UNT Libraries Government Documents Department - 253,818 Matching Results

Search Results

CW RFQ fabrication and engineering

Description: The design and fabrication of a four-vane RFQ to deliver a 100 mA CW proton beam at 6.7 MeV is described. This linac is an Oxygen-Free Electrolytic (OFE) copper structure 8 m in length and was fabricated using hydrogen furnace brazing as the joining technology.
Date: December 31, 1998
Creator: Schrage, D.; Young, L. & Roybal, P.

CW Room Temperature Re-Buncher for the Project X Front End

Description: At Fermilab there is a plan to construct the Project X Injector Experiment (PXIE) facility - a prototype of the front end of the Project X, a multi-MW proton source based on superconducting linac. The construction and successful operations of this facility will validate the concept for the Project X front end, thereby minimizing the primary technical risk element within the Project. The room temperature front end of the linac contains an ion source, an RFQ accelerator and a Medium Energy Beam Transport (MEBT) section comprising a high bandwidth bunch selective chopper. The MEBT length is about 10 m, so three re-bunching CW cavities are used to support the beam longitudinal dynamics. The paper reports a RF design of the re-bunchers along with preliminary beam dynamic and thermal analysis of the cavities.
Date: May 9, 2012
Creator: Romanov, Gennady; Awida, Mohamed H.; Chen, Meiyu; Gonin, Ivan V.; Kazakov, Sergey; Kostin, Roman et al.

CX-100 and TX-100 blade field tests.

Description: In support of the DOE Low Wind Speed Turbine (LWST) program two of the three Micon 65/13M wind turbines at the USDA Agricultural Research Service (ARS) center in Bushland, Texas will be used to test two sets of experimental blades, the CX-100 and TX-100. The blade aerodynamic and structural characterization, meteorological inflow and wind turbine structural response will be monitored with an array of 75 instruments: 33 to characterize the blades, 15 to characterize the inflow, and 27 to characterize the time-varying state of the turbine. For both tests, data will be sampled at a rate of 30 Hz using the ATLAS II (Accurate GPS Time-Linked Data Acquisition System) data acquisition system. The system features a time-synchronized continuous data stream and telemetered data from the turbine rotor. This paper documents the instruments and infrastructure that have been developed to monitor these blades, turbines and inflow.
Date: December 1, 2005
Creator: Holman, Adam (USDA-Agriculture Research Service, Bushland, TX); Jones, Perry L. & Zayas, Jose R.

CY 1995 radiation dose reconciliation report and resulting CY 1996 dose estimate for the 324 nuclear facility

Description: In this report, the dose estimate for CY 1995 is reconciled by month wih actual doses received. Results of the reconciliation were used to revise estimates of worker dose for CY 1996. Resulting dose estimate for the facility is also included. Support for two major programs (B-Cell Cleanout and Surveillance and Maintenance) accounts for most of the exposure received by workers in the faility. Most of the expousre received by workers comes from work in the Radiochemical Engineering Complex airlock. In spite of schedule and work scope changes during CY 1995, dose estimates were close to actual exposures received. A number of ALARA measures were taken throughout the year; exposure reduction due to those was 20.6 Man-Rem, a 28% reduction from the CY 1995 estimate. Baseline estimates for various tasks in the facility were used to compile the CY 1996 dose estimate of 45.4 Man-Rem; facility goal for CY 1996 is to reduce worker dose by 20%, to 36.3 Man-Rem.
Date: April 1, 1996
Creator: Landsman, S.D.; Thornhill, R.E. & Peterson, C.A.

CYANAMIDE: A POSSIBLE KEY COMPOUND IN CHEMICAL EVOLUTION

Description: The prebiotic synthesis of phosphorus-containing compounds--such as nucleotides and polynucleotides--would require both a geologically plausible source of the element and pathways for its incorporation into chemical systems on the primitive Earth. The mineral apatite, which is the only significant source of phosphate on Earth, has long been thought to be problematical in this respect due to its low solubility and reactivity. However, in the last decade or so, at least two pathways have been demonstrated which would circumvent these perceived problems. In addition, recent results would seem to suggest an additional, extraterrestrial source of reactive phosphorus. It appears that the 'phosphorus problem' is no longer the stumbling block which it was once thought to be.
Date: May 1, 1964
Creator: Steinman, Gary; Lemmon, Richard M. & Calvin, Melvin

Cyanide destruction/immobilization of residual sludge - mixed waste focus area. Innovative Technology Summary Report

Description: Innovative Technology Summary Reports are designed to provide potential users with the information they need to quickly determine if a technology would apply to a particular environmental management problem. They are also designed for readers who may recommend that a technology be considered by prospective users. Each report describes a technology, system, or process that has been developed and tested with funding from DOE`s Office of Science and Technology (OST). A report presents the full range of problems that a technology, system, or process will address and its advantages to the DOE cleanup in terms of system performance, cost, and cleanup effectiveness. Most reports include comparisons to baseline technologies as well as other competing technologies. Information about commercial availability and technology readiness for implementation is also included. Innovative Technology Summary Reports are intended to provide summary information. References for more detailed information are provided in an appendix. Efforts have been made to provide key data describing the performance, cost, and regulatory acceptance of the technology. If this information was not available at the time of publication, the omission is noted.
Date: February 1, 1998

Cyanide Effects on Carbon Dioxide Fixation in Chlorella

Description: Green algae have been treated with radioactive KCN in an investigation of the effect of cyanide on photosynthesis. A multitude of products have been found to be formed in very short exposures (10 to 15 sec). One of these products has been identified with the product formed when the algae are given radioactive CO{sub 2} and nonradioactive KCN. The same product has been synthesized by a nonenzymatic cyanohydrin addition reaction on ribulose-1, 5-diphosphate. It has been shown to be a 2-carboxy-pentitol (probably mostly ribitol)-1, 5-diphosphate. Upon hydrolysis it gives an hydroxy acid (or mixture of isomers) closely related to hamamelonic acid. The significance of this and the other as yet unidentified products of cyanide interaction with a biological system is discussed with respect to the use of cyanide as an inhibitor.
Date: December 17, 1957
Creator: Rabin, Bernard R.; Shaw, D. F.; Pon, Ning G.; Anderson, J. M. & Calvin, M.

Cyanoethylated Compounds as Additives in Lithium/Lithium Ion Batteries

Description: The power loss of lithium/lithium ion battery cells is significantly reduced, especially at low temperatures, when about 1% by weight of an additive is incorporated in the electrolyte layer of the cells. The usable additives are organic solvent soluble cyanoethylated polysaccharides and poly(vinyl alcohol). The power loss decrease results primarily from the decrease in the charge transfer resistance at the interface between the electrolyte and the cathode.
Date: May 8, 1998
Creator: Nagasubramanian, Ganesan

Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability

Description: A letter report issued by the Government Accountability Office with an abstract that begins "Cyber analysis and warning capabilities are critical to thwarting computer-based (cyber) threats and attacks. The Department of Homeland Security (DHS) established the United States Computer Emergency Readiness Team (US-CERT) to, among other things, coordinate the nation's efforts to prepare for, prevent, and respond to cyber threats to systems and communications networks. GAO's objectives were to (1) identify key attributes of cyber analysis and warning capabilities, (2) compare these attributes with US-CERT's current capabilities to identify whether there are gaps, and (3) identify US-CERT's challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability. To address these objectives, GAO identified and analyzed related documents, observed operations at numerous entities, and interviewed responsible officials and experts."
Date: July 31, 2008
Creator: United States. Government Accountability Office.

Cyber and physical infrastructure interdependencies.

Description: The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.
Date: September 1, 2008
Creator: Phillips, Laurence R.; Kelic, Andjelka & Warren, Drake E.

Cyber Assessment Methods For SCADA Security

Description: The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.
Date: June 1, 2005
Creator: Permann, May Robin & Rohde, Kenneth

Cyber Assessment Methods for SCADA Security

Description: The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.
Date: June 1, 2005

Cyber Friendly Fire

Description: Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially ...
Date: September 1, 2011
Creator: Greitzer, Frank L.; Carroll, Thomas E. & Roberts, Adam D.

Cyber Incidents Involving Control Systems

Description: The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes ...
Date: October 1, 2005
Creator: Turk, Robert J.

Cyber Intrusion into U.S. Office of Personnel Management: In Brief

Description: This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Date: July 17, 2015
Creator: Finklea, Kristin; Christensen, Michelle D.; Fischer, Eric A.; Lawrence, Susan V. & Theohary, Catherine A.

Cyber Operations in DOD Policy and Plans: Issues for Congress

Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations.
Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.

Cyber Science and Security - An R&D Partnership at LLNL

Description: Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.
Date: March 11, 2011
Creator: Brase, J & Henson, V

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings

Description: The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.
Date: January 1, 2011
Creator: Sheldon, Frederick T; Abercrombie, Robert K & Krings, Axel

Cyber Security and Resilient Systems

Description: The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation ...
Date: July 1, 2009
Creator: Anderson, Robert S.