WorldWideScience

Sample records for austurhorn intrusive complex

  1. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Syenite and includes early tholeiitic gabbros and a series of cross-cutting alkaline intrusions ranging from monzonite to alkali granite. The alkaline intrusions cut the gabbros, and are cut by the outer nordmarkite zone of the Kangerlussuaq Syenite. This study presents the first U–Pb zircon ages from...... the alkaline units of the Kærven Complex. Fourteen multi-grain zircon fractions have been analysed by thermal ionization mass spectrometry (TIMS). Absolute age differences could not be resolved between the different units, suggesting a relatively rapid succession of intrusions between c. 53.5 and 53.3 Ma. Our...

  2. Tertiary alkaline Roztoky Intrusive Complex, České středohoří Mts., Czech Republic: petrogenetic characteristics

    Czech Academy of Sciences Publication Activity Database

    Skála, Roman; Ulrych, Jaromír; Ackerman, Lukáš; Jelínek, E.; Dostal, J.; Hegner, E.; Řanda, Zdeněk

    2014-01-01

    Roč. 103, č. 5 (2014), s. 1233-1262 ISSN 1437-3254 R&D Projects: GA AV ČR IAA300130902 Institutional support: RVO:67985831 ; RVO:61389005 Keywords : Bohemian Massif * Cenozoic * continental rift * Roztoky Intrusive Complex * alkaline intrusions * geochemistry Subject RIV: DD - Geochemistry Impact factor: 2.093, year: 2014

  3. Palaeomagnetism of the Early Permian Mount Leyshon Intrusive Complex and Tuckers Igneous Complex, North Queensland, Australia

    Science.gov (United States)

    Clark, D. A.; Lackie, M. A.

    2003-06-01

    This study provides reliable, precisely defined and well-dated Early Permian (286 +/- 6 Ma) palaeomagnetic poles for Australia from the Mount Leyshon Intrusive Complex (MLIC) and the Tuckers Igneous Complex (TIC). Both complexes are associated with prominent negative magnetic anomalies, indicating the presence of rocks carrying stable remanence of reverse polarity, with a Koenigsberger ratio greater than unity. The characteristic remanence carried by the intrusive phases and by locally remagnetized, contact-metamorphosed host rocks is always of reverse polarity, consistent with acquisition during the Permo-Carboniferous (Kiaman) Reverse Superchron. The corresponding palaeopoles confirm that Australia occupied high latitudes in the Early Permian. The pole positions are: MLIC: lat. = 43.2 °S, long. = 137.3 °E dp = 6.0°, dm = 6.4° Q= 6; TIC: lat. = 47.5 °S, long. = 143.0 °E, dp = 6.0°, dm = 6.6° Q= 6. Permian palaeomagnetic overprinting is detectable at considerable distances from the MLIC (2-3 km), well beyond the zone of visible alteration. The primary nature of the Early Permian palaeomagnetic signature is established by full baked contact/aureole tests at both localities. Other new data from Australia are consistent with the poles reported here. Comparison of the Australian, African and South American Apparent Polar Wander Paths (APWP) suggests that mean Permian and Triassic poles from West Gondwana, particularly from South America, are biased by remagnetization in the Jurassic-Cretaceous and that the Late Palaeozoic-Mesozoic APWP for Gondwana is best defined by Australian data. The Australian APWP exhibits substantial movement through the Mesozoic. Provided only that the time-averaged palaeofield was zonal, the Early Triassic palaeomagnetic data from Australia provide an important palaeogeographic constraint that the south geographic pole was within, or very close to, SE Australia around 240 Ma. The new Early Permian poles are apparently more consistent

  4. Resistivity imaging reveals complex pattern of saltwater intrusion along Monterey coast

    Science.gov (United States)

    Goebel, Meredith; Pidlisecky, Adam; Knight, Rosemary

    2017-08-01

    Electrical Resistivity Tomography data were acquired along 40 km of the Monterey Bay coast in central California. These data resulted in electrical resistivity images to depths of approximately 280 m.b.s.l., which were used to understand the distribution of freshwater and saltwater in the subsurface, and factors controlling this distribution. The resulting resistivity sections were interpreted in conjunction with existing data sets, including well logs, seismic reflection data, geologic reports, hydrologic reports, and land use maps from the region. Interpretation of these data shows a complex pattern of saltwater intrusion resulting from geology, pumping, and recharge. The resistivity profiles were used to identify geological flow conduits and barriers such as palaeo-channels and faults, localized saltwater intrusion from individual pumping wells, infiltration zones of surface fresh and brackish water, and regions showing improvements in water quality due to management actions. The use of ERT data for characterizing the subsurface in this region has led to an understanding of the spatial distribution of freshwater and saltwater at a level of detail unattainable with the previously deployed traditional well based salinity mapping and monitoring techniques alone. Significant spatial variability in the extent and geometry of intrusion observed in the acquired data highlights the importance of adopting continuous subsurface characterization methods such as this one.

  5. Shoshonitic intrusion magmatism in Pajeu-Paraiba belt: the Bom Jardim complex

    International Nuclear Information System (INIS)

    Guimaraes, I.P. de; Silva Filho, A.F. da

    1990-01-01

    The Bom Jardim complex is a multi phase intrusion emplaced within the basement of the Pajeu-Paraiba belt, in the Borborema province, N.E., Brazil, during the Pan African (Brasiliano) orogeny, 600 Ma ago. The Bom Jardim complex is primarily composed of monzonites and syenites with subordinated granites. The major and trace elements geochemistry has established a shoshonitic affinity for the monzonite-syenite assemblages, whereas the granites are clearly of a high-K calc-alkaline character. The main geochemical trends determined for the complex are the result of fractionation of mainly amphibole, biotite, alkali feldspar ±clinopyroxene within the developing magmas. The enrichment in transition metal elements, LILE and high LILE/HSFE ratios, coupled with an initial Sr sup(87)/Sr sup(86) ratio of 0.70709 is consistent with a subduction related magma source. (author)

  6. Mushy magma processes in the Tuolumne intrusive complex, Sierra Nevada, California

    Science.gov (United States)

    Memeti, V.; Paterson, S. R.

    2012-12-01

    Debates continue on the nature of volcanic-plutonic connections and the mechanisms of derivation of large volcanic eruptions, which require large volumes of magma to be readily available within a short period of time. Our focus to understand these magma plumbing systems has been to study the nature of their mid-to upper crustal sections, such as the 1,000 km2, 95-85 Ma old Tuolumne intrusive complex in the Sierra Nevada, California, USA. The Tuolumne intrusive complex is a great example where the magma mush model nicely explains observations derived from several datasets. These data suggest that a magma mush body was present and may have been quite extensive especially at times when the Tuolumne intrusive complex was undergoing waxing periods of magmatism (increased magma input), which alternated with waning periods of magmatism (decreased magma addition) and thus a smaller mush body, essentially mimicking in style periodic flare-ups and lulls at the arc scale. During waxing stages, magma erosion and mixing were the dominant processes, whereas waning stages allowed mush domains to continue to undergo fractional crystallization creating additional compositional variations. Over time, the imprint left behind by previous waxing and waning stages was partly overprinted, but individual crystals successfully recorded the compositions of these earlier magmas. Waxing periods in the Tuolumne intrusive complex during which large magma mush bodies formed are supported by the following evidence: 1) Hybrid units and gradational contacts are commonly present between major Tuolumne units. 2) CA-TIMS U/Pb zircon geochronology data demonstrate that antecrystic zircon recycling took place unidirectional from the oldest, marginal unit toward the younger, interior parts of the intrusion, where increasing zircon age spread encompasses the entire age range of the Tuolumne. 3) The younger, interior units also show an increasing scatter and complexity in geochemical element and isotope

  7. High-resolution 40Ar/39Ar chronology of multiple intrusion igneous complexes

    Science.gov (United States)

    Foland, K. A.; Chen, J.-F.; Linder, J. S.; Henderson, C. M. B.; Whillans, I. M.

    1989-06-01

    The Mount Brome complex of the Monteregian province of southern Quebec, Canada, consits of several major intrusions ranging compositionally from gabbro to syenite. The relative ages of these intrusives have been investigated with high-resolution 40Ar/39Ar analyses, including a specially designed irradiation configuration to cancel the effects of fluence gradients. Small yet distinct apparent age differences are observed. While a number of analytical and geological factors could be proposed to explain the small variations, evaluation of these suggests the age differences reflect those in emplacement times. The gabbro and nepheline diorite were emplaced within a short span 123.1 Ma ago. Generally more evolved lithologies (biotite monzodiorite, pulaskite, nordmarkite) appear to have been emplaced within a restricted interval 1.4±0.3 Ma later. Whole-rock Rb-Sr systematics do not give acceptable isochrons because of significant scatter interpreted to reflect initial 87Sr/86Sr heterogeneities resulting from crustal contamination. Considering the variations in initial ratio, the Rb-Sr data are consistent with the 40Ar/39Ar age.

  8. Rare earth mineralisation in the Cnoc nan Cuilean intrusion of the Loch Loyal Syenite Complex, northern Scotland

    Science.gov (United States)

    Walters, A. S.; Hughes, H. S. R.; Goodenough, K. M.; Gunn, A. G.; Lacinska, A.

    2012-04-01

    Due to growing global concerns about security of rare earth element (REE) supply, there is considerable interest in identifying new deposits and in understanding the processes responsible for their formation. Ongoing studies by BGS on potential indigenous resources have focused on the Caledonian alkaline intrusive complexes of north-west Scotland. The highest values of total rare earth oxide (TREO) have been found in the Cnoc nan Cuilean intrusion of the Loch Loyal Complex in Sutherland. The Loch Loyal Syenite Complex comprises three intrusions: Ben Loyal, Beinn Stumanadh and Cnoc nan Cuilean. The Cnoc nan Cuilean intrusion, which covers an area of about 3 km2, can be subdivided into two zones: a Mixed Syenite Zone (MSZ) and a later Massive Leucosyenite Zone (MLZ). Evidence from field mapping and 3D-modelling suggests that the melasyenites were passively emplaced to form a lopolith concordant with the Moine and Lewisian country rocks. A later episode of leucosyenitic magmatism caused mixing and mingling with the melasyenite forming the MSZ. Continued intrusion of leucosyenite melts then formed the MLZ [1]. The melasyenites are enriched in TREO relative to the leucosyenites with average values of 3800 ppm and 1400 ppm respectively. The highest contents, up to 20 000 ppm TREO, are found in narrow biotite-magnetite-rich veins identified in a single stream section near the eastern margin of the intrusion. All lithologies are light rare earth element (LREE) dominated with high concentrations of Ba and Sr and low levels of Nb and Ta. Various REE-bearing minerals are present but allanite is dominant, being present in all major magmatic lithologies and the biotite-magnetite veins. Three generations of allanite have been identified: a late-magmatic phase rimming apatite; allanite micro veinlets cross-cutting the syenite; and a third phase only observed in the biotite-magnetite veins. TREO concentrations of the different allanite generations are similar, averaging 22%. The

  9. Radiological Mapping of the Alkaline Intrusive Complex of Jombo, South Coastal Kenya by In-Situ Gamma-Ray Spectrometry

    Science.gov (United States)

    Kaniu, Ian; Darby, Iain G.; Kalambuka Angeyo, Hudson

    2016-04-01

    Carbonatites and alkaline intrusive complexes are rich in a variety of mineral deposits such as rare earth elements (REEs), including Nb, Zr and Mn. These are often associated with U and Th bearing minerals, including monazite, samarskite and pyrochlore. Mining waste resulting from mineral processing activities can be highly radioactive and therefore poses a risk to human health and environment. The Jombo complex located in Kenya's south coastal region is potentially one of the richest sources of Nb and REEs in the world. It consists of the main intrusion at Jombo hill, three associated satellite intrusions at Mrima, Kiruku and Nguluku hills, and several dykes. The complex is highly heterogeneous with regard to its geological formation as it is characterized by alkaline igneous rocks and carbonatites which also influence its radio-ecological dynamics. In-situ gamma spectrometry offers a low-cost, rapid and spatially representative radioactivity estimate across a range of landscapes compared to conventional radiometric techniques. In this work, a wide ranging radiological survey was conducted in the Jombo complex as follow up on previous studies[1,2], to determine radiation exposure levels and source distributions, and perform radiological risk assessments. The in-situ measurements were carried out using a 2.0 l NaI(Tl) PGIS-2 portable detector from Pico Envirotec Inc integrated with GPS, deployed for ground (back-pack) and vehicular gamma-ray spectrometry. Preliminary results of radiological distribution and mapping will be presented. [1] Patel, J. P. (1991). Discovery and Innovation, 3(3): 31-35. [2] Kebwaro, J. M. et. al. (2011). J. Phys. Sci., 6(13): 3105-3110.

  10. Palaeomagnetism of the Puerto Vallarta intrusive complex and the accretion of the Guerrero terrain, Mexico

    Science.gov (United States)

    Böhnel, H.; Negendank, J. F. W.

    1988-11-01

    The batholith exposed around Puerto Vallarta is part of the Guerrero tectonostratigraphic terrain, presumably accreted to Mexico during the Laramide orogenic phase. Fourteen sites on this batholith were studied palaeomagnetically and geochemically. Nine sites define a paleopole at 76.6°N, 181.8°E, with α95 = 6.6°, coinciding with the reference pole for stable North America. It is proposed that no important movements of the region relative to North America have occurred since emplacement of the intrusive rocks ˜ 80 Ma ago. This would mean that the Guerrero terrain was accreted to the Mexican continental margin before that time. Geochemical data support this interpretation, characterizing the rocks as volcanic-arc granites intruded at an active continental margin.

  11. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  12. Intrusive hyaloclastite and peperitic breccias associated to sill and cryptodome emplacement on an Early Paleocene polymagmatic compound cone-dome volcanic complex from El Guanaco mine, Northern Chile

    Science.gov (United States)

    Páez, G. N.; Permuy Vidal, C.; Galina, M.; López, L.; Jovic, S. M.; Guido, D. M.

    2018-04-01

    This work explores the textural characteristics, morphology and facies architecture of well-preserved Paleocene hyaloclastic and peperitic breccias associated with subvolcanic intrusions at El Guanaco gold mine (Northern Chile). The El Guanaco mine volcanic sequence is part of a polymagmatic compound cone-dome volcanic complex grouping several dacitic domes and maar-diatremes, and subordinated subvolcanic intrusions of basaltic, andesitic and dacitic compositions. The Soledad-Peñafiel Fault System is a first order regional structure controlling the location and style of the volcanism in the region. Three different intrusive bodies (Basaltic sills, Dacitic cryptodomes and Andesitic cryptodomes) were found to intrude into a wet and poorly consolidated pyroclastic sequence representing the upper portions of a maar-diatreme. Consequently, extensive quench fragmentation and fluidization along their contacts occurred, leading to the formation of widespread breccia bodies enclosing a coherent nucleus. Differences in matrix composition allows to define two main breccias types: 1) poorly-sorted monomictic breccias (intrusive hyaloclastites) and 2) poorly-sorted tuff-matrix breccias (peperites). The observed facies architecture is interpreted as the result of the interplay of several factors, including: 1) magma viscosity, 2) the geometry of the intrusives, and 3) variations on the consolidation degree of the host rocks. Additionally, the overall geometry of each intrusive is interpreted to be controlled by the effective viscosity of the magmas along with the available magma volume at the time of the intrusions. The presence of three compositionally different subvolcanic bodies with intrusive hyaloclastite and peperite envelopes indicate, not only that all these intrusions occurred in a short period of time (probably less than 2-3 Ma), but also that the volcaniciclastic pile suffer little or none compaction nor consolidation during that time. The presence of three

  13. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    DEFF Research Database (Denmark)

    Wotzlaw, Joern-Frederik; Bindeman, Ilya N.; Schaltegger, Urs

    2012-01-01

    This paper presents a new high-precision zircon U-Pb geochronological view on the crystallization and assembly process of one of the most important and intensely studied intrusive bodies on Earth the Skaergaard intrusion in East Greenland. With analytical uncertainties of a few tens of thousands......, with the youngest population of 55.838 +/- 0.019 Ma postdating intrusion of the Basistoppen Sill by 57 +/- 37 ka. Oxygen isotope analyses reveal that SH zircons are low and heterogeneous with respect to delta O-18. These results support the proposed conclusion that the SH crystallized twice: it was fully...

