm King). Often, energy projects are delayed from the very beginning by vocal
EU energy policies achievement by industries in decentralized areas
NASA Astrophysics Data System (ADS)
Destro, Nicola; Stoppato, Anna; Benato, Alberto; Schiro, Fabio
2017-11-01
Energy Roadmap outlined by the European Commission sets out several routes for a more sustainable, competitive and secure energy system in 2050. All the outlined scenarios consider energy efficiency, renewable energy, nuclear energy and carbon capture and storage. In this paper, more attention has been devoted to the energy efficiency issue, by the identification of new micro and small networks opportunity fed by hybrid plants in the North-East of Italy. National energy balance and national transmission system operator data allowed to collect industrial energy consumptions data on the investigated area. Applying industrial statistics to the local energy needs allows to collect a dataset including consumption information by factory and by company structure (size and employees) for each industrial sector highlighting the factory density in the area. Preliminary outcomes from the model address to the exploitation of local by-product for energy purposes.
Interconnection, Integration, and Interactive Impact Analysis of Microgrids and Distribution Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kang, Ning; Wang, Jianhui; Singh, Ravindra
2017-01-01
Distribution management systems (DMSs) are increasingly used by distribution system operators (DSOs) to manage the distribution grid and to monitor the status of both power imported from the transmission grid and power generated locally by a distributed energy resource (DER), to ensure that power flows and voltages along the feeders are maintained within designed limits and that appropriate measures are taken to guarantee service continuity and energy security. When microgrids are deployed and interconnected to the distribution grids, they will have an impact on the operation of the distribution grid. The challenge is to design this interconnection in such amore » way that it enhances the reliability and security of the distribution grid and the loads embedded in the microgrid, while providing economic benefits to all stakeholders, including the microgrid owner and operator and the distribution system operator.« less
Energy, Vacuum, Gas Fueling, and Security Systems for the Spherical Tokamak MEDUSA-CR
NASA Astrophysics Data System (ADS)
Gonzalez, Jeferson; Soto, Christian; Carvajal, Johan; Ribeiro, Celso
2013-10-01
The former spherical tokamak (ST) MEDUSA (Madison EDUcation Small Aspect.ratio tokamak, R < 0.14 m, a < 0.10 m, BT < 0.5 T, Ip < 40 kA, 3 ms pulse) is being recommissioned in Costa Rica Institute of Technology. The main objectives of the MEDUSA-CR project are training and to clarify several issues in relevant physics for conventional and mainly STs, including beta studies in bean-shaped ST plasmas, transport, heating and current drive via Alfvén wave, and natural divertor STs with ergodic magnetic limiter. We present here the energy, vacuum, gas fueling, and security systems for MEDUSA-CR device. The interface with the control and data acquisition systems based on National Instruments (NI) software (LabView) and hardware (on loan to our laboratory via NI-Costa Rica) are also presented. VIE-ITCR, IAEA-CRP contract 17592, National Instruments of Costa Rica.
P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-13
An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc., South Texas Oil Co., and Synova Healthcare Group, Inc... concerning the securities of Four Rivers BioEnergy, Inc. because it has not filed any periodic reports since...
Transportation's oil dependence and energy security in the 21st century
DOT National Transportation Integrated Search
1997-10-01
The persistent and in many parts of the world rapid motorization of transport is intensifying global dependence on petroleum. Transportation's global oil dependence poses real energy security risks for the first few decades of the 21st century, at le...
German Energy Security and Its Implications on Regional Security
2016-12-01
Daniel Moran THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this...280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public...independence.17 In the 1980s and 1990s, Esakova points out that energy security took a more economic form , with countries focusing on protecting their
NASA Astrophysics Data System (ADS)
Brown, C. E.
1995-12-01
The purpose of this report is to describe the research programs and program activities of the US Department of Energy (DOE) that most directly relate to topics in the field of environmental geology. In this light, the mission of the DOE and the definition of environmental geology will be discussed. In a broad sense, environmental geology is that branch of earth science that emphasizes the entire spectrum of human interactions with the physical environment that include environmental health, mineral exploration and exploitation, waste management, energy use and conservation, global change, environmental law, natural and man-made hazard assessment, and land-use planning. A large number of research, development, and demonstration programs are under DOE's administration and guidance that directly or indirectly relate to topics in environmental geology. The primary mission of the DOE is to contribute to the welfare of the nation by providing the scientific foundation, technology, policy, and institutional leadership necessary to achieve efficiency in energy use, diversity in energy sources, a more productive and competitive economy, improved environmental quality, and a secure national defense. The research and development funding effort has most recently been redirected toward greater utilization of clean fossil fuels, especially natural gas, weatherization, renewable energy, energy efficiency, fusion energy, and high-energy physics. This paper will summarize the role that environmental geology has played and will continue to play in the execution of DOE's mission and the energy options that DOE has investigated closely. The specific options are those that center around energy choices, such as alternative-fueled transportation, building technologies, energy-efficient lighting, and clean energy.
Summary results from the NASA Tech House one year live-in
NASA Technical Reports Server (NTRS)
Hamlet, I. L.
1979-01-01
The NASA Tech House was designed and constructed at the Langley Research Center, Hampton, Va., to demonstrate and evaluate new technology potentially applicable for conservation of energy and resources and for improvements in safety and security in a single-family residence. All technology items, including solar energy systems and a waste water reuse system, were evaluated under actual living conditions for a one-year period with a family of four living in the house in their normal life style. Results are presented which show overall savings in energy and resources compared to requirements for a defined similar conventional house under the same conditions. Also included are general operational experience and performance data for all the various items and systems of technology incorporated into the house design.
Global Security Sciences Home - Global Security Sciences
Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsoukalas, Lefteri
2009-04-29
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energymore » internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.« less
Energy Security: From Deal Killers to Game Changers
NASA Astrophysics Data System (ADS)
Cooke, Charlie
2010-03-01
Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.
Science and the Energy Security Challenge: The Example of Solid-State Lighting
Philips, Julia [Sandia
2017-12-09
Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products â a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.
Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production
USDA-ARS?s Scientific Manuscript database
To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....
Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production
Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...
Applying Acquisition Lessons Learned to Operational Energy Initiatives
2013-03-01
current and future platforms to meet the demands of Energy-Informed Operations. Endnotes 1 Charles F. Wald , and Tom Captain, Energy Security America’s...2013); Wald and Captain, Energy Security America’s Best Defense, 1. 3 The Army’s agile process involves seven phases and three decision points to...https://acc.dau.mil/adl/en- US/329976/file/47235/EVM_Report_to_Congress.pdf (accessed January 14, 2013). 22 Lisa Pracchia, “The AV-8B Team Learns Synergy
The Great Game redux: Energy security and the emergence of tripolarity in Eurasia
NASA Astrophysics Data System (ADS)
Ozdamar, Ibrahim Ozgur
Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.
A Study of Defense Applications of Space Solar Power
NASA Astrophysics Data System (ADS)
Jaffe, Paul
2010-01-01
Space solar power (SSP) is generally considered to be the collection in space of energy from the sun and its wireless transmission from space for use on earth. It has been observed that the implementation of such a system could offer energy security, environmental, and technological advantages to those who would undertake its development. A study conducted by the Naval Research Laboratory (NRL) sought to determine if unique, cost effective, and efficient approaches exist for supplying significant power on demand for Navy, Marine Corps, or other Department of Defense applications by employing a space-based solar power system. The study was initiated by and prepared for top NRL management in part as a result of the publication of the National Security Space Office's (NSSO) report "Space-Based Solar Power as an Opportunity for Strategic Security." The NSSO report's recommendations included statements calling for the U.S. Government to conduct analyses, retire technical risk, and become an early demonstrator for SBSP. It should be noted that the principal objective of the NRL study differed significantly from that of the multitude of previous studies performed in reference to SBSP in that it focused on defense rather than utility grid applications.
Sustainable Biofuel Crops Project, Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Juhn, Daniel; Grantham, Hedley
2014-05-28
Over the last six years, the Food and Agriculture Organization of the United Nations (FAO) has developed the Bioenergy and Food Security (BEFS) Approach to help countries design and implement sustainable bioenergy policies and strategies. The BEFS Approach consists of two sets of multidisciplinary and integrated tools and guidance (the BEFS Rapid Appraisal and the BEFS Detailed Analysis) to facilitate better decision on bioenergy development which should foster both food and energy security, and contribute to agricultural and rural development. The development of the BEFS Approach was for the most part funded by the German Federal Ministry of Food andmore » Agriculture. Recognizing the need to provide support to countries that wanted an initial assessment of their sustainable bioenergy potential, and of the associated opportunities, risks and trade offs, FAO began developing the BEFS-RA (Rapid Appraisal). The BEFS RA is a spreadsheet–based assessment and analysis tool designed to outline the country's basic energy, agriculture and food security context, the natural resources potential, the bioenergy end use options, including initial financial and economic implications, and the identification of issues that might require fuller investigation with the BEFS Detailed Analysis.« less
Global carbon management using air capture and geosequestration at remote locations
NASA Astrophysics Data System (ADS)
Lackner, K. S.; Goldberg, D.
2014-12-01
CO2 emissions need not only stop; according the IPCC, emissions need to turn negative. This requires means to remove CO2 from air and store it safely and permanently. We outline a combination of secure geosequestration and direct capture of CO2 from ambient air to create negative emissions at remote locations. Operation at remote sites avoids many difficulties associated with capture at the source, where space for added equipment is limited, good storage sites are in short supply, and proximity to private property engenders resistance. Large Igneous Provinces have been tested as secure CO2 reservoirs. CO2 and water react with reservoir rock to form stable carbonates, permanently sequestering the carbon. Outfitting reservoirs in large igneous provinces far from human habitation with ambient air capture systems creates large CO2 sequestration sites. Their remoteness offers advantages in environmental security and public acceptance and, thus, can smooth the path toward CO2 stabilization. Direct capture of CO2 from ambient air appears energetically and economically viable and could be scaled up quickly. Thermodynamic energy requirements are very small and a number of approaches have shown to be energy efficient in practice. Sorbent technologies include supported organoamines, alkaline brines, and quaternary ammonium based ion-exchange resins. To demonstrate that the stated goals of low cost and low energy consumption can be reached at scale, public research and demonstration projects are essential. We suggest co-locating air capture and geosequestration at sites where renewable energy resources can power both activities. Ready renewable energy would also allow for the co-production of synthetic fuels. Possible locations with large wind and basalt resources include Iceland and Greenland, the north-western United States, the Kerguelen plateau, Siberia and Morocco. Capture and sequestration in these reservoirs could recover all of the emissions of the 20th century and still contribute to a carbon neutral economy throughout the 21st century. Mobilizing industrial infrastructure to these areas poses a challenge. However, the urgency of the climate problem requires immediate action, with economic incentives and commitments to site evaluation and engineering development.
Nevada National Security Site-Directed Research and Development FY 2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Howard Bender, comp.
2012-04-25
This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
NASA Astrophysics Data System (ADS)
Walsh, Michael J.; Gerber Van Doren, Léda; Sills, Deborah L.; Archibald, Ian; Beal, Colin M.; Gen Lei, Xin; Huntley, Mark E.; Johnson, Zackary; Greene, Charles H.
2016-11-01
The goals of ensuring energy, water, food, and climate security can often conflict. Microalgae (algae) are being pursued as a feedstock for both food and fuels—primarily due to algae’s high areal yield and ability to grow on non-arable land, thus avoiding common bioenergy-food tradeoffs. However, algal cultivation requires significant energy inputs that may limit potential emission reductions. We examine the tradeoffs associated with producing fuel and food from algae at the energy-food-water-climate nexus. We use the GCAM integrated assessment model to demonstrate that algal food production can promote reductions in land-use change emissions through the offset of conventional agriculture. However, fuel production, either via co-production of algal food and fuel or complete biomass conversion to fuel, is necessary to ensure long-term emission reductions, due to the high energy costs of cultivation. Cultivation of salt-water algae for food products may lead to substantial freshwater savings; but, nutrients for algae cultivation will need to be sourced from waste streams to ensure sustainability. By reducing the land demand of food production, while simultaneously enhancing food and energy security, algae can further enable the development of terrestrial bioenergy technologies including those utilizing carbon capture and storage. Our results demonstrate that large-scale algae research and commercialization efforts should focus on developing both food and energy products to achieve environmental goals.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
.... (n/k/a Bancorp Energy, Inc.): Order of Suspension of Trading June 21, 2011. It appears to the... securities of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.) because it has not filed any... above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Corestream Energy, Inc. (f/k... Corestream Energy, Inc. (``Corestream'') (f/k/a Zealous, Inc.) because it has failed to file certain periodic.... Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...
Nevada National Security Site Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
2014-09-09
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less
2010-04-01
contained in gas permeable bags which intake CO2 and release oxygen) near heavy CO2 pollution sources could increase the yield of algae crops while...contains plentiful natural sugars or starch that can be readily converted to sugar. Popular feedstocks include sugar cane (Brazil), sugar beets (Europe
DOE Office of Scientific and Technical Information (OSTI.GOV)
Strader, Cliff; Richter, Bonnie
2013-01-23
The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.
2006-07-01
The ADT in 2025 is predicted to range from 38,000 to 40,000. Peak hour volumes are predicted to be 2,097 in the AM peak hour and 2,360 in the PM... peak hour. A variety of things could change this classification and improve traffic and the projected LOS by 2025. Several examples include the...vehicles, as well as numerous off- peak trips. Development proposals south at the adjacent Sandia Science and Technology Park and further south of the
Derenzo, Stephen E.; Budinger, Thomas F.
1984-01-01
In brief, the invention is a tomograph modified to be in a clamshell configuration so that the ring or rings may be moved to multiple sampling positions. The tomograph includes an array of detectors arranged in successive adjacent relative locations along a closed curve in a first position in a selected plane, and means for securing the detectors in the relative locations in a first sampling position. The securing means is movable in the plane in two sections and pivotable at one p The U.S. Government has rights in this invention pursuant to Contract No. W-7405-ENG-48 between the U.S. Department of Energy and the University of California.
Assessment of the Effects of Climate Change on Federal Hydropower
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sale, Michael J.; Shih-Chieh, Kao; Ashfaq, Moetasim
As directed by Congress in Section 9505 of the SECURE Water Act of 2009 (Public Law 111-11), the US Department of Energy (DOE), in consultation with the federal Power Marketing Administrations (PMAs) and other federal agencies, including federal dam owners, has prepared a comprehensive assessment examining the effects of climate change on water available for hydropower at federal facilities and on the marketing of power from these federal facilities. This Oak Ridge National Laboratory report, referred to as the “9505 Assessment,” describes the technical basis for the report to Congress that was called for in the SECURE Water Act.
European Energy Policy and Its Effects on Gas Security
NASA Astrophysics Data System (ADS)
Radu, Victorita Stefana Anda
The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.
Code of Federal Regulations, 2012 CFR
2012-01-01
... milling, the Agreement States of Colorado, Utah, Texas and Washington should be contacted. [48 FR 16032... 10 Energy 2 2012-01-01 2012-01-01 false Communications. 70.5 Section 70.5 Energy NUCLEAR... Director, Division of Security Policy, Office of Nuclear Security and Incident Response, U.S. Nuclear...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Director for Corporate Managementand Chief Information Officer shall designate an NRC Personnel Security... 10 Energy 1 2014-01-01 2014-01-01 false Recommendation of the NRC Personnel Security Review Panel... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE...
10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Director for Corporate Managementand Chief Information Officer shall designate an NRC Personnel Security... 10 Energy 1 2013-01-01 2013-01-01 false Recommendation of the NRC Personnel Security Review Panel... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...
10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...
SPIDERS Bi-Directional Charging Station Interconnection Testing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, M.
2013-09-01
The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).
Facilities and Infrastructure FY 2017 Budget At-A-Glance
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-03-01
The Facilities and Infrastructure Program includes EERE’s capital investments, operations and maintenance, and site-wide support of the National Renewable Energy Laboratory (NREL). It is the nation’s only national laboratory with a primary mission dedicated to the research, development and demonstration (RD&D) of energy efficiency, renewable energy and related technologies. EERE is NREL’s steward, primary client and sponsor of NREL’s designation as a Federally Funded Research and Development Center. The Facilities and Infrastructure (F&I) budget maintains NREL’s research and support infrastructure, ensures availability for EERE’s use, and provides a safe and secure workplace for employees.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
Nuclear energy related capabilities at Sandia National Laboratories
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pickering, Susan Y.
2014-02-01
Sandia National Laboratories' technology solutions are depended on to solve national and global threats to peace and freedom. Through science and technology, people, infrastructure, and partnerships, part of Sandia's mission is to meet the national needs in the areas of energy, climate and infrastructure security. Within this mission to ensure clean, abundant, and affordable energy and water is the Nuclear Energy and Fuel Cycle Programs. The Nuclear Energy and Fuel Cycle Programs have a broad range of capabilities, with both physical facilities and intellectual expertise. These resources are brought to bear upon the key scientific and engineering challenges facing themore » nation and can be made available to address the research needs of others. Sandia can support the safe, secure, reliable, and sustainable use of nuclear power worldwide by incorporating state-of-the-art technologies in safety, security, nonproliferation, transportation, modeling, repository science, and system demonstrations.« less
10 CFR 2.904 - Classification assistance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc., and Transworld Benefits International, Inc.; Order... that there is a lack of current and accurate information concerning the securities of Industry Concept...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp., Komodo, Inc., Uphonia, Inc., and Wilson Brothers USA, Inc., Order of Suspension of Trading September 12, 2013. It appears to the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Review and... Disposition Supplemental Environmental Impact Statement AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Extension of the public review and comment period and announcement of an...
10 CFR 2.904 - Classification assistance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...
10 CFR 2.904 - Classification assistance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 1046.15 - Training and qualification for security skills and knowledge.
Code of Federal Regulations, 2010 CFR
2010-01-01
... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR... concepts of justice, a personnel security program in the interests of the common defense and security for...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR... concepts of justice, a personnel security program in the interests of the common defense and security for...
Annual energy outlook 1991 with projections to 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1991-03-01
The report examines a range of scenarios by considering and comparing the effects of three selected variations from a reference case. Fundamental forces that determine the direction of energy markets will remain in effect. Recent events and high prices may have some residual impacts on Government policy, industrial energy planners, and consumers. Higher oil prices could stimulate interest in conservation and renewable energy and encourage growth in domestic energy production capacity. United States energy consumption has held steady for the third year in a row. Oil imports increased and use of electrical power increased. Legislative initiatives could set in motionmore » significant changes in energy markets world wide. A proposed National Energy Strategy has primary goals of economic growth, energy security and environmental improvement. Energy resources and energy uses of the United States are discussed. Energy resources include petroleum, natural gas, coal, and renewable energy sources. Statistical data is presented in various tables and graphs for energy consumption by end use sector. (JF)« less
Annual energy outlook 1991 with projections to 2010
NASA Astrophysics Data System (ADS)
1991-03-01
The report examines a range of scenarios by considering and comparing the effects of three selected variations from a reference case. Fundamental forces that determine the direction of energy markets will remain in effect. Recent events and high prices may have some residual impacts on Government policy, industrial energy planners, and consumers. Higher oil prices could stimulate interest in conservation and renewable energy and encourage growth in domestic energy production capacity. United States energy consumption has held steady for the third year in a row. Oil imports increased and use of electrical power increased. Legislative initiatives could set in motion significant changes in energy markets world wide. A proposed National Energy Strategy has primary goals of economic growth, energy security and environmental improvement. Energy resources and energy uses of the United States are discussed. Energy resources include petroleum, natural gas, coal, and renewable energy sources. Statistical data is presented in various tables and graphs for energy consumption by end use sector.
Turkey as an Emerging Energy Hub
2010-06-01
respecting environment concerns.”27 It has two dimensions; one of them is the view of the importing country, the other the view of the exporting ...country. For an importing country (consumer), energy security refers primarily to access to the sources and security of supplies,28 for an exporting ...production is insufficient for the country’s needs. Turkey is a developing country and needs energy to sustain its economic growth . To sustain that
2014-12-01
which requires close attention to political, econornic, social , cultw·al, diplomatic, ethnic, and energy factors. The new geopolitical configmation in...closely connected to regional security, which requires close attention to political, economic, social , cultural, diplomatic, ethnic, and energy factors...requires close attention to political, economic, social , cultural, diplomatic, environmental, ethnical, and energy factors. Such an approach to
NASA Astrophysics Data System (ADS)
Cai, J.; Yin, H.; Varis, O.
2016-12-01
China faces a complicated puzzle in balancing the country's trade-offs among water and energy security, economic competitiveness, and environmental sustainability. It is therefore of prime importance to comprehend China's water and energy security under the effect of its economic structural changes. Analyses on this entity still remain few and far between though, and a comprehensive picture has not been available that would help understand China's recent development in economic structure as well as its spatial features and links to water and energy security, and policy-making. Consequently, we addressed this information gap by performing an integrated and quantitative spatio-temporal analysis of the impacts of China's industrial transition on water use intensity (WUI) and energy-related carbon intensity (ERCI). Those two factors serve as the national targets of its water and energy security. Our results for the first time quantitatively demonstrated the following significant and novel information: 1) the primary industry (PI) appeared to dominate the WUI although its relative share decreased, and PI's WUI continued to be far higher than that of secondary and tertiary industries (SI and TI); 2) SI dominated in affecting the total ERCI at both national and provincial scales; 3) the total WUI and ERCI had a significant positive correlation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... disclosure pursuant to the Act and National Security Information that has been determined pursuant to... et seq.). Administrator means the Administrator of the National Nuclear Security Administration...
Code of Federal Regulations, 2010 CFR
2010-01-01
... ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... disclosure pursuant to the Act and National Security Information that has been determined pursuant to... et seq.). Administrator means the Administrator of the National Nuclear Security Administration...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby
Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.
Engineering Infrastructures: Problems of Safety and Security in the Russian Federation
NASA Astrophysics Data System (ADS)
Makhutov, Nikolay A.; Reznikov, Dmitry O.; Petrov, Vitaly P.
Modern society cannot exist without stable and reliable engineering infrastructures (EI), whose operation is vital for any national economy. These infrastructures include energy, transportation, water and gas supply systems, telecommunication and cyber systems, etc. Their performance is commensurate with storing and processing huge amounts of information, energy and hazardous substances. Ageing infrastructures are deteriorating — with operating conditions declining from normal to emergency and catastrophic. The complexity of engineering infrastructures and their interdependence with other technical systems makes them vulnerable to emergency situations triggered by natural and manmade catastrophes or terrorist attacks.
NASA Astrophysics Data System (ADS)
Runde, Wolfgang; Neu, Mary P.
Since the 1950s actinides have been used to benefit industry, science, health, and national security. The largest industrial application, electricity generation from uranium and thorium fuels, is growing worldwide. Thus, more actinides are being mined, produced, used and processed than ever before. The future of nuclear energy hinges on how these increasing amounts of actinides are contained in each stage of the fuel cycle, including disposition. In addition, uranium and plutonium were built up during the Cold War between the United States and the Former Soviet Union for defense purposes and nuclear energy.
Effects of Climate Change on Federal Hydropower. Report to Congress
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This is a formal Department of Energy report to Congress. It outlines the findings of an assessment directed by Congress in Section 9505 of the SECURE Water Act of 2009 (Public Law 111-11), the US Department of Energy (DOE), in consultation with the federal Power Marketing Administrations (PMAs) and other federal agencies, including federal dam owners, has prepared a comprehensive assessment examining the effects of climate change on water available for hydropower at federal facilities and on the marketing of power from these federal facilities.
NASA Astrophysics Data System (ADS)
Hebner, Greg
2010-11-01
Products and consumer goods that utilize low temperature plasmas at some point in their creation touch and enrich our lives on almost a continuous basis. Examples are many but include the tremendous advances in microelectronics and the pervasive nature of the internet, advanced material coatings that increase the strength and reliability of products from turbine engines to potato chip bags, and the recent national emphasis on energy efficient lighting and compact fluorescent bulbs. Each of these products owes their contributions to energy security and international competiveness to fundamental research investments. However, it would be a mistake to believe that the great commercial success of these products implies a robust understanding of the complicated interactions inherent in plasma systems. Rather, current development of the next generation of low temperature plasma enabled products and processes is clearly exposing a new set of exciting scientific challenges that require leaps in fundamental understanding and interdisciplinary research teams. Emerging applications such as liquid-plasma systems to improve water quality and remediate hazardous chemicals, plasma-assisted combustion to increase energy efficiency and reduce emissions, and medical applications promise to improve our lives and the environment only if difficult science questions are solved. This talk will take a brief look back at the role of low temperature plasma science in enabling entirely new markets and then survey the next generation of emerging plasma applications. The emphasis will be on describing the key science questions and the opportunities for scientific cross cutting collaborations that underscore the need for increased outreach on the part of the plasma science community to improve visibility at the federal program level. This work is supported by the DOE, Office of Science for Fusion Energy Sciences, and Sandia National Laboratories, a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000