  14. Vapor Intrusion

    Science.gov (United States)

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  15. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    Science.gov (United States)

    Wotzlaw, Jörn-Frederik; Bindeman, Ilya N.; Schaltegger, Urs; Brooks, C. Kent; Naslund, H. Richard

    2012-11-01

    This paper presents a new high-precision zircon U-Pb geochronological view on the crystallization and assembly process of one of the most important and intensely studied intrusive bodies on Earth—the Skaergaard intrusion in East Greenland. With analytical uncertainties of a few tens of thousands of years, we were able to resolve several important events during cooling of this intrusion. Initial cooling of the shallowly intruded ˜300 km3 of tholeiitic basaltic magma from liquidus to zircon saturation at ˜1000 °C is recorded by a precise zircon crystallization age of 55.960±0.018 Ma of an intercumulus gabbroic pegmatite in the lower portion of the intrusion. Based on this zircon crystallization age and a published cooling model we estimate the "true" age of emplacement to be ˜56.02 Ma. The last portions of Skaergaard appear to crystallize completely ˜100 ka after emplacement as recorded by abundant ˜55.91-55.93 Ma zircons in the Sandwich Horizon (SH), where lower and upper solidification fronts met. Intrusion of an isotopically distinct new magma batch, the ˜600 m thick Basistoppen Sill, into the solidified upper portion of Skaergaard, happened at 55.895±0.018 Ma, suggesting close timing between crystallization of evolved rocks around the SH and intrusion of the Basistoppen Sill. The novel result of this work is the demonstration that zircons in the SH, >100 m below the Basistoppen contact, have a bimodal age distribution, with the youngest population of 55.838±0.019 Ma postdating intrusion of the Basistoppen Sill by 57±37 ka. Oxygen isotope analyses reveal that SH zircons are low and heterogeneous with respect to δ18O. These results support the proposed conclusion that the SH crystallized twice: it was fully crystalline, then hydrothermally-altered by low-δ18O surface waters and subsequently partially remelted, triggered by heat of the Basistoppen Sill. The low-degree partial melt generated during remelting partially migrated upward by intergranular

  16. Petrogenesis and metallogenesis of the Wajilitag and Puchang Fe-Ti oxide-rich intrusive complexes, northwestern Tarim Large Igneous Province

    Science.gov (United States)

    Zhang, Dongyang; Zhang, Zhaochong; Huang, He; Cheng, Zhiguo; Charlier, Bernard

    2018-04-01

    The Wajilitag and Puchang intrusive complexes of the Tarim large igneous province (TLIP) are associated with significant resources of Fe-Ti oxide ores. These two mafic-ultramafic intrusions show differences in lithology and mineral chemistry. Clinopyroxenite and melagabbro are the dominant rock types in the Wajilitag complex, whereas the Puchang complex is generally gabbroic and anorthositic in composition with minor plagioclase-bearing clinopyroxenites in the marginal zone. Disseminated Fe-Ti oxide ores are found in the Wajilitag complex and closely associated with clinopyroxenites, whereas the Puchang complex hosts massive to disseminated Fe-Ti oxide ores mainly within its gabbroic rocks. The Wajilitag intrusive rocks are characterized by a restricted range of initial 87Sr/86Sr ratios (0.7038-0.7048) and positive εNd(t) (+0.04 - +3.01), indicating insignificant involvement of continental crustal contamination. The slightly higher initial 87Sr/86Sr ratios (0.7039-0.7059) and lower εNd(t) values (-1.05 - +2.35) of the Puchang intrusive rocks also suggest that the isotopic characteristics was controlled primarily by their mantle source, rather than by crustal contamination. Both complexes have Sr-Nd isotopic compositions close the neighboring kimberlitic rocks and their hosted mantle xenoliths in the TLIP. This indicates that the ferrobasaltic parental magmas were most probably originated from partial melting of a metasomatized subcontinental lithospheric mantle, modified recently with subduction-related materials by the impingement of the ascending mantle plume. The recycled subduction-related materials preserved in the lithospheric mantle could play a key role in the formation of the parental Fe-rich magmas in the context of an overall LIP system. The distinct variations in mineral assemblage for each complex and modeled results indicated that the Wajilitag and Puchang complexes experienced different crystallization path. Fe-Ti oxides in Wajilitag joined the

  17. New U-Pb ages in the Diablillos Intrusive Complex, Southern Puna, Argentina: A long magmatic event in the Paleozoic Arc, SW Gondwana

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz, Agustin; Hauser, Natalia [Universidade de Brasilia (UnB), DF (Brazil). Instituto de Geociencias. Lab. de Geocronologia; Becchio, Raul; Nieves, Alexis; Suzano, Nestor [Universidad Nacional de Salta (UNSa)-CONICET, Salta (Argentina)

    2015-07-01

    The Puna geological region comprises Salta, Jujuy and Catamarca provinces, northwestern Argentina. This 4000 meter above sea level high-plateau region lies between the Central Argentinian Andes. The Puna basement in the central Andes consists of Proterozoic–Paleozoic metamorphic rocks and granitoids. Diverse authors, proposed different models to explain the origin of the basement, where two orogenic events are recognized: the Pampean (Upper Precambrian–Lower Cambrian) and Famatinian (Upper Cambrian–Lower Silurian) (e.g. Ramos et al., 1986; Ramos, 1988; Loewy et al., 2004; for opposite points of view see Becchio et al., 1999; Bock et al., 2000; Buttner et al., 2005). Hence, Lucassen et al. (2000) proposed for the Central Andean basement, an evolution in a mobile belt, where the Pampean and Famatinian cycles are not distinct events but, they are one single, non-differentiable event from 600 to 400 Ma. The mobile belt culminated in low-P/ high-T metamorphism at approximately 525-500 Ma. Then, these were followed by a long-lasting high-thermal gradient regime in the mid-crust until Silurian times. Becchio et al., (2011) defined the Diablillos Intrusive Complex (CID, by its Spanish name), emplaced in the Inca Viejo Range. This range splits the Salares Ratones-Centenario with the Salar Diablillos (Fig.1). This Complex is located in the Eastern Magmatic Belt, Southern Puna, Argentina. Here we present new zircons U-Pb ages by LA-MC-ICPMS in the Diablillos Intrusive Complex, contributing to understanding the magmatic event in the lower Paleozoic arc, SW Gondwana. (author)

  18. Lu-Hf isotopic memory of plume-lithosphere interaction in the source of layered mafic intrusions, Windimurra Igneous Complex, Yilgarn Craton, Australia

    Science.gov (United States)

    Nebel, O.; Arculus, R. J.; Ivanic, T. J.; Nebel-Jacobsen, Y. J.

    2013-10-01

    Most layered mafic intrusions (LMI) are formed via multiple magma injections into crustal magma chambers. These magmas are originally sourced from the mantle, likely via plume activity, but may interact with the overriding lithosphere during ascent and emplacement in the crust. The magma injections lead to the establishment of different layers and zones with complex macroscopic, microscopic and cryptic compositional layering through magmatic differentiation and associated cumulate formation, sometimes accompanied by crustal assimilation. These complex mineralogical and petrological processes obscure the nature of the mantle sources of LMI, and typically have limited the degree to which parental liquids can be fully characterised. Here, we present Lu-Hf isotope data for samples from distinct layers of the Upper Zone of the Windimurra Igneous Complex (WIC), an immense late-Archean LMI in the West Australian Yilgarn Craton. Lu-Hf isotope systematics of whole rocks are well correlated (MSWD=5.6, n=17) with an age of ˜3.05±0.05 Ga and initial ɛHf˜+8. This age, however, is older than whole rock Sm-Nd and zircon U-Pb ages of the intrusion, both of which are ca. 2.8 Ga. Stratigraphically-controlled initial Hf isotope variations (associated with multiple episodes of emplacement at ca. 2.8 Ga) indicate isotope mixing between a near-chondritic and an ultra-radiogenic component, the latter with ɛHf[2.8 Ga]>+15. This Hf isotope mixing creates a pseudochron-relationship at the time of intrusion of ˜250 Myr that is superimposed on subsequent radiogenic ingrowth after crystallisation, generating an age that predates the actual emplacement event. Mixing between late-stage crystallisation products (melt + crystals) from the Middle Zone and replenishing, plume-derived liquids was followed by crystal accumulation in a chemically evolving magma chamber. The ultra-radiogenic Hf isotope endmember in the WIC mantle source requires parent-daughter ratios consistent with very early

  19. Mechanism and duration of plutonic processes in oceanic crust: the example of the South Rallier du Baty intrusive complex, Kerguelen Archipelago

    Science.gov (United States)

    Ponthus, Léandre; Guillaume, Damien; de Saint Blanquat, Michel; le Romancer, Marc; Pearson, Norman; Grégoire, Michel; O'Reilly, Sue Y.

    2017-04-01

    The Kerguelen plateau was initiated by a large-scale tholeiitic-transitional magmatic episode. The rocks of the Kerguelen archipelago, dominated by basalts, record an evolution from this early transitional magmatism to Kerguelen plume-related alkaline magmatism. The latter is characterised by a wide range of volcanic and plutonic rocks from basic to differentiated felsic rocks, which outcrop at different locations in the archipelago but are especially abundant in the southwest of Kerguelen archipelago. This is the location of outcrop of the South Rallier Du Baty Intrusive Center (SRDBIC) which constitutes the largest plutonic body, classically interpreted as a cauldron. The SRDBIC is an elliptical plutonic body of 13 by a minimum of 17 km with a N100-110 long axis. The rock composition range from gabbro to quartz rich-syenite and define a typical alkaline oversaturated magmatic serie. The contact is generally outward dipping but we have identified two contrasting geometries: one steeply dipping and crosscutting the basaltic lava flows, the other more shallowly dipping and concordant. At the scale of the Kerguelen archipelago, the orientation of the basaltic lava flows constituting the wall-rocks of the SRDBIC is very regular but is not strictly horizontal, showing a low dip (3-5°) toward the SE, due to recent tilting. We observe a change in this orientation when approaching the SRDBIC: all around the east and south margins of the SRDBIC, we measure a progressive tilting of the plateau basalts, reaching dips of 20-40° away from the SRDBIC. The amplitude of this tilt suggests that the thickness of the SRDIC is between 2.5 and 3.5 km, defining a total volume of 200-400 km3. The spatial coincidence between this change in basalt orientation and the intrusive centre clearly shows a causal relationship related to uplifting of the plateau basalts during the formation of the SRDBIC. Field observations and fabric studies show that the plutonic complex was formed by

  20. Dome-shaped Form for the Granite Pluton of the Lavras do Sul Intrusive Complex (South Brazil) Revealed by Magnetic Fabrics

    Science.gov (United States)

    Raposo, M. B.; Gastal, M. P.

    2008-12-01

    Magnetic fabric and rock magnetism studies were performed on "isotropic" granites from the main intrusion of the Lavras do Sul intrusive Complex pluton (LSIC, Rio Grande do Sul). This intrusion is a roughly N-S elongated ellipsoidal pluton (12x18km) composed of alkali-calcic and alkaline granitoids, with the alkaline granites at the margin of the pluton. Magnetic fabrics were determined by applying both anisotropy of low- field magnetic susceptibility (AMS) and anisotropy of anhysteretic remanent magnetization (AARM). The AARM fabrics are coaxial with AMS fabrics. The parallelism between the AMS and AARM tensors excludes the presence of a single domain (SD) effect on the AMS fabric of the granites. Several rock-magnetism experiments performed in one specimen from each sampled site show that for all sites magnetic susceptibility is dominantly carried by ferromagnetic minerals, and mainly coarse-grained magnetite carries the magnetic fabrics. Fabric patterns (lineation and foliation) in the granites were successful determined by applying the magnetic methods. Magnetic lineations (Kmax) are gently plunging and roughly parallel to pluton elongation whereas the magnetic foliations (normal to Kmin) tend to follow the contacts between the granites. They are outerwardly gently dipping inside the pluton and become either steeply southwesterly dipping or vertical towards its margin. The lack of solid-state deformation at outcrops and at thin sections scales precludes deformation after full crystallization of the granites from the LSIC pluton. This evidence allows us to interpret magnetic fabric in the analyzed granites as primarily the result of internal magma chamber dynamics reflecting magma flow. The foliation pattern displays a dome-shaped form for the granites. However, the alkaline granites (syenogranite and perthite granite), which outcrop in the south of the studied area have an inward-dipping foliation whereas for the other granites it dips outwards. It suggests

  1. The Dovyren Intrusive Complex (Southern Siberia, Russia): Insights into dynamics of an open magma chamber with implications for parental magma origin, composition, and Cu-Ni-PGE fertility

    Science.gov (United States)

    Ariskin, Alexey; Danyushevsky, Leonid; Nikolaev, Georgy; Kislov, Evgeny; Fiorentini, Marco; McNeill, Andrew; Kostitsyn, Yuri; Goemann, Karsten; Feig, Sandrin T.; Malyshev, Alexey

    2018-03-01

    The Dovyren Intrusive Complex (DIC, Northern Baikal region, 728 Ma) includes the layered dunite-troctolite-gabbronorite Yoko-Dovyren massif (YDM), associated mafic-ultramafic sills, and dykes of olivine-rich to olivine-free gabbronorite. Major rock types of the DIC are presented, including a diversity of olivine orthocumulates to olivine-plagioclase and gabbroic adcumulates, carbonate-contaminated ultramafics and Cu-Ni-PGE mineralisation. Detailed comparisons of complete cross-sections of the YDM in its centre and at the NE and SW margins demonstrate differences in the cumulate succession, mineral chemistry, and geochemical structure that likely reflect variations in parental magma compositions. Combining petrochemical reconstructions for most primitive rocks and calculations using the COMAGMAT-5 model, it is shown that the central and peripheral parts of the intrusion formed by olivine-laden parental magmas ranged in their temperatures by 100 °C, approximately from 1290 °C ( 11 wt% MgO, olivine Fo88) to 1190 °C ( 8 wt% MgO, olivine Fo86). Thermodynamic modelling suggests that the most primitive high-Mg magma was S-undersaturated, whereas its derivatives became S-saturated at T temperatures, producing Cu-rich sulphide precursors, which gave rise to the 'platinum group mineral' (PGM-containing) troctolite and low-mineralised PGE-rich anorthosite in the Main Reef. The geochemical structure of the YDM demonstrates C-shaped distributions of TiO2, K2O, P2O5, and incompatible trace elements, which are 3-5 fold depleted in the cumulate rocks from the inner horizons of the intrusion with respect to the relatively thin lower and upper contact zones. In addition, a marked misbalance between estimates of the average composition of the YDM and that of the proposed olivine-laden parental magmas is established. This misbalance reflects a significant deficit of the YDM in incompatible elements, which argues that 60-70% of basaltic melts had to have been expelled from the

  2. Petrography, geochemistry, and U-Pb geochronology of pegmatites and aplites associated with the Alvand intrusive complex in the Hamedan region, Sanandaj-Sirjan zone, Zagros orogen (Iran)

    Science.gov (United States)

    Sepahi, Ali Asghar; Salami, Sedigheh; Lentz, David; McFarlane, Christopher; Maanijou, Mohammad

    2017-07-01

    The Alvand intrusive complex in the Hamedan area in Iran is in the Sanandaj-Sirjan zone of the Zagros orogen. It consists of a wide range of plutonic rocks, mainly gabbro, diorite, granodiorite, granite, and leucogranites that were intruded by aplitic and pegmatitic dykes. At least three successive magmatic episodes generated an older gabbro-diorite-tonalite assemblage, followed by a voluminous granodiorite-granite association, which was then followed by minor leucocratic granitoids. Aplitic and pegmatitic dykes and bodies have truncated both plutonic rocks of the Alvand intrusive complex and its metamorphic aureole. Chemically they belong to peraluminous LCT (Li-, Cs-, and Ta-bearing) family of pegmatites. Mineralogically, they resemble Muscovite (MS) and Muscovite Rare Element (MSREL) classes of pegmatites. High amounts of some elements, such as Sn (up to 10,000 ppm), Rb (up to 936 ppm), Ba (up to 706 ppm), and LREE (up to 404 ppm) indicate the highly fractionated nature of some of these aplites and pegmatites. U-Pb dating of monazite, zircon, and allanite by LA-ICPMS indicate the following ages: monazite-bearing aplites of Heydareh-e-Poshteshahr and Barfejin areas, southwest of Hamedan, give an age range of 162-172 Ma; zircon in Heydareh-e-Poshteshar gives an average age of 165 Ma and for allanite-bearing pegmatites of Artiman area, north of Tuyserkan, an age of 154.1 ± 3.7 Ma was determined. These overlap with previously reported ages (ca. 167-153 Ma) for the plutonic rocks of the Alvand complex. Therefore, these data reveal that the Jurassic was a period of magmatism in the Hamedan region and adjacent areas in the Sanandaj-Sirjan zone, which was situated at the southern edge of the central Iranian micro-plate (southern Eurasian plate) at this time. Our results also suggest that advective heating in a continental arc setting has caused melting of fertile supracrustal lithologies, such as meta-pelites. These partial melts were then emplaced at much higher

  3. U-Pb age in zircon of intrusive granite at Acopiara complex, Crystal region, domain Central Ceara, Brazil

    International Nuclear Information System (INIS)

    Neri, T.F.O.; Hamelak, G.M.S.; Azevedo, L.R.; Mattos, I.C.; Verissimo, C.U.V.; Nogueira Neto, J.A.; Lima, M.N.

    2015-01-01

    Granitic body mineralogically composed by two micas, located at Crystal region, Ceara Central domain and intruded into lithotypes from Acopiara complex, provided an age of ∼526 Ma, indicating important period of magma generation of granitic composition associated with crustal anatexia, during Paleozoic

  4. Petrographic aspects of the intrusive complex of Arroyo Marincho and granodiorite of Arroyo Grande.Part I

    International Nuclear Information System (INIS)

    Preciozzi, F.

    2011-01-01

    The epimetamorphis of Arroyo Grande formation (lower Precambrian) are integrated by several granitoid bodies. The Marincho complex represented by;a) main unit integrated by hornoblenditic diorite to mozongranite b) an incomformable belt of porfinoblastic honobledite c) one unit characterized by a two mica granite heterogranular to porphiroic.The petrographic diagrams shows evolutive lines, suggestings differentd origins for the main granodiorite, granodiorite the Arroyo Grande, south granite and the hornoblendites.

  5. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  6. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  7. Development of computer program ENAUDIBL for computation of the sensation levels of multiple, complex, intrusive sounds in the presence of residual environmental masking noise

    Energy Technology Data Exchange (ETDEWEB)

    Liebich, R. E.; Chang, Y.-S.; Chun, K. C.

    2000-03-31

    The relative audibility of multiple sounds occurs in separate, independent channels (frequency bands) termed critical bands or equivalent rectangular (filter-response) bandwidths (ERBs) of frequency. The true nature of human hearing is a function of a complex combination of subjective factors, both auditory and nonauditory. Assessment of the probability of individual annoyance, community-complaint reaction levels, speech intelligibility, and the most cost-effective mitigation actions requires sensation-level data; these data are one of the most important auditory factors. However, sensation levels cannot be calculated by using single-number, A-weighted sound level values. This paper describes specific steps to compute sensation levels. A unique, newly developed procedure is used, which simplifies and improves the accuracy of such computations by the use of maximum sensation levels that occur, for each intrusive-sound spectrum, within each ERB. The newly developed program ENAUDIBL makes use of ERB sensation-level values generated with some computational subroutines developed for the formerly documented program SPECTRAN.

  8. No evidence for differential dose effects of hydrocortisone on intrusive memories in female patients with complex post-traumatic stress disorder--a randomized, double-blind, placebo-controlled, crossover study.

    Science.gov (United States)

    Ludäscher, Petra; Schmahl, Christian; Feldmann, Robert E; Kleindienst, Nikolaus; Schneider, Miriam; Bohus, Martin

    2015-10-01

    Post-traumatic stress disorder is characterized by intrusive traumatic memories. Presently, a controversial debate is ongoing regarding whether reduced cortisol secretion in post-traumatic stress disorder promotes an automatic retrieval of trauma-associated memories. Hence, a pharmacological elevation of cortisol was proposed to decrease post-traumatic stress disorder symptoms, particularly intrusions. The present study investigated the impact of two different doses of hydrocortisone on automatic memory retrieval using a randomized, double-blind, placebo-controlled, crossover study in 30 inpatients with post-traumatic stress disorder. All participants were female and received various psychotropic medications. They were randomly assigned to one of two groups within a crossover design: they received either 1 week placebo followed by 1 week hydrocortisone 10/d, followed by 1 week placebo, followed by hydrocortisone 30 mg/d (15 participants) or 1 week hydrocortisone 30 mg/d, followed by 1 week placebo, followed by 1 week hydrocortisone 10 mg/d, followed by 1 week placebo (15 participants). The outcome measures were the frequency and the intensity of intrusions, the overall symptomatology of post-traumatic stress disorder and the general psychopathology. We did not find any differences in the frequency and the intensity of post-traumatic stress disorder-related intrusions between the 10 mg hydrocortisone, the 30 mg hydrocortisone and the placebo condition. All effect sizes for the hydrocortisone condition vs. placebo were very small. Additionally, the overall symptomatology of post-traumatic stress disorder and the general psychopathology did not differ between the hydrocortisone therapies and placebo. Our results do not show any effect of the hydrocortisone administration on intrusions in complex post-traumatic stress disorder. © The Author(s) 2015.

  9. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  10. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  11. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  12. The Development of Agent Information for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro

    2017-10-01

    Full Text Available As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

  13. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  14. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  15. Oceanic thermohaline intrusions: theory

    Science.gov (United States)

    Ruddick, Barry; Kerr, Oliver

    2003-03-01

    This is a review of theories governing growth and evolution of thermohaline intrusive motions. We discuss theories based on eddy coefficients and salt finger flux ratios and also on molecular Fickian diffusion, drawing relationships and parallels where possible. We discuss linear theories of various physical configurations, effects of rotation and shear, and nonlinear theories. A key requirement for such theories to become quantitatively correct is the development and field testing of relationships between double-diffusive fluxes and average vertical gradients of temperature and salinity. While we have some ideas about the functional dependencies and rough observational constraints on the magnitudes of such flux/gradient relationships, many questions will not be answered until usable ‘flux laws’ exist. Furthermore, numerical experiments on double-diffusive intrusions are currently feasible, but will have more quantitative meaning when fluxes are parameterised with such laws. We conclude that more work needs to be done in at least two areas. Firstly, tests of linear theory against observations should continue, particularly to discover the extent to which linear theories actually explain the genesis of intrusions. Secondly, theoretical studies are needed on the nonlinear effects that control the evolution and finite amplitude state of intrusions, since these determine the lateral fluxes of salt, heat, and momentum.

  16. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  17. Mineralogy and geochemistry of triassic carbonatites in the Matcha alkaline intrusive complex (Turkestan-Alai Ridge, Kyrgyz Southern Tien Shan), SW Central Asian orogenic belt

    Science.gov (United States)

    Vrublevskii, V. V.; Morova, A. A.; Bukharova, O. V.; Konovalenko, S. I.

    2018-03-01

    Postorogenic intrusions of essexites and alkaline and nepheline syenites in the Turkestan-Alai segment of the Kyrgyz Southern Tien Shan coexist with dikes and veins of carbonatites dated at ∼220 Ma by the Ar-Ar and Rb-Sr age methods. They are mainly composed of calcite and dolomite (60-85%), as well as sodic amphibole, phlogopite, clinopyroxene, microcline, albite, apatite, and magnetite, with accessory niobate, ilmenite, Nb-rutile, titanite, zircon, baddeleyite, monazite-(Ce), barite, and sulfides. The rocks share mineralogical and geochemical similarity with carbonatites that originated by liquid immiscibility at high temperatures above 500 °C. Alkaline silicate and salt-carbonate melts are derived from sources with mainly negative bulk εNd(t) ∼ from -11 to 0 and high initial 87Sr/86Sr ratios (∼0.7061-0.7095) which may be due to mixing of PREMA and EM-type mantle material. Pb isotopic ratios in accessory pyrrhotite (206Pb/204Pb = 18.38; 207Pb/204Pb = 15.64; 208Pb/204Pb = 38.41) exhibit an EM2 trend. The intrusions bear signatures of significant crustal contamination as a result of magma genesis by syntexis and hybridism. Concordant isotope composition changes of δ13C (-6.5 to -1.9‰), δ18O (9.2-23‰), δD (-58 to -41‰), and δ34S (12.6-12.8‰) in minerals and rocks indicate inputs of crustal material at the stage of melting and effect of hot fluids released during dehydration of metamorphosed oceanic basalts or sediments. The observed HFSE patterns of the oldest alkaline gabbro may be due to interaction of the primary mafic magma with IAB-type material. The isotope similarity of alkaline rocks with spatially proximal basalts of the Tarim large igneous province does not contradict the evolution of the Turkestan-Alai Triassic magmatism as the "last echo" of the Tarim mantle plume.

  18. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  19. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  20. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    protection in the United States. AFIT-ENG-13-M-49 NETWORK INTRUSION DATASET ASSESSMENT THESIS Presented to the Faculty Department of Electrical and...conclusions as to its use as a benchmark dataset vary: Cho et al. [10] recommend not using the KDD99 dataset at all, while Engen et al. [16] suggest that...more care be taken in interpretation of results, but recommend continued use. As discussed by Engen et al. [16], researchers continue to use the KDD99

  1. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  2. Report: Vapor Intrusion Health Risks at Bannister Federal Complex Not a Concern for Buildings 50 and 52, Unknown for Other Buildings

    Science.gov (United States)

    Report #11-P-0048, January 5, 2011. Testing at Bannister Federal Complex in February 2010 revealed elevated levels of volatile organic compounds (VOCs) in the soil vapor beneath the foundations of buildings 50 and 52.

  3. Wireless Intrusion Detection

    Science.gov (United States)

    2007-03-01

    LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Frequency Error (kHz) Figure 3-8 Frequency error Distributions...0.40 0.45 Linksys/CIAMPIAJ1 Linksys/LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Received Power (dBm) Figure 3-10...Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Rise-Time (samples) Figure 3-12 Packet Rise-Time Distributions During Intrusion

  4. Motion effects on intrusion development

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Holmes, E.A.; Becker, E.S.

    2010-01-01

    Analogue studies on intrusion development have found that visuospatial tasks performed during the encoding of aversive information reduce subsequent intrusion development. However, these studies cannot rule out a physical explanation in terms of simple movement. In the current study we addressed

  5. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  6. A simplified approach to true molar intrusion

    Directory of Open Access Journals (Sweden)

    Flieger Stefanie

    2012-11-01

    Full Text Available Abstract Background Orthodontic management of anterior open bites is a demanding task for orthodontists. Molar intrusion as a primary means of open bite correction entails the need for appropriate anchorage. Orthodontic mini implants can provide the required mechanical support. The suggested procedure aims to reduce the risk of complications such as root damage or soft tissue irritations while minimizing overall complexity. Methods Three female patients aged 14, 18 and 19 years who decided against a surgical correction were treated with a device consisting of mini implants in the palatal slope, a palatal bar and intrusion cantilevers. Results In all three patients, an open bite reduction of more than a millimeter occurred within four months. An anterior overbite of 2 mm or more could be established within 6 to 9 months. Conclusions The method presented in this article enables the practitioner to use mini implants in an easily accessible insertion site. A lab-side procedure is optional but not required.

  7. Monitoring CO2 Intrusion in shallow aquifer using complex electrical methods and a novel CO2 sensitive Lidar-based sensor

    Science.gov (United States)

    Leger, E.; Dafflon, B.; Thorpe, M.; Kreitinger, A.; Laura, D.; Haivala, J.; Peterson, J.; Spangler, L.; Hubbard, S. S.

    2016-12-01

    While subsurface storage of CO2 in geological formations offers significant potential to mitigate atmospheric greenhouse gasses, approaches are needed to monitor the efficacy of the strategy as well as possible negative consequences, such as leakage of CO2 or brine into groundwater or release of fugitive gaseous CO2. Groundwater leakages can cause subsequent reactions that may also be deleterious. For example, a release of dissolved CO2 into shallow groundwatersystems can decrease groundwater pH which can potentiallymobilize naturally occurring trace metals and ions. In this perspective, detecting and assessing potential leak requires development of novel monitoring techniques.We present the results of using surface electrical resistivity tomography (ERT) and a novel CO2 sensitive Lidar-based sensor to monitor a controlled CO2 release at the ZeroEmission Research and Technology Center (Bozeman, Montana). Soil temperature and moisture sensors, wellbore water quality measurements as well as chamber-based CO2 flux measurements were used in addition to the ERT and a novel Lidar-based sensor to detect and assess potential leakage into groundwater, vadose zone and atmosphere. The three-week release wascarried out in the vadose and the saturated zones. Well sampling of pH and conductivity and surface CO2 fluxes and concentrations measurements were acquired during the release and are compared with complex electricalresistivity time-lapse measurements. The novel Lidar-based image of the CO2 plume were compared to chamber-based CO2 flux and concentration measurements. While a continuous increase in subsurface ERT and above ground CO2 was documented, joint analysis of the above and below ground data revealed distinct transport behavior in the vadose and saturated zones. Two type of transport were observed, one in the vadoze zone, monitored by CO2 flux chamber and ERT, and the other one in the saturated zone, were ERT and wellsampling were carried. The experiment suggests how

  8. Work zone intrusion alarm effectiveness.

    Science.gov (United States)

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  9. Environment-Sensitive Intrusion Detection

    National Research Council Canada - National Science Library

    Giffin, Jonathan T; Dagon, David; Jha, Somesh; Lee, Wenke; Miller, Barton P

    2006-01-01

    .... We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy...

  10. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  11. An immunological approach to intrusion detection

    OpenAIRE

    Watkins, A.

    2000-01-01

    This paper presents an examination of intrusion detection schemes. It discusses\\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\\ud effective, approach to intrusion detection as modeled on the human immune system. The\\ud discussion looks at some of the implications raised by intrusion detection research for\\ud information security in general.

  12. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  13. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    (Chattopadhyay and Hashmi 1984; Maitra 1992;. Srivastava et al 2005; Srivastava ... Keywords. Melanite garnet; nepheline syenite minor intrusion; Mesozoic magmatism; Mawpyut complex; Meghalaya plateau. J. Earth Syst. Sci. 120, No. 6, December 2011, pp. ... dated 110–120 Ma (Coffin et al 2002; Srivastava et al 2005).

  14. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    present technique. The present technique may be useful for monitoring refractive indices of active chemical solutions which was not possible with intrusive-type FO sensors. 2. Sensor principle. For a circular beam of light with cross-sectional area A, incident at an angle θi on the surface of a second medium, the power ...

  15. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system.

  16. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position.

  17. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index ...

  18. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  19. Computer Network Equipment for Intrusion Detection Research

    National Research Council Canada - National Science Library

    Ye, Nong

    2000-01-01

    .... To test the process model, the system-level intrusion detection techniques and the working prototype of the intrusion detection system, a set of computer and network equipment has been purchased...

  20. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  1. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  2. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-12-15

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  4. Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

    OpenAIRE

    Jiang, Hayang; Xie, Gaogang; Salamatian, Kavé; Mathy, Laurent

    2013-01-01

    Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. Both hardware accelerated and parallel software-based NIDS solutions, based on commodity multi-core and GPU processors, have been proposed to overcome these challenges. Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. ...

  5. Ratio of Major Ions in Groundwater to Determine Saltwater Intrusion in Coastal Areas

    Science.gov (United States)

    Sudaryanto; Naily, Wilda

    2018-02-01

    Saltwater or seawater intrusion into groundwater aquifers occurs mostly in big cities and developing coastal cities. Coastal hydrology is associated with complex and highly dynamic environmental characteristics of interactions between groundwater, surface water, and water from the estuary. The rise of sea levels and excessive use of groundwater for clean water source trigger saltwater intrusion. Identification of saltwater intrusion into groundwater can be done by groundwater sampling and major ion analysis. The major ions dissolved in water are Ca, Mg, Na, K, Cl, HCO3, and SO4; the major ion ratios are Cl/Br, Ca/Mg, Ca/ (HCO3 and SO4), and Na/Cl. By knowing whether groundwater quality has been or has not been influenced by saltwater, groundwater zones can be determined in every coastal area. In addition, by analyzing and reviewing some concepts about the intrusion or contamination of saltwater into groundwater, there will be sufficient results for the identification of saltwater intrusion.

  6. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  7. Emplacement of sandstone intrusions during contractional tectonics

    Science.gov (United States)

    Palladino, Giuseppe; Grippa, Antonio; Bureau, Denis; Alsop, G. Ian; Hurst, Andrew

    2016-08-01

    Sandstone injections are created by the forceful emplacement of remobilized sand in response to increases in overpressure. However, the contribution provided by horizontal compressive stress to the build-up in overpressure, and the resulting emplacement of sand injection complexes, is still to be substantiated by robust field observations. An opportunity to address this issue occurs in Central California where a large volume of sandstone intrusions record regionally-persistent supra-lithostatic pore-pressure. Detailed fieldwork allows sandstone-filled thrusts to be recognized and, for the first time, permits us to demonstrate that some sandstone intrusions are linked to contractional deformation affecting the western border of the Great Valley Basin. Fluidized sand was extensively injected along thrust surfaces, and also fills local dilatant cavities linked to thrusting. The main aims of this paper are to provide detailed descriptions of the newly recognized syn-tectonic injections, and describe detailed cross-cutting relationships with earlier sandstone injection complexes in the study area. Finally, an evolutionary model consisting of three phases of sand injection is provided. In this model, sand injection is linked to contractional tectonic episodes affecting the western side of the Great Valley Basin during the Early-Middle Cenozoic. This study demonstrates that sand injections, driven by fluid overpressure, may inject along thrusts and folds and thereby overcome stresses associated with regional contractional deformation. It is shown that different generations of sand injection can develop in the same area under the control of different stress regimes, linked to the evolving mountain chain.

  8. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  9. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  10. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  11. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  12. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    Sulfide intrusion in seagrasses represents a global threat to seagrasses. In contrast seegrasses grow in hostile sediments, where they are constantly exposed to sulfide intrusion. Little is known about the strategies to survive sulfide intrusion, if there are detoxification mechanisms and sulfur...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  13. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  14. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  15. Geochronology of the Neogene intrusive magmatism of the Oaș—Gutâi Mountains, Eastern Carpathians (NW Romania)

    Science.gov (United States)

    Kovacs, Marinel; Pécskay, Zoltán; Fülöp, Alexandrina; Jurje, Maria; Edelstein, Oscar

    2013-12-01

    Earlier geological work in the Oaș-Gutâi Mts (OG), Eastern Carpathians, has revealed the extensive presence of shallow subvolcanic intrusive bodies, both exposed on the surface and covered by Paleogene-Neogene sedimentary sequences and Neogene volcanic formations. This study is based on detailed mapping and sampling of the OG Neogene intrusive magmatic rocks. Thirty seven representative intrusions (sills, dykes, microlaccoliths, etc.) were selected for radiometric dating. These intrusions show a wide variety of petrographic rock-types: from microgabbros to microgranodiorites and from basalts to andesites. However, the intrusions consist of typical calc-alkaline, medium-K rocks, similar to the volcanic rocks which outcrop in the same areas. The K-Ar age determinations on whole-rock samples of intrusions yielded ages between 11.9 Ma and 7.0 Ma (from Late Sarmatian to Middle Pannonian). The results are in good agreement with the common assumption, based on the biostratigraphic and geological data, that large volumes of intrusions have formed during the paroxysm of the intermediate volcanic activity in the OG. Except for the Firiza basalt intrusive complex of the Gutâi Mts (8.1-7.0 Ma), the OG intrusions show similar K-Ar ages as the intrusions of the "Subvolcanic Zone" and Călimani Mts from Eastern Carpathians. The timing of the OG intrusive magmatism partially overlaps with the timing of the intrusive magmatic activity in the Eastern Moravia and Pieniny Mts. The systematic radiometric datings in the whole OG give clear evidence that the hydrothermal activity related to the epithermal systems always postdates intrusion emplacement.

  16. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  17. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...

  18. Traumatic intrusions as 'worse case scenario's'.

    Science.gov (United States)

    Merckelbach, H; Muris, P; Horselenberg, R; Rassin, E

    1998-11-01

    While some clinicians assume that traumatic intrusions are historically accurate revisualizations of traumatic incidents, others have suggested that these types of intrusions may represent a worse case scenario (i.e. exaggerated) version of the trauma. To explore this issue, a survey was conducted among undergraduate students (N = 189). Of the 69 respondents who had been the victim of or witness to a relatively recent trauma, 15 (22%) reported an exaggerated perception of the traumatic incident. Exaggerated intrusions were found to have more flashback qualities and tended to have a higher frequency than 'realistic' intrusions. These findings are well in line with the idea that intrusions are not necessarily veridical copies of traumatic events.

  19. Magma chamber processes in central volcanic systems of Iceland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Tegner, Christian

    2009-01-01

    New field work and petrological investigations of the largest gabbro outcrop in Iceland, the Hvalnesfjall gabbro of the 6-7 Ma Austurhorn intrusive complex, have established a stratigraphic sequence exceeding 800 m composed of at least 8 macrorhythmic units. The bases of the macrorhythmic units......3 of clinopyroxene and magnetite indicative of magma replenishment. Some macrorhythmic units show mineral trends indicative of up-section fractional crystallisation over up to 100 m, whereas others show little variation. Two populations of plagioclase crystals (large, An-rich and small, less An...... olivine basalts from Iceland that had undergone about 20% crystallisation of olivine, plagioclase and clinopyroxene and that the macrorhythmic units formed from thin magma layers not exceeding 200-300 m. Such a "mushy" magma chamber is akin to volcanic plumbing systems in settings of high magma supply...

  20. Influence of age, thought content, and anxiety on suppression of intrusive thoughts.

    Science.gov (United States)

    Beadel, Jessica R; Green, Jennifer S; Hosseinbor, Shahrzad; Teachman, Bethany A

    2013-08-01

    Understanding differences in responses following attempts to suppress versus simply monitor intrusive thoughts is important given the established relationship between intrusive thinking and numerous forms of psychopathology. Moreover, these differences may vary as a function of age. Because of the links between aging and both enhancement in emotion regulation skills and decline in inhibition skills, older and younger adults were expected to differ in their responses (e.g., experience of negative affect and thought recurrence) to attempts at suppressing intrusive thoughts. This study examined whether efforts to suppress thought content that varied in valence and age-relevance differentially affected older (N=40, aged 66-92) and younger (N=42, aged 16-25) adults' ability to inhibit intrusive thought recurrence and their resulting negative affect. Interestingly, older adults experienced less recurrence for most thoughts than younger adults. Also, for several dependent variables (negative affect and perceived difficulty suppressing intrusive thoughts), older adults showed less decline in their magnitude of response across thinking periods (i.e., from suppression to monitoring) than did younger adults. These age effects were not generally moderated by level of trait anxiety, though higher anxiety did predict intrusive thought responding in expected directions, such as greater negative affect. These findings point to independent influences of age and anxiety, and suggest a complex mix of risk and protective factors for older adults' responses to intrusive thoughts. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    Science.gov (United States)

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  2. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  3. A New Method for Intrusion Detection using Manifold Learning Algorithm

    OpenAIRE

    Guoping Hou; Xuan Ma; Yuelei Zhang

    2013-01-01

    Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion fea...

  4. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  5. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  6. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  7. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  8. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  9. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    is known about the strategies of seagrasses to survive sulfide intrusion, their potential detoxification mechanisms and sulfur nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  10. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  11. Alkaline intrusion in a granulite ensemble in the Eastern Ghats belt ...

    Indian Academy of Sciences (India)

    The alkaline complex of Koraput, Orissa, India, is one of several bodies in the high-grade Eastern Ghats belt, but this one is an integral part of the high-grade belt and remote from the western boundary against the Bastar craton. The Koraput complex forms a lozenge-shaped intrusion into the metapelitic granulites and is ...

  12. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  13. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  14. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  15. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  16. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  17. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  18. Dimensionality reduction using Principal Component Analysis for network intrusion detection

    Directory of Open Access Journals (Sweden)

    K. Keerthi Vasan

    2016-09-01

    Full Text Available Intrusion detection is the identification of malicious activities in a given network by analyzing its traffic. Data mining techniques used for this analysis study the traffic traces and identify hostile flows in the traffic. Dimensionality reduction in data mining focuses on representing data with minimum number of dimensions such that its properties are not lost and hence reducing the underlying complexity in processing the data. Principal Component Analysis (PCA is one of the prominent dimensionality reduction techniques widely used in network traffic analysis. In this paper, we focus on the efficiency of PCA for intrusion detection and determine its Reduction Ratio (RR, ideal number of Principal Components needed for intrusion detection and the impact of noisy data on PCA. We carried out experiments with PCA using various classifier algorithms on two benchmark datasets namely, KDD CUP and UNB ISCX. Experiments show that the first 10 Principal Components are effective for classification. The classification accuracy for 10 Principal Components is about 99.7% and 98.8%, nearly same as the accuracy obtained using original 41 features for KDD and 28 features for ISCX, respectively.

  19. The neural representation of intrusive thoughts

    Science.gov (United States)

    Schmiedek, Florian; Brose, Annette; Schott, Björn H.; Lindenberger, Ulman; Lövden, Martin

    2013-01-01

    Based on the philosophical notion that language embodies thought we investigated whether a habitual tendency for intrusive thought that younger and older participants report over a period of 100 sessions, spread out over about 6 months, is associated with brain regions related to language production. In favour of this hypothesis, we found that individual differences in habitual intrusive thoughts are correlated with activity in the left inferior frontal gyrus (IFG, Broca’s area) as well as the cingulate cortex (CC) during a two-choice reaction-time task in fMRI. Participants who habitually tended to experience intrusive thoughts showed greater activity during task-free (baseline) compared to task periods in brain regions involved in language production. Task performance was unrelated to individual differences in intrusive thoughts. We conclude that intrusive thoughts may be represented in a language-like format and that individuals reporting a habitually higher tendency for intrusive thoughts may have stronger and more habitual inner speech processes. PMID:22563007

  20. U-Pb age in zircon of intrusive granite at Acopiara complex, Crystal region, domain Central Ceara, Brazil; Idade U-PB em zircao de granito intrusivo no Complexo Acopiara, Regiao de Cristais, Dominio Ceara Central

    Energy Technology Data Exchange (ETDEWEB)

    Neri, T.F.O.; Hamelak, G.M.S.; Azevedo, L.R.; Mattos, I.C.; Verissimo, C.U.V.; Nogueira Neto, J.A., E-mail: neri@ufc.br [Universidade Federal do Ceara (UFC), Fortaleza (Brazil). Departamento de Geologia; Lima, M.N. [Universidade Federal de Goias (UFGO), Goiania, GO (Brazil). Curso de Geologia

    2015-07-01

    Granitic body mineralogically composed by two micas, located at Crystal region, Ceara Central domain and intruded into lithotypes from Acopiara complex, provided an age of ∼526 Ma, indicating important period of magma generation of granitic composition associated with crustal anatexia, during Paleozoic.

  1. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  2. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  3. Emplacement of ultramafic-carbonatite intrusions along reactivated North American mid-continent rift structures

    Science.gov (United States)

    Shavers, Ethan J.; Ghulam, Abduwasit; Encarnacion, John; Hartling, Sean

    2017-08-01

    Understanding the various emplacement pathways of ultramafic‑carbonatite intrusive complexes and mapping of their global distribution are in an early stage. Discerning the pattern of their emplacement can reveal information about earth's dynamics and guide exploration for associated economic deposits. Here we apply multiple spatial analysis methods and synthetic aperture radar (SAR) data to assess the correlation between outcrops of ultramafic‑carbonatite intrusives and regional craton-scale fractures and assign targets for further exploration. Kernel density cluster, two-point azimuth, and the Fry method two-dimension spatial analyses are applied to 58 known outcrops of intrusives in the Avon Volcanic District (AVD), southeast Missouri USA. The results of the spatial analysis show linear trends among the outcrops with three primary orientations: northwest, northeast, and east-west and a strong correlation with regional fault zones. SAR data processing and analysis guided by the spatial results reveals rhombic lineament patterns with sides that parallel the northwest-northeast emplacement patterns of the AVD. These rhombic structures are related to possible extensional stepover duplexes, likely formed during Precambrian North American plate rifting along transfer faults. Reactivation of the Precambrian structures during high angle dip slip and wrench faulting that was penecontemporaneous with emplacement of the AVD in the Devonian likely provided pathways for the mantle-derived intrusives. These findings can guide exploration efforts and help us understand the emplacement of a unique intracontinental intrusive complex.

  4. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  5. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  6. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  7. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  8. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  9. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  10. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2001-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  11. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2002-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  12. FPGA-based network intrusion detection for IEC 61850-based industrial network

    Directory of Open Access Journals (Sweden)

    Junsik Kim

    2018-03-01

    Full Text Available This paper proposes an FPGA-based network intrusion detection system for the IEC 61850-based industrial network that is specially designed for substation automation. The proposed system uses the Shift-And algorithm for detecting malicious network packets within IEC 61850 messages. To implement a complex rule matching module with a limited memory size of FPGA, a specially designed rule matching module was proposed in this paper. For feasibility evaluation, a prototype with 265 regular expression matching modules was implemented using Xilinx Zynq-7030 FPGA and its performance is presented in this paper. Keywords: Network intrusion detection system (NIDS, IEC 61850, Regular expression, Substation automation, FPGA

  13. Web Defacement and Intrusion Monitoring Tool: WDIMT

    CSIR Research Space (South Africa)

    Masango, Mfundo G

    2017-09-01

    Full Text Available at altering the content of the web pages or to make the website inactive. This paper proposes a Web Defacement and Intrusion Monitoring Tool, that could be a possible solution to the rapid identification of altered or deleted web pages. The proposed tool...

  14. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  15. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  16. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    https://dx.doi.org/10.4314/jasem.v21i2.18. Key words: Escravos, Vertical electrical sounding, Saltwater Intrusion, freshwater lenses, Aquifer, groundwater. Globally groundwater contributes a greater percentage of water usage in domestic, irrigation of agricultural farms and industrial purposes. Though groundwater is not the ...

  17. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  18. Vapor Intrusion Characterization Report (Revision 1.0)

    Science.gov (United States)

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  19. On the Feasibility of Intrusion Detection Inside Workstation Disks

    National Research Council Canada - National Science Library

    Griffin, John L; Pennington, Adam; Bucy, John S; Choundappan, Deepa; Muralidharan, Nithya; Ganger, Gregory R

    2003-01-01

    Storage-based intrusion detection systems (IDSs) can be valuable tools in monitoring for and notifying administrators of malicious software executing on a host computer, including many common intrusion tool kits...

  20. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  1. Management of multiple intrusive luxative injuries: A case report with 7-year follow-up

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2014-01-01

    Full Text Available This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 7 years. Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 7 years, no clinical or radiographic pathology was detected.

  2. As, Bi, Hg, S, Sb, Sn and Te geochemistry of the J-M Reef, Stillwater Complex, Montana: constraints on the origin of PGE-enriched sulfides in layered intrusions

    Science.gov (United States)

    Zientek, M.L.; Fries, T.L.; Vian, R.W.

    1990-01-01

    The J-M Reef is an interval of disseminated sulfides in the Lower Banded series of the Stillwater Complex that is enriched in the platinum group elements (PGE). Palladium and Pt occur in solid solution in base-metal sulfides and as discrete PGE minerals. PGE minerals include sulfides, tellurides, arsenides, antimonides, bismuthides, and alloys with Fe, Sn, Hg, and Au. Several subpopulations can be delineated based on whole-rock chemical analyses for As, Bi, Cu, Hg, Pd, Pt, S, Sb and Te for samples collected from and adjacent to the J-M Reef. In general, samples from within the reef have higher Pt/Cu, Pd/Cu, Pd/Pt, Te/Bi and S/(Te+Bi) than those collected adjacent to the reef. Vertical compositional profiles through the reef suggest that Pd/Cu and Pt/Cu decrease systematically upsection from mineralized to barren rock. The majority of samples with elevated As, Sb and Hg occur adjacent to the reef, not within it, or in sulfide-poor rocks. Neither magma mixing nor fluid migration models readily explain why the minor quantities of sulfide minerals immediately adjacent to the sulfide-enriched layers that form the J-M Reef have different element ratios than the sulfide minerals that form the reef. If all the sulfides formed by exsolution during a magma mixing event and the modal proportion of sulfide now in the rocks are simply the result of mechanical processes that concentrated the sulfides into some layers and not others, then the composition of the sulfide would not be expected to be different. Models that rely upon ascending liquids or fluids are incompatible with the presence of sulfides that are not enriched in PGE immediately below or interlayered with the PGE-enriched sulfides layers. PGE-enriched postcumulus fluids should have reacted to the same extent with sulfides immediately outside the reef as within the reef. One explanation is that some of the sulfide minerals in the rocks outside the reef have a different origin than those that make up the reef. The

  3. Thermal effects of water intrusion in hydrophobic nanoporous materials.

    Science.gov (United States)

    Karbowiak, Thomas; Paulin, Christian; Ballandras, Anthony; Weber, Guy; Bellat, Jean-Pierre

    2009-07-29

    Liquid water intrusion in hydrophobic nanoporous silicalite-1, a pure siliceous zeolite, in isothermal conditions under high pressure produces an endothermic effect. After intrusion, confined water in zeolite pores is in a different state from that of the liquid bulk water. Such forced intrusion also chemically modifies the material and tends to render it slightly more hydrophilic.

  4. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  5. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  6. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  7. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  8. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  9. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  10. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  11. Intrusion Learning: An Overview of an Emergent Discipline

    Directory of Open Access Journals (Sweden)

    Tony Bailetti

    2016-02-01

    Full Text Available The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.

  12. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  13. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  14. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  15. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  16. Noble gas systematics of the Skaergaard intrusion

    Science.gov (United States)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Raatmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  17. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  18. Can an experimental self-efficacy induction through autobiographical recall modulate analogue posttraumatic intrusions?

    Science.gov (United States)

    Krans, Julie; Brown, Adam D; Moulds, Michelle L

    2018-03-01

    Research has shown a link between self-efficacy appraisals and PTSD symptoms. Less is known about the relation between perceived self-efficacy and specific PTSD symptoms such as intrusions. These two experiments tested the causal relationship between perceived self-efficacy and intrusions from a trauma film. In Experiment I, healthy student participants received a self-efficacy manipulation consisting of the recall of autobiographical memories of success (high self-efficacy condition), failure (low self-efficacy condition) or 'important' memories (control condition). Afterwards, they viewed a trauma film and recorded their intrusions of the film in the following week. In Experiment II the self-efficacy manipulation was given after the film. In contrast to expectations, the high self-efficacy condition reported a higher number of intrusions relative to the low self-efficacy condition in both experiments. The trauma film provides experimental control but precludes generalization to real-life trauma. The effect of the experimental manipulation was small. The control condition also affected mood and confidence. The results suggest that the relation between self-efficacy and intrusions development is causal, but not straightforward. Recalling personal memories of success before or after a traumatic event may increase the risk of developing intrusions, at least under some circumstances. Conversely, recalling past failure experiences may be protective, perhaps by preparing the individual for adversity, or prompting them to search for coping strategies that have been successful in the past. Overall, autobiographical recall involves complex processes related to the self that could be useful but need to be more fully understood. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  20. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  1. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  2. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  3. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  4. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  5. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  6. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  7. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2015-09-01

    Training enhancement (not treatment)  Addressing intrusive thoughts (secondary prevention of PTSD ?? decrease distress)  Mindfulness based intervention...AWARD NUMBER: W81XWH-09-1-0535 TITLE: Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts PRINCIPAL INVESTIGATOR...SUBTITLE 5a. CONTRACT NUMBER W81XWH-09-1-0535 Enhancing BATTLEMIND: Preventing PTSD by Coping With Intrusive Thoughts 5b. GRANT NUMBER 08194004

  8. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  9. A deposit model for carbonatite and peralkaline intrusion-related rare earth element deposits: Chapter J in Mineral deposit models for resource assessment

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.; Seal, Robert R.; McCafferty, Anne E.

    2014-01-01

    Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. A wide variety of other commodities have been exploited from carbonatites and alkaline igneous rocks including niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other elements enriched in these deposits include manganese, strontium, tantalum, thorium, vanadium, and uranium. Carbonatite and peralkaline intrusion-related rare earth element deposits are presented together in this report because of the spatial, and potentially genetic, association between carbonatite and alkaline rocks. Although these rock types occur together at many locations, carbonatite and peralkaline intrusion-related rare earth element deposits are not generally found together.

  10. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  11. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  12. Estimation of crystallization pressure of granite intrusions

    Science.gov (United States)

    Yang, Xue-Ming

    2017-08-01

    A numerical method is presented to estimate the crystallization pressure of granite intrusions based on two polynomial equations obtained by an analysis of the existing haplogranite ternary phase diagram and associated dataset. The results indicate that the pressure is correlated respectively with normative quartz (Qtz) content and with normative albite (Ab) plus orthoclase (Or) contents of granitic rocks as follows. where P is pressure in MPa, and R denotes correlation coefficient. It is noted that the procedure of normalizing the sum of CIPW norm (quartz, albite, orthoclase) contents to 100% is required before using Eqs. (1) and (2). The difference in pressure calculations between these two equations is ≤ 16 MPa for the range of normative quartz contents from 15 to 40 wt%. An example of how to use these equations to estimate the crystallization pressure of a granite intrusion is also provided to show the validity and convenience of this method. The uncertainty of such pressure estimation is not well known, although it must fall into the uncertainty range of the existing experimental work on pressure constraints. The simplicity of this empirical method is appreciable, although its applicability to natural granitoids needs further test. More experimental work is required to constrain the effects of components, such as CaO, FeO, MgO, F, Cl, CO2, on the granite phase equilibria. These equations, however, can be used for estimating crystallization pressures of water-saturated and quartz-oversaturated granitic systems.

  13. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  14. Molar Intrusion in Open-bite Adults Using Zygomatic Miniplates.

    Science.gov (United States)

    Marzouk, Eiman S; Abdallah, Essam Mohamed; El-Kenany, Walid A

    2015-01-01

    The aim of this study is to evaluate the skeletal, dental and soft tissue changes that arise after intrusion of the maxillary molars using zygomatic miniplates in adult skeletal anterior open bite patients. In addition to measuring the amount and rate of molar intrusion; with special emphasis on changes in the axial inclination of the intruded molars. The study group was composed of 13 anterior open bite patients (mean age 18 years, 8 months ± 2 years, 2 months) with posterior dentoalveolar excess. Mini-plates were placed in the zygomatic buttress bilaterally. The upper arch was segmentally leveled and a double Trans-Palatal Arch (TPA) was bonded. Closed NiTi coil spring was placed bilaterally between the book of the mini-plate just mesial and distal to the first molar buccal tube applying intrusive force of 450 gper side. Lateral and posteroanterior cephalograms were taken before intrusion (T1: post upper segmental leveling) and after intrusion (T2). Comparison between means before and after the intrusion was done using Wilcoxon Signed Ranks test (WSRT). Mandibular autorotation followed the molar intrusion, SNB and SN-Pog angles significantly increased while the ANB, MP-SN angle and N-S-Gn angle significantly decreased. The mean amount of accomplished molar intrusion was 3.1mm ± 0.74mm, with a rate of 0.36mm per month ± 0.08mm per month and a bite closure of 6.55mm ± 1.83mm. There was no significant buccal tip in the right and left molars upon intrusion. Conclusion: Miniplates zygomatic anchorage can be used effectively for skeletal open bite correction through posterior dento-alveolar intrusion. Intrusion of the posterior teeth with skeletal anchorage induced counterclockwise rotation of the mandible and, as a consequence, corrected the anteroposterior intermaxillary relationship with a dramatic improvement in the facial soft tissue convexity.

  15. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  16. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  17. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  18. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    Science.gov (United States)

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  19. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  20. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  1. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  2. Statistical decision making for authentication and intrusion detection

    NARCIS (Netherlands)

    Dimitrakakis, C.; Mitrokotsa, A.

    2009-01-01

    User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose alternatives based on a

  3. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    A fairly good fitness between the observed and computed values was obtained by a manual trial-and-error method. ... controlling seawater intrusion in such coastal aquifer systems. 1. Introduction. Seawater intrusion constitutes a ..... reveals that FEFLOW is an effective and robust simulation tool for studying variable-density.

  4. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The

  5. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    through honeypots, machines explicitly designated solely to learn the methods used by black-hats to probe and hack a system so that a network...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration

  6. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  7. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  8. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  9. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  10. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  11. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  12. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  13. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  14. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  15. Poleward intrusion in the northern Galician shelf

    Science.gov (United States)

    Alvarez, I.; Ospina-Alvarez, N.; deCastro, M.; Varela, M.; Gomez-Gesteira, M.; Prego, R.

    2010-05-01

    The evolution of a warm water mass related to the Iberian Poleward Current (IPC) was characterized along the northern Galician shelf in November 2008 by means of Sea Surface Temperature and wind data. It was observed that under upwelling favorable conditions water temperature decreased along the northern coast and a temperature break appeared between Cape Vilano and Cape Ortegal showing a relaxation of the poleward intrusion. The effect of the IPC was also analyzed inside the Northern Galician Rias taking into account the hydrographical and biogeochemical properties measured on November 18. Water driven by the IPC was observed close to the mouth of the rias, around Cape Estaca de Bares, causing a nutrient salts decrease. Inside the rias a slight biological activity was found near surface resulting from fluvial contributions.

  16. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Youssef, Tarek [Florida Intl Univ., Miami, FL (United States); El Hariri, Mohammad [Florida Intl Univ., Miami, FL (United States); Habib, Hani [Florida Intl Univ., Miami, FL (United States); Mohammed, Osama [Florida Intl Univ., Miami, FL (United States); Harmon, E [Florida Intl Univ., Miami, FL (United States)

    2017-02-28

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware to trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.

  17. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  18. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  19. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  20. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  1. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  2. The Experience of Intrusions Scale: a preliminary examination.

    Science.gov (United States)

    Salters-Pedneault, Kristalyn; Vine, Vera; Mills, Mary Alice; Park, Crystal; Litz, Brett T

    2009-01-01

    Intrusive thoughts (i.e., unwelcome, distressing, involuntary thoughts) are prevalent in a variety of clinical conditions and are increasingly a focus of translational research. The goal of this study was to develop and preliminarily examine a brief self-report measure designed to assess clinically relevant aspects of the experience of intrusive thoughts related to a particular target. The Experience of Intrusions Scale (EIS) is a five-item measure that assesses the frequency, unpredictability, and unwantedness of intrusive thoughts, as well as the interference and distress caused by the intrusions, each on a five-point Likert-type scale. Five times over a four-] period, female undergraduates (N=160) completed the EIS in response to intrusive thoughts regarding a film clip depicting a sexual assault. On the first and last days, participants completed the EIS five minutes after watching the clip. In between film clip viewings, participants completed the EIS once per day. The EIS demonstrated good internal consistency, good to excellent test-retest reliability using both immediate post-stimulus and 24-hour time intervals, and convergent validity with two existing measures of intrusive phenomena: the White Bear Suppression Inventory (Wegner & Zanakos, 1994) and the Post-traumatic Stress Disorder Checklist-Civilian Version (Weathers, Litz, Herman, Huska, & Keane, 1993).

  3. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. The Mesozoic-Cenozoic igneous intrusions and related sediment-dominated hydrothermal activities in the South Yellow Sea Basin, the Western Pacific continental margin

    Science.gov (United States)

    Yumao, Pang; Xunhua, Zhang; Guolin, Xiao; Luning, Shang; Xingwei, Guo; Zhenhe, Wen

    2018-04-01

    Various igneous complexes were identified in multi-channel seismic reflection profiles from the South Yellow Sea Basin. It is not rare that magmatic intrusions in sedimentary basins cause strong thermal perturbations and hydrothermal activities. Some intrusion-related hydrothermal vent complexes have been identified and they are considered to originate from the deep sedimentary contact aureole around igneous intrusions and terminate in upper vents structures, and are linked by a vertical conduit system. The upper vent complexes are usually eye-shaped, dome-shaped, fault-related, crater-shaped or pock-shaped in seismic profiles. A schematic model was proposed to illustrate the structures of different types of hydrothermal vent complexes. A conceptual conduit model composed of an upper pipe-like part and a lower branching part was also derived. Hydrothermal vent complexes mainly developed during the Middle-Late Cretaceous, which is coeval with, or shortly after the intrusion. The back-arc basin evolution of the area which is related to the subduction of the Paleo-Pacific plate during the Mesozoic-Cenozoic may be the principal factor for voluminous igneous complexes and vent complexes in this area. It is significant to study the characteristics of igneous complexes and related hydrothermal vent complexes, which will have implications for the future study of this area.

  5. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  6. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  7. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    International Nuclear Information System (INIS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware. (paper)

  8. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  9. Intrusion signature creation via clustering anomalies

    Science.gov (United States)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  10. A Review of Vapor Intrusion Models

    Science.gov (United States)

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulation, and can increase the difficulty of obtaining a solution, especially when explicitly considering coupled oxygen transport and consumption. The models of contaminant building entry pathway are often coupled to calculations of indoor air contaminant concentration, and both are influenced by building construction and operational features. The description of entry pathway involves consideration of building foundation characteristics, while calculation of indoor air contaminant levels requires characterization of building enclosed space and air exchange within this. This review summarizes existing VI models, and discusses the limits of current screening tools commonly used in this field. PMID:23360069

  11. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  12. Simulating the influence of groundwater table fluctuation on vapor intrusion

    Science.gov (United States)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  13. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  14. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  15. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  16. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  17. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  18. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  19. Slick: An Intrusion Detection System for Virtualized Storage Devices

    NARCIS (Netherlands)

    Bacs, A.; Giuffrida, C.; Grill, B.; Bos, H.J.; Ossowski, Sascha

    2016-01-01

    Cloud computing is rapidly reshaping the server administration landscape. The widespread use of virtualization and the increasingly high server consolidation ratios, in particular, have introduced unprecedented security challenges for users, increasing the exposure to intrusions and opening up new

  20. Information Assurance Intrusion Detection Sensor Database Design: Lessons Learned

    National Research Council Canada - National Science Library

    Spink, Brian

    2001-01-01

    Current architectural trends in information assurance for the DOD focuses on the fusion and correlation of large volumes of data collected across several intrusion detection systems and boundary devices...

  1. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  2. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  3. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  4. Risk-Based Evaluation of Total Petroleum Hydrocarbons in Vapor Intrusion Studies

    Directory of Open Access Journals (Sweden)

    Roger Brewer

    2013-06-01

    Full Text Available This paper presents a quantitative method for the risk-based evaluation of Total Petroleum Hydrocarbons (TPH in vapor intrusion investigations. Vapors from petroleum fuels are characterized by a complex mixture of aliphatic and, to a lesser extent, aromatic compounds. These compounds can be measured and described in terms of TPH carbon ranges. Toxicity factors published by USEPA and other parties allow development of risk-based, air and soil vapor screening levels for each carbon range in the same manner as done for individual compounds such as benzene. The relative, carbon range makeup of petroleum vapors can be used to develop weighted, site-specific or generic screening levels for TPH. At some critical ratio of TPH to a targeted, individual compound, the overwhelming proportion of TPH will drive vapor intrusion risk over the individual compound. This is particularly true for vapors associated with diesel and other middle distillate fuels, but can also be the case for low-benzene gasolines or even for high-benzene gasolines if an adequately conservative, target risk is not applied to individually targeted chemicals. This necessitates a re-evaluation of the reliance on benzene and other individual compounds as a stand-alone tool to evaluate vapor intrusion risk associated with petroleum.

  5. Criticality Potential of Waste Packages Containing DOE SNF Affected by Igneous Intrusion

    International Nuclear Information System (INIS)

    D.S. Kimball; C.E. Sanders

    2006-01-01

    The Department of Energy (DOE) is currently preparing an application to submit to the U.S. Nuclear Regulatory Commission for a construction authorization for a monitored geologic repository. The repository will contain spent nuclear fuel (SNF) and defense high-level waste (DHLW) in waste packages placed in underground tunnels, or drifts. The primary objective of this paper is to perform a criticality analysis for waste packages containing DOE SNF affected by a disruptive igneous intrusion event in the emplacement drifts. The waste packages feature one DOE SNF canister placed in the center and surrounded by five High-Level Waste (HLW) glass canisters. The effective neutron multiplication factor (k eff ) is determined for potential configurations of the waste package during and after an intrusive igneous event. Due to the complexity of the potential scenarios following an igneous intrusion, finding conservative and bounding configurations with respect to criticality requires some additional considerations. In particular, the geometry of a slumped and damaged waste package must be examined, drift conditions must be modeled over a range of parameters, and the chemical degradation of DOE SNF and waste package materials must be considered for the expected high temperatures. The secondary intent of this calculation is to present a method for selecting conservative and bounding configurations for a wide range of end conditions

  6. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  7. Classification of Intrusion Detection Dataset using machine learning Approaches

    OpenAIRE

    Neethu B

    2012-01-01

    The paper describes about a method of intrusion detection that uses machine learning algorithms. Here we discuss about the combinational use of two machine learning algorithms called Principal Component Analysis and Naive Bayes classifier. The dimensionality of the dataset is reduced by using the principal component analysis and the classification of the dataset in to normal and attack classes is done by using Naïve Bayes Classifier. The experiments were conducted on the intrusion detection d...

  8. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  9. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  10. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  11. FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    OpenAIRE

    Borgohain, Rajdeep

    2012-01-01

    With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion dete...

  12. Comparative study of adaptive-noise-cancellation algorithms for intrusion detection systems

    International Nuclear Information System (INIS)

    Claassen, J.P.; Patterson, M.M.

    1981-01-01

    Some intrusion detection systems are susceptible to nonstationary noise resulting in frequent nuisance alarms and poor detection when the noise is present. Adaptive inverse filtering for single channel systems and adaptive noise cancellation for two channel systems have both demonstrated good potential in removing correlated noise components prior detection. For such noise susceptible systems the suitability of a noise reduction algorithm must be established in a trade-off study weighing algorithm complexity against performance. The performance characteristics of several distinct classes of algorithms are established through comparative computer studies using real signals. The relative merits of the different algorithms are discussed in the light of the nature of intruder and noise signals

  13. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases.

    Science.gov (United States)

    Giménez-Forcada, Elena; Sánchez San Román, F Javier

    2015-01-01

    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water. © 2014, National GroundWater Association.

  14. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  15. Monitoring saltwater intrusion in Rupert Bay, Québec, Canada, after the partial diversion of a major tributary.

    Science.gov (United States)

    Métivier, Vincent; Massicotte, Bernard; Tremblay, Alain; Dupuis, Pierre

    2017-12-21

    As part of a large hydroelectric project in northern Québec (Canada), a portion of the flow of the Rupert River was diverted toward the existing La Grande hydroelectric complex. As a result of the partial diversion, the discharge of the Rupert River at its mouth is reduced by an average of 50% annually. This corresponds to an 18% decrease in the total freshwater inflow into the bay and, thus, to a shift of the upstream limit of the saltwater intrusion in Rupert Bay. Changes in saltwater intrusion had been predicted numerically as part of the project's environmental impact assessment (EIA). In the project's conditions of authorization, monitoring the hydraulic conditions and the extent of saltwater intrusion in the Rupert Bay was required by government authorities. The objective of this paper is to present the results of this environmental monitoring and, more specifically, to validate the modifications predicted in the EIA in terms of both saltwater intrusion limit and hydraulic conditions in the Rupert Bay. Results obtained during 2 years of monitoring are within the predicted trends and order of magnitude of changes anticipated in the EIA. The results, thus, confirm that the shift of the upstream limit of the saltwater front along the channels of the bay was conservatively predicted by numerical modeling.

  16. Groundwater Vulnerability to Seawater Intrusion along Coastal Urban Areas: A Quantitative Comparative Assessment of EPIK and DRASTIC

    Science.gov (United States)

    Momjian, Nanor; Abou Najm, Majdi; Alameddine, Ibrahim; El-Fadel, Mutasem

    2015-04-01

    Groundwater vulnerability assessment models are invariably coupled with Geographic Information Systems to provide decision makers with easier visualization of complex systems. In this study, we examine the uncertainty associated with such models (DRASTIC, EPIK) in assessing seawater intrusion, a growing threat along coastal urban cities due to overexploitation of groundwater resources associated with population growth and more recently, exacerbated by climate change impacts. For this purpose, a mapping of groundwater vulnerability was first conducted at a country level (Lebanon) and coupled with a groundwater quality monitoring program in three coastal cities for cross-validation. Then, six water quality categories were defined and mapped based on water quality standards ranging from drinking to seawater with weighted scores assigned for each category in both DRASTIC and EPIK for cross-validation. Finally, the results of groundwater quality tests were compared with vulnerability predictions at sampling points using two indicators (Chloride and TDS). While field measurements demonstrated the high vulnerability to seawater intrusion in coastal urbanized areas, the modelling results exhibited variations from field measurements reaching up to two water quality categories. Vertical-based vulnerability models demonstrated poor correlation when the anthropogenic impact was introduced through a process that depends on lateral groundwater flow thus highlighting (1) the limited ability of such models to capture vulnerability to lateral seawater intrusion induced primarily by vertical groundwater withdrawal, and (2) the need to incorporate depth and underlying lithology into the layers of groundwater vulnerability models when examining horizontally induced contamination such as seawater intrusion.

  17. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  18. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  19. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  20. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  1. Seismic signature of active intrusions in mountain chains.

    Science.gov (United States)

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  2. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  3. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  4. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  5. Recovery of freshwater marsh vegetation after a saltwater intrusion event.

    Science.gov (United States)

    Flynn, K M; McKee, K L; Mendelssohn, I A

    1995-07-01

    Greenhouse mesocosms of freshwater marsh vegetation were exposed to a simulated saltwater intrusion event followed by a recovery period during which water levels and interstitial water salinity were adjusted over a range of conditions. Virtually all above-ground vegetation, including the three dominant species, Sagittaria lancifolia L., Leersia oryzoides (L.) Swartz, and Panicum hemitomon Schultes, was killed by the initial saltwater intrusion event. P. hemitomon did not recover, but S. lancifolia and L. oryzoides, as well as many of the other species initially present, exhibited some ability to recover depending on post-saltwater intrusion conditions. Increasingly harsh recovery conditions (for freshwater marsh vegetation), including more reduced soil conditions, higher interstitial salinities, and higher interstitial sulfide concentrations were associated with decreased live above-ground biomass and species richness. The effect of elevated salinity on vegetative recovery became more pronounced under flooded conditions. This experiment illustrates that the response of a freshwater marsh community to the long-term disturbance effect of a transient saltwater intrusion event will be strongly influenced by post-intrusion salinity and water levels.

  6. A 3D potential field model of the Pilanesberg Complex shape and structure

    CSIR Research Space (South Africa)

    Lee, SA

    2013-10-01

    Full Text Available system of alkaline intrusions that includes two dyke swarms that radiate to the north-west and south of the Complex, as well as smaller circular clinopyroxene intrusions throughout the Bushveld Complex. The Pilanesberg dyke swarms and the circular...

  7. Distress and Recurrence of Intrusive Thoughts in Younger and Older Adults

    Science.gov (United States)

    Magee, Joshua C.; Teachman, Bethany A.

    2011-01-01

    The current study incorporated a lifespan perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults, despite not differing in the actual recurrence of the intrusive thought. With regard to distress, ooHAcrosslder adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts. PMID:21707184

  8. Distress and recurrence of intrusive thoughts in younger and older adults.

    Science.gov (United States)

    Magee, Joshua C; Teachman, Bethany A

    2012-03-01

    The current study incorporated a life span perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and they also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults despite the fact that they did not differ in the actual recurrence of the intrusive thought. With regard to distress, older adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but they were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts.

  9. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  10. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  11. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been...... developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...

  12. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  13. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  15. Intrusive upwelling in the Central Great Barrier Reef

    Science.gov (United States)

    Benthuysen, Jessica A.; Tonin, Hemerson; Brinkman, Richard; Herzfeld, Michael; Steinberg, Craig

    2016-11-01

    In the Central Great Barrier Reef, the outer continental shelf has an open reef matrix that facilitates the exchange of waters with the Coral Sea. During austral summer, cool water intrudes onto the shelf along the seafloor. Temperature observations reveal cool, bottom intrusions during a 6 year period from the Queensland Integrated Marine Observing System's Palm Passage mooring. A metric is used to identify 64 intrusion events. These intrusions predominantly occur from October to March including the wet season. During an event, the outer-shelf's near-bottom temperature decreases by 1-3°C typically over 1 week. The near-bottom salinity tends to increase, while near-surface changes do not reflect these tendencies. Intrusion events occur predominantly with either weakening equatorward winds or poleward wind bursts. A regional hydrodynamic model for the Great Barrier Reef captures the timing and amplitude of these intrusions. During intrusion events, isotherms tend to uplift over the continental slope and onto the shelf and the East Australian Current intensifies poleward. Over the shelf, a bottom-intensified onshore current coincides with bottom cooling. For numerous events, the model diagnostics reveal that the cross-shelf flow is dominated by the geostrophic contribution. A vertical circulation tilts the isopycnals upward on the southern side of the passage, causing an along-shelf density gradient and geostrophic onshore flow with depth. While wind fluctuations play a major role in controlling the along-shelf currents, model results indicate that a concurrent topographically induced circulation can assist the onshore spread of cool water.

  16. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. An Approach for Cross-Domain Intrusion Detection

    Science.gov (United States)

    2012-01-01

    supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view and manipulate network trace data...multilevel (trusted) components, supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view...component is implemented by the open source object-relational database system PostgreSQL 0). 4.4.3 Intrusion analysis engine The intrusion analysis

  18. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  19. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  20. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  1. Weakly intrusive low-rank approximation method for nonlinear parameter-dependent equations

    KAUST Repository

    Giraldi, Loic

    2017-06-30

    This paper presents a weakly intrusive strategy for computing a low-rank approximation of the solution of a system of nonlinear parameter-dependent equations. The proposed strategy relies on a Newton-like iterative solver which only requires evaluations of the residual of the parameter-dependent equation and of a preconditioner (such as the differential of the residual) for instances of the parameters independently. The algorithm provides an approximation of the set of solutions associated with a possibly large number of instances of the parameters, with a computational complexity which can be orders of magnitude lower than when using the same Newton-like solver for all instances of the parameters. The reduction of complexity requires efficient strategies for obtaining low-rank approximations of the residual, of the preconditioner, and of the increment at each iteration of the algorithm. For the approximation of the residual and the preconditioner, weakly intrusive variants of the empirical interpolation method are introduced, which require evaluations of entries of the residual and the preconditioner. Then, an approximation of the increment is obtained by using a greedy algorithm for low-rank approximation, and a low-rank approximation of the iterate is finally obtained by using a truncated singular value decomposition. When the preconditioner is the differential of the residual, the proposed algorithm is interpreted as an inexact Newton solver for which a detailed convergence analysis is provided. Numerical examples illustrate the efficiency of the method.

  2. The crust role at Paramillos Altos intrusive belt: Sr and Pb isotope evidence

    International Nuclear Information System (INIS)

    Ostera, H.A.; Linares, E; Haller, M.J; Cagnoni, M.C

    2001-01-01

    Paramillos Altos Intrusive Belt (PAIB) (Ostera, 1996) is located in the thick skinned folded-thrust belt of Malargue, southwestern Mendoza, Argentina. Geochemical, geochronologic and isotopic studies were carried out in it (Ostera 1996, 1997, Ostera et al. 1999; Ostera et al. 2000) and these previous papers suggested a minor involvement of the crust in the genesis of the PAIB. According with Ostera et al. (2000) it is composed by stocks, laccoliths, dykes and sills which range in composition from diorites to granodiorites, and from andesites to rhyolites, and divided in five Members, which range in age from Middle Miocene to Early Miocene: a- Calle del Yeso Dyke Complex (CYDC), with sills and dykes of andesitic composition (age: 20±2 Ma). b- Puchenque-Atravesadas Intrusive Complex (PAIC), composed by dykes and stocks ranging from diorites to granodiorites (age: 12.5±1 Ma). c- Arroyo Serrucho Stock (SAS), an epizonal and zoned stock, with four facies, with K/Ar and Ar/Ar dates of 10±1 and 9.5±0.5 Ma. d- Portezuelo de los Cerros Bayos (PCB), that includes porphyritic rocks of rhyolitic composition, of 7.5±0.5 Ma. e- Cerro Bayo Vitrophyres (CBV), with andesitic sills and dykes (age: 4.8±0.2 Ma). We present in this paper new Sr and Pb isotopes data that constrain the evolution of the PAIB (au)

  3. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  4. Alteration of Eudialyte and implications for the REE, ZR, and NB resources of the layered Kakortokites in the ILÍMAUSSAQ intrusion, South West Greenland

    DEFF Research Database (Denmark)

    Borst, Anouk Margaretha; Waight, Tod Earle; Smit, Matthijs Arjen

    2014-01-01

    The layered kakortokites in the southern part of the Ilímaussaq Intrusion are of great economic interest due to their high concentrations of REE, Zr, Nb and Ta. The prospective metals are largely contained in eudialyte, a complex sodium‐zirconosilicate and one of the major cumulus phases. Eudialyte...

  5. Alteration of Eudialyte and implications for the REE, ZR, and NB resources of the layered Kakortokites in the ILÍMAUSSAQ intrusion, South West Greenland

    DEFF Research Database (Denmark)

    Borst, Anouk Margaretha; Waight, Tod Earle; Smit, Matthijs Arjen

    2014-01-01

    The layered kakortokites in the southern part of the Ilímaussaq Intrusion are of great economic interest due to their high concentrations of REE, Zr, Nb and Ta. The prospective metals are largely contained in eudialyte, a complex sodium‐zirconosilicate and one of the major cumulus phases. Eudialy...

  6. Geophysical study of saline water intrusion in Lagos municipality

    African Journals Online (AJOL)

    aghomotsegin

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  7. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  8. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    1. Introduction. Seawater intrusion constitutes a prominent hydro- logical problem in many coastal areas of the world. It is generally defined as the encroachment of saline water into fresh groundwater domains in coastal aquifer settings (Werner and Simmons 2008). This phenomenon will occur when the natural equilib-.

  9. Intrusive Thoughts: A Primary Variable in Breakup Distress

    Science.gov (United States)

    Field, Tiffany; Diego, Miguel; Pelaez, Martha; Deeds, Osvelia; Delgado, Jeannette

    2013-01-01

    University students who were high versus low on breakup distress scores were given self-report measures to assess their intrusive thoughts about the romantic breakup and their somatic symptoms that followed the breakup as well as their extracurricular activities and social support that might alleviate their breakup distress. In a regression…

  10. Depressed mood mediates the relationship between rumination and intrusions

    NARCIS (Netherlands)

    Smets, Jorien; Luyckx, Koen; Wessel, Ineke; Raes, Filip

    2012-01-01

    Research suggests that rumination is a causal factor for intrusive memories. These are disturbing autobiographical memories that pop into one's mind involuntarily, spontaneously, and repetitively. A three-wave longitudinal study was conducted to replicate this finding and to test whether one route

  11. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the

  12. Fast Content-Based Packet Handling for Intrusion Detection

    National Research Council Canada - National Science Library

    Fisk, Mike

    2001-01-01

    ... use of Royer-Moore currently used in the popular intrusion detection platform Snort. We then measure the actual performance of several search algorithms on actual packet traces and rulesets. Our results provide lessons on the structuring of content-based handlers.

  13. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  14. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... A multisensor-based IDS enables identification of the intrusion patterns semantically by correlating the events and context information provided by multiple sensors. ... R Bhargavi1 V Vaidehi1. Department of Information Technology, Madras Institute of Technology, Anna University, Chennai 600 044, India ...

  15. A bagging approach to network intrusion detection | Adetunmbi ...

    African Journals Online (AJOL)

    The presences of these flaws make a secured system a mirage for now, hence the need for intrusion detection system. In this paper, an ensemble approach – Bagging was used on five different machine learning techniques to improve accuracy of classifiers. Machine learning seeks for methods of extracting hidden pattern ...

  16. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    user

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and. February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  17. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  18. Attenuating fearful memories: effect of cued extinction on intrusions.

    Science.gov (United States)

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  19. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  20. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  1. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  2. Saltwater Intrusion Simulation in Heterogeneous Aquifer Using Lattice Boltzmann Method

    Science.gov (United States)

    Servan-Camas, B.; Tsai, F. T.

    2006-12-01

    This study develops a saltwater intrusion simulation model using a lattice Boltzmann method (LBM) in a two- dimensional coastal confined aquifer. The saltwater intrusion phenomenon is described by density-varied groundwater flow and mass transport equations, where a freshwater-saltwater mixing zone is considered. Although primarily developed using the mesoscopic approach to solve macroscopic fluid dynamic problems (e.g. Navier-Stoke equation), LBM is able to be adopted to solve physical-based diffusion-type governing equations as for the groundwater flow and mass transport equations. The challenge of using LBM in saltwater intrusion modeling is to recover hydraulic conductivity heterogeneity. In this study, the Darcy equation and the advection-dispersion equation (ADE) are recovered in the lattice Boltzmann modeling. Specifically, the hydraulic conductivity heterogeneity is represented by the speed of sound in LBM. Under the consideration on the steady-state groundwater flow due to low storativity, in each time step the flow problem is modified to be a Poisson equation and solved by LBM. Nevertheless, the groundwater flow is still a time-marching problem with spatial-temporal variation in salinity concentration as well as density. The Henry problem is used to compare the LBM results against the Henry analytic solution and SUTRA result. Also, we show that LBM is capable of handling the Dirichlet, Neumann, and Cauchy concentration boundary conditions at the sea side. Finally, we compare the saltwater intrusion results using LBM in the Henry problem when heterogeneous hydraulic conductivity is considered.

  3. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  4. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    The abandonment of shallow boreholes is presumed to have been caused by saltwater intrusion from the ocean. ... The evidence revealed by the 2D electrical resistivity tomography investigation combined with geochemistry of groundwater from literature suggested that abandonment of shallow boreholes are probably not ...

  5. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal aquifers is generally three dimensional. (3-D) in nature. In the literature, there is a general lack ...

  6. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  7. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  8. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  9. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, R.; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  10. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  11. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  12. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    1Department of Civil Engineering, Regional Engineering College, Durgapur. 713 209, India. 2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal ...

  13. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  14. Intrusion detection for the solution of security problems

    International Nuclear Information System (INIS)

    Buchmueller, R.

    1982-01-01

    Constantly growing security problems in public as well as private sectors can no longer be solved without the use of modern intrusion detection systems. BBC, as general contractor, offers the system solutions to fully meet these problems. These solutions include analysis of the site to be protected, installation, commissioning and maintenance of the security system. (orig.) [de

  15. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 120; Issue 2. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh ... Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing.

  16. Groundwater quality degradation due to salt water intrusion in ...

    African Journals Online (AJOL)

    Saltwater intrusion problems are widespread where there are over pumping of groundwater from coastal aquifers. Water samples were collected from production boreholes in Zanzibar municipality and analyzed for salinity indication parameters comprising of chloride, electrical conductivity, total dissolved salts and ...

  17. Brief exercise enhances intrusive memories of traumatic stimuli.

    Science.gov (United States)

    Keyan, Dharani; Bryant, Richard A

    2017-05-01

    Brief physical exercise enhances memories for neutral events, and recently has been shown to modulate fear learning in animals. To date there is no evidence pertaining to the impact of exercise on emotional memories in humans. Accordingly, this study investigated the role of brief exercise in the development of emotional intrusive memories. Forty-nine university students (18-29year olds) viewed a car accident film depicting accident and injury, and were then randomly assigned to engage in either 10min of intense exercise or easy walking. Two days following the experiment participants were assessed for both intrusive memories of the film and intentional recall of film details. Results indicated that participants in the exercise relative to the walking condition reported more intrusive memories, but not voluntarily recalled memories, of the car accident film two days later. These findings are consistent with recent evidence of exercise-induced emotional learning in animals, and point to the potential for physical activity to contribute to the development of intrusions in the context of encoding emotionally-laden information. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  19. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  20. Geophysical study of saline water intrusion in Lagos municipality ...

    African Journals Online (AJOL)

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  1. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from ...

  2. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Science.gov (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  3. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  4. Microstructure in hardened cement pastes measured by mercury intrusion porosimetry and low temperature microcalorimetry

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Baroghel, V.B.; Künzel, H.M.

    1996-01-01

    , image analysis, mercury intrusion porosimetry and low temperature microcalorimetry.The present paper is dealing with cumulated pore size distributions measured by mercury intrusion porosimetry (MIP) from two laboratories (LCPC, IBP) and low temperature microcalorimetry (CAL) from one laboratory (BKM...

  5. Why do close partners snoop? Predictors of intrusive behavior in newlywed couples

    NARCIS (Netherlands)

    Vinkers, C. D. W.; Finkenauer, C.; Hawk, S. T.

    2011-01-01

    Existing research shows that intrusive behavior has detrimental consequences for relationships. Surprisingly, little is known about why close relationship partners snoop. This study examined why romantic partners engage in intrusive behavior among newlywed couples in the Netherlands. As predicted,

  6. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  7. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    Science.gov (United States)

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  8. A nonplanar slow rupture episode during the 2000 Miyakejima dike intrusion

    Science.gov (United States)

    Cattania, Camilla; Rivalta, Eleonora; Hainzl, Sebastian; Passarelli, Luigi; Aoki, Yosuke

    2017-03-01

    Magmatic intrusions release extensional strain in the Earth's crust upon availability of magma. Intrusions are typically accompanied by earthquake swarms and by surface faulting that is often larger than what is expected from the magnitude of the induced earthquakes. The 2000 Miyakejima dike intrusion triggered the largest volcanic earthquake swarm monitored so far, with five Ml>6 earthquakes. We analyze the seismicity and deformation induced by the Miyakejima dike with the aim of constraining the timescale and mechanisms of slow strain release during the episode. In six earthquake bursts lasting few hours and migrating at ˜1 km h-1 we find candidates for slow earthquakes. Each burst nucleated at the tips of previous bursts, suggesting stress interaction. The variability of fault plane solutions indicates that the bursts occurred on a complex system of fractures, consistent with weakly consolidated surface layers strained by spatially inhomogneous stresses that change in time, such as those induced by a dike. Based on dislocation models, we find that deformation is best explained by aseismic slip (in addition to the seismic burst), with a moment 1.3 to 2.3 times larger than the earthquakes' seismic moment, and opening of 0.20 ± 0.07 m on the dike. The aseismic slip occurred over a few hours, with moment, duration, and migration velocity consistent with that of previously observed slow slip events. We argue that the seismic bursts are likely driven by slow slip, sharing most properties with tectonic slow slip events and swarms, but occurring on a set of nonaligned faults.

  9. Water intrusions and particle signatures in the Black Sea: a Biogeochemical-Argo float investigation

    Science.gov (United States)

    Stanev, Emil Vassilev; Grayek, Sebastian; Claustre, Hervé; Schmechtig, Chaterine; Poteau, Antoine

    2017-09-01

    Continuous observations during 3 years with a vertical resolution of 1 dbar from two Bio-Argo floats in the Black Sea that were equipped with oxygen optodes, chlorophyll fluorometers, and backscattering sensors are analyzed. The particle backscattering coefficient, b bp provides a proxy for the concentration of suspended particles. The observations clearly identify thermal and b bp intrusions down to 700-800 m in the Bosporus inflow area. In this area, b bp is more than five times larger than elsewhere, which could indicate bacterial abundance and possible biological involvement in the precipitation of Mn-containing particles. The b bp anomalies become much shallower than the temperature anomalies with increasing distance to the east of the strait. Their maxima are located between the onset of the suboxic zone and the upper part of the anoxic layer. Unlike well-known intrusions that are caused by inflow, open ocean intrusions are shallower and often characterized by multiple layers of backscatter maxima with thicknesses of only 15-20 m. The ratio between backscattering coefficients measured at two wavelengths, which gives a proxy for particle size, shows that the relative amount of larger size particles in the anoxic layer increases with depth. The particle concentrations and their size distribution display different vertical variability, which indicates the complex transformation of biological matter. The lower concentration of particles and lower chlorophyll-a during the extremely warm 2016 reveals an overall positive correlation between the two properties. The trends in the particle backscattering coefficient in the suboxic zone during 2013-2016 could indirectly reveal a biogeochemical response to temperature changes.

  10. Paleomagnetism of the Permian-Triassic intrusions from the Tunguska syncline and the Angara-Taseeva depression, Siberian Traps Large Igneous Province: Evidence of contrasting styles of magmatism

    Science.gov (United States)

    Latyshev, A. V.; Veselovskiy, R. V.; Ivanov, A. V.

    2018-01-01

    Based on the detailed paleomagnetic investigation, we distinguished different styles of intrusive magmatic activity in two regions of the Siberian Traps Large Igneous Province (LIP). The emplacement of intrusions in the Angara-Taseeva depression (the southern periphery of the Siberian Traps LIP) occurred as brief but intense bursts of magmatic activity that led to the emplacement of large and extensive sills. We argue that this pulsating style of intrusive magmatic activity is common for the margins of the Siberian Traps LIP. We also estimated the duration of the main magmatic events as 200-250 km in diameter and dozens of thousands km2 in square). On the contrary, in the central part of the Siberian Traps LIP (the Tunguska syncline) the intrusive magmatism was more or less continuous without intense peaks of magmatic activity. Furthermore, we obtained the first reliable magnetostratigraphic data from the volcanic section of the Tunguska syncline. Finally, we analyzed the available paleomagnetic and geochronological data from the Siberian platform and suggested the correlation scheme of the studied intrusive complexes with the volcanic sequences of the Siberian Traps LIP.

  11. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  12. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  13. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  14. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  15. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    Science.gov (United States)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  16. A new physical barrier system for seawater intrusion control

    Science.gov (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  17. Detection of stratospheric ozone intrusions by windprofiler radars.

    Science.gov (United States)

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-08

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport.

  18. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    Science.gov (United States)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  19. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Individual protection standard for human intrusion. 63.321... Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE must determine the earliest time after disposal that the waste package would degrade sufficiently that a human...

  20. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ranjeeth Kumar Sundararajan

    2015-01-01

    Full Text Available In wireless sensor network (WSN, the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

  1. The intrusive record of the CAMP and what it means for the end Triassic mass extinction

    Science.gov (United States)

    Davies, Joshua; Marzoli, Andrea; Bertrand, Hervé; Youbi, Nasrrddine; Ernesto, Marcia; Schaltegger, Urs

    2017-04-01

    The end-Triassic mass extinction is one of the Phanerozoic's five largest mass extinctions. The extinction is usually attributed to climate change associated with degassing of erupting basalt from the Central Atlantic Magmatic Province (CAMP). However, recent work has shown that the earliest known CAMP basaltic flows occur stratigraphically above the extinction horizon indicating that the relationship between the CAMP and the extinction is more complex when resolved at higher temporal resolution. Here we present new high-precision U-Pb age determinations from intrusive units, which show that CAMP magmatic activity was occurring 100 ka before the oldest known eruptions. We show that the early magmatic activity correlates temporally with the onset of globally recognized changes to climatic and biotic records. We also report ages from sills in the Amazonas basin in Brazil that intrude synchronously with the extinction. We suggest that the release of thermogenic gases from the contact metamorphism of these sediments induced by injection of mafic sills may have contributed to the climate change that drove the extinction. Our results indicate that the intrusive record from large igneous provinces may be more important for linking to mass extinctions than the eruptive record.

  2. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis

    2017-01-09

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  3. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  4. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  5. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  6. Repeated cortisol administration does not reduce intrusive memories - A double blind placebo controlled experimental study.

    Science.gov (United States)

    Graebener, Alexandra Heike; Michael, Tanja; Holz, Elena; Lass-Hennemann, Johanna

    2017-11-01

    PTSD is a severe mental disorder, which may develop after exposure to traumatic events and is characterized by intrusive memories. Intrusions are sudden brief sensory memories of the traumatic event, that cause immense distress and impairment in every day functioning. Thus, the reduction of intrusive memories is one of the main aims of PTSD therapy. Recently, the glucocorticoid cortisol has been proposed as a pharmacological option to reduce intrusive memories, because cortisol is known to have memory retrieval inhibiting effects. However, the research on the effects of cortisol administration on intrusive memories is not conclusive. The aim of the present study was to examine if repeated cortisol administration inhibits intrusions and recognition memory in an experimental study using the trauma film paradigm. In a randomized double-blind placebo controlled design participants were exposed to a traumatic film (known to induce intrusions in healthy participants) and received either a low dose of cortisol (20mg) or placebo on the three days following "trauma exposure". Intrusive memories were assessed with an Electronic Diary and an Intrusion Triggering Task. Furthermore, we assessed explicit memory for the traumatic film clip with a recognition test. Contrary to our predictions, the cortisol group did not report fewer intrusions than the placebo group nor did it show diminished performance on the recognition test. Our results show that sole cortisol administration after a traumatic experience cannot reduce intrusive re-experiencing. Copyright © 2017 Elsevier B.V. and ECNP. All rights reserved.

  7. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  8. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  9. Non-intrusive Load Disaggregation Based on Kernel Density Estimation

    Science.gov (United States)

    Sen, Wang; Dongsheng, Yang; Chuchen, Guo; Shengxian, Du

    2017-05-01

    Aiming at the problem of high cost and difficult implementation of high frequency non-intrusive load decomposition method, this paper proposes a new method based on kernel density estimation(KDE) for low frequency NILM (Non-intrusive load monitoring). The method establishes power reference model of electricity load in different working conditions and appliance’s possible combinations first, then probability distribution is calculated as appliances features by kernel density estimation. After that, target power data is divided by step changes, whose distributions will be compared with reference models, and the most similar reference model will be chosen as the decomposed consequence. The proposed approach was tested with data from the GREEND public data set, it showed better performance in terms of energy disaggregation accuracy compared with many traditional NILM approaches. Our results show good performance which can achieve more than 93% accuracy in simulation.

  10. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  11. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  13. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  14. An artificial bioindicator system for network intrusion detection.

    Science.gov (United States)

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  15. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  16. Men’s stranger intrusions : rethinking street harassment.

    OpenAIRE

    Vera-Gray, F.

    2016-01-01

    Women's experiences of intrusive men in public space, popularly termed ‘street harassment’, are the most understudied yet commonly experienced forms of violence against women. Despite acknowledgement of its importance, an explicit debate on naming – with an exploration of how language creates both openings and restrictions of what can be said – is yet to be had in the literature. This paper begins this conversation, detailing the benefits and challenges in current terminology, and exploring t...

  17. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  18. Research on chronicles correlation based network intrusion detection techniques

    International Nuclear Information System (INIS)

    Han Zhengping; Jin Yan; Chen Taiwei; Xu Rongsheng

    2007-01-01

    According to some problems existed in network intrusion detection technique, such as alerts overwhelming, false-positives and lack of alert description, this paper introduces chronicle correlation method to alert events analysis by some correlative examples. With designed chronicle recognition language, portscan's alerts can be reduced, false-positives in buffer overflow's alerts can be detected, and NetBios DCERPC attack's alerts semantics can be improved. (authors)

  19. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  20. Animal intrusion status report for fiscal year 1989

    Energy Technology Data Exchange (ETDEWEB)

    Landeen, D.S.

    1990-08-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  1. Intrusion of anterior teeth to improve smile esthetics.

    Science.gov (United States)

    Chandrasekharan, Deepak; Balaji, S M

    2010-03-01

    A gummy smile is probably one of the most common causes of an unaesthetic smile. Causes include overeruption of maxillary anterior teeth and maxillary vertical excess. Intrusion of maxillary anterior teeth with Orthodontics and Le forte I superior repositioning may form a part of the solution. Of late the use of micro implants have improved the smile esthetics of borderline surgical cases by allowing the Orthodontist to intrude teeth more than what was possible with conventional Orthodontics.

  2. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  3. Mechanisms of extrusion and intrusion formation in fatigued crystalline materials

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Man, Jiří

    2014-01-01

    Roč. 596, FEB (2014), s. 15-24 ISSN 0921-5093 R&D Projects: GA ČR(CZ) GAP108/10/2371; GA ČR(CZ) GA13-23652S Institutional support: RVO:68081723 Keywords : Fatigue * Extrusion * Intrusion * Persistent slip band * Fatigue crack initiation Subject RIV: JL - Materials Fatigue, Friction Mechanics Impact factor: 2.567, year: 2014

  4. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  5. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  6. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  7. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  8. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

    Directory of Open Access Journals (Sweden)

    Al Quhtani Masoud

    2017-03-01

    Full Text Available Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

  9. Intrusive imagery in people with a specific phobia of vomiting.

    Science.gov (United States)

    Price, Katy; Veale, David; Brewin, Chris R

    2012-03-01

    AND OBJECTIVES: Specific phobia of vomiting (SPOV) is a chronic, pervasive and debilitating disorder which is clinically regarded as difficult to treat. Research into its development, maintenance and treatment has been limited. This study explored the prevalence and characteristics of intrusive mental imagery in people with SPOV. It investigated the relationship between presence of imagery and severity of phobia. Thirty-six participants meeting DSM-IV criteria for SPOV were recruited from online support groups and outpatient clinics. A semi-structured quantitative interview was administered. Twenty-nine (81%) participants reported multi-sensory intrusive imagery of adult (52%) and childhood memories (31%) and worst case scenarios ("flashforwards") of vomiting (17%). Extent of imagery was significantly related to severity of phobia. Participants primarily fearing others vomiting had less severe phobic symptoms. No control group was used and a heterogeneous sample of clinical and community participants was recruited. Correlational data comparing extent of imagery with severity of SPOV symptoms were derived from as yet unvalidated measures. Intrusive mental imagery is a clinically important feature of SPOV and may contribute to its maintenance. Causality needs to be demonstrated. Copyright © 2011 Elsevier Ltd. All rights reserved.

  10. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  11. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  12. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  13. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  14. Reduction of saltwater intrusion by modifying hydraulic conductivity

    Science.gov (United States)

    Strack, O. D. L.; Stoeckl, L.; Damm, K.; Houben, G.; Ausk, B. K.; de Lange, W. J.

    2016-09-01

    We present an approach for reducing saltwater intrusion in coastal aquifers by artificially reducing the hydraulic conductivity in the upper part of selected areas by using a precipitate. We apply a previously presented analytical approach to develop formulas useful for the design of artificial barriers. Equations for the location of the tip of the saltwater wedge are presented and verified through a sand-tank experiment. The analysis is capable of computing discharges exactly, but requires the Dupuit-Forchheimer approximation to compute points of the interface between flowing fresh and stationary saltwater. We consider a vertical coastline and boundaries in the freshwater zone of either given discharge or given head. We demonstrate in the paper that reduction of the hydraulic conductivity in the upper part of a coastal aquifer will result in a decrease of saltwater intrusion, and present analytic expressions that can be used for design purposes. The previously presented analytical approach can be applied to design systems to reduce saltwater intrusion caused by pumping inland from the zone that contains saline groundwater.

  15. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  16. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  17. Non-intrusive low-rank separated approximation of high-dimensional stochastic models

    KAUST Repository

    Doostan, Alireza

    2013-08-01

    This work proposes a sampling-based (non-intrusive) approach within the context of low-. rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs. © 2013 Elsevier B.V.

  18. A Universal High-Performance Correlation Analysis Detection Model and Algorithm for Network Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Hongliang Zhu

    2017-01-01

    Full Text Available In big data era, the single detection techniques have already not met the demand of complex network attacks and advanced persistent threats, but there is no uniform standard to make different correlation analysis detection be performed efficiently and accurately. In this paper, we put forward a universal correlation analysis detection model and algorithm by introducing state transition diagram. Based on analyzing and comparing the current correlation detection modes, we formalize the correlation patterns and propose a framework according to data packet timing and behavior qualities and then design a new universal algorithm to implement the method. Finally, experiment, which sets up a lightweight intrusion detection system using KDD1999 dataset, shows that the correlation detection model and algorithm can improve the performance and guarantee high detection rates.

  19. Non-Intrusive Load Monitoring Approaches for Disaggregated Energy Sensing: A Survey

    Directory of Open Access Journals (Sweden)

    Ahmed Zoha

    2012-12-01

    Full Text Available Appliance Load Monitoring (ALM is essential for energy management solutions, allowing them to obtain appliance-specific energy consumption statistics that can further be used to devise load scheduling strategies for optimal energy utilization. Fine-grained energy monitoring can be achieved by deploying smart power outlets on every device of interest; however it incurs extra hardware cost and installation complexity. Non-Intrusive Load Monitoring (NILM is an attractive method for energy disaggregation, as it can discern devices from the aggregated data acquired from a single point of measurement. This paper provides a comprehensive overview of NILM system and its associated methods and techniques used for disaggregated energy sensing. We review the state-of-the art load signatures and disaggregation algorithms used for appliance recognition and highlight challenges and future research directions.

  20. Non-intrusive load monitoring approaches for disaggregated energy sensing: a survey.

    Science.gov (United States)

    Zoha, Ahmed; Gluhak, Alexander; Imran, Muhammad Ali; Rajasegarar, Sutharshan

    2012-12-06

    Appliance Load Monitoring (ALM) is essential for energy management solutions, allowing them to obtain appliance-specific energy consumption statistics that can further be used to devise load scheduling strategies for optimal energy utilization. Fine-grained energy monitoring can be achieved by deploying smart power outlets on every device of interest; however it incurs extra hardware cost and installation complexity. Non-Intrusive Load Monitoring (NILM) is an attractive method for energy disaggregation, as it can discern devices from the aggregated data acquired from a single point of measurement. This paper provides a comprehensive overview of NILM system and its associated methods and techniques used for disaggregated energy sensing. We review the state-of-the art load signatures and disaggregation algorithms used for appliance recognition and highlight challenges and future research directions.

  1. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  2. An investigation of potential neural correlates of intrusive retrieval of distressing memories.

    Science.gov (United States)

    Battaglini, Eva; Liddell, Belinda J; Das, Pritha; Malhi, Gin S; Felmingham, Kim; Bryant, Richard A

    2018-03-01

    Despite the prevalence of intrusive memories across psychological disorders, little is known about the neural networks that underpin this form of memory. This study used functional magnetic resonance imaging (fMRI) to identify neural circuits associated with the retrieval of intrusive memories. Participants with moderate levels of anxiety (N = 30) underwent a cold pressor task to induce a physiological stress response, after which they viewed 10 neutral and 10 negative film clips. In a method designed to induce intrusive memories, participants then completed an fMRI scan in which they viewed short (2 s) depictions of neutral components from the original film clips. There were no significant differences in activations during intrusion and non-intrusion responses. Exploratory analyses comparing intrusive responses to neutral stimuli found the insula, inferior frontal gyrus, precuneus, right cerebellum and bilateral supplementary motor area were uniquely activated during experience of intrusions (compared to the neutral cue baseline), whereas no significant activations were in response to negative scenes that did not trigger intrusions. This study did not compare the different neural processes implicated in intrusive and intentional emotional memories. The limited intrusions that could be elicited in the scanning environment restricted the number of trials that could be employed. Although no differences in neural activations were observed between intrusive and non-intrusive responses, the observation of precuneus involvement is consistent with models that propose that intrusive memories are impacted by the extent to which there is contextual integration of the relevant memories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Stratigraphic controls on saltwater intrusion in the Dominguez Gap area of coastal Los Angeles

    Science.gov (United States)

    Edwards, B.D.; Ehman, K.D.; Ponti, D.J.; Reichard, E.G.; Tinsley, J.C.; Rosenbauer, R.J.; Land, M.

    2009-01-01

    The Los Angeles Basin is a densely populated coastal area that significantly depends on groundwater. A part of this groundwater supply is at risk from saltwater intrusion-the impetus for this study. High-resolution seismic-reflection data collected from the Los Angeles-Long Beach Harbor Complex have been combined with borehole geophysical and descriptive geological data from four nearby ??400-m-deep continuously cored wells and with borehole geophysical data from adjacent water and oil wells to characterize the Pliocene to Holocene stratigraphy of the Dominguez Gap coastal aquifer system. The new data are shown as a north-south, two- dimensional, sequence-stratigraphic model that is compared to existing lithostratigraphic models of the Los Angeles Basin in an attempt to better understand pathways of saltwater intrusion into coastal aquifers. Intrusion of saltwater into the coastal aquifer system generally is attributed to over-pumping that caused the hydraulic gradient to reverse during the mid-1920s. Local water managers have used the existing lithostratigraphic model to site closely spaced injection wells of freshwater (barrier projects) attempting to hydraulically control the saltwater intrusion. Improved understanding of the stratigraphic relationships can guide modifications to barrier design that will allow more efficient operation. Allostratigraphic nomenclature is used to define a new sequence-stratigraphic model for the area because the existing lithostratigraphic correlations that have been used to define aquifer systems are shown not to be time-correlative. The youngest sequence, the Holocene Dominguez sequence, contains the Gaspur aquifer at its base. The Gaspur aquifer is intruded with saltwater and consists of essentially flat-lying gravelly sands deposited by the ancestral Los Angeles River as broad channels that occupied a paleovalley incised into the coastal plain during the last glacio-eustatic highstand. The underlying sequences are deformed into

  4. Intrusion of maxillary molar using mini-implants: A clinical report and follow-up at 5 years.

    Science.gov (United States)

    Pinzan-Vercelino, Célia Regina Maio; Bramante, Fausto Silva; de Araújo Gurgel, Júlio; Vergani, Eliane Cristina Carrera Eleres; de Souza Gregório, Rosyane

    2017-07-01

    This clinical report describes a straightforward alternative treatment for adult patients with extruded maxillary molars, who are reluctant to use fixed appliances and complex mechanics. The maxillary molar supereruption of a 57-year-old woman was treated using buttons bonded to the buccal and palatal surfaces of the molars, 2 mini-implants, and elastomeric chains. The intrusion was achieved in 5 months. The treatment stability was observed for 5 years after treatment. Copyright © 2016 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  5. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  6. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  7. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  8. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  9. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  10. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  11. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  12. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  13. A graphical feature generation approach for intrusion detection

    OpenAIRE

    Chen Shi; Zuo Zhen; Huang Zhi Ping; Guo Xiao Jun

    2016-01-01

    In order to develop a novel effective and efficient intrusion detection system, a novel hybrid method based on a graphical features-based k-nearest neighbor approach, namely GFNN, is proposed in this paper. In GFNN, k-means clustering algorithm is used to extract cluster centre of each class in the given dataset. Then, the distance between a specific data sample and each cluster centre is calculated, and a radar chart is plotted based on the new data composed of distance based features. The s...

  14. The Uitkomst intrusion and Nkomati Ni-Cu-Cr-PGE deposit, South Africa: trace element geochemistry, Nd isotopes and high-precision geochronology

    Science.gov (United States)

    Maier, W. D.; Prevec, S. A.; Scoates, J. S.; Wall, C. J.; Barnes, S.-J.; Gomwe, T.

    2018-01-01

    The Uitkomst intrusion is a tubular mafic-ultramafic layered body that hosts one of South Africa's largest Ni-Cu-Cr-PGE deposits, Nkomati. The sulphide ore occurs in the form of massive lenses in the immediate quartzitic footwall and as disseminations within peridotite. The chromite ore forms an up to ˜10-m-thick layer in the lower portion of the intrusion. Uitkomst has generally been interpreted as a magma conduit, possibly related to the Bushveld event. Here, we present a new high-precision U-Pb zircon date of 2057.64 ± 0.69 Ma that overlaps with the age of the Merensky Reef of the Bushveld Complex and thus demonstrates a coeval relationship between the intrusions. Based on incompatible trace elements as well as O- and Nd isotope data (ɛNd -4.5 to -6.2), we show that the Uitkomst parent magmas were contaminated with up to 20% Archean upper crust prior to emplacement, and with up to 15% dolomitic country rock during emplacement. Ore formation at Nkomati was critically aided by substantial devolatisation and removal of dolomitic floor rocks leading to hydrodynamic concentration of sulphide and chromite during slumping of crystal mushes into the trough-like centre of the subsiding intrusion and its footwall.

  15. Effect of ultramafic intrusions and associated mineralized rocks on the aqueous geochemistry of the Tangle Lakes Area, Alaska: Chapter C in Studies by the U.S. Geological Survey in Alaska, 2011

    Science.gov (United States)

    Wang, Bronwen; Gough, Larry P.; Wanty, Richard B.; Lee, Gregory K.; Vohden, James; O’Neill, J. Michael; Kerin, L. Jack

    2013-01-01

    Stream water was collected at 30 sites within the Tangle Lakes area of the Delta mineral belt in Alaska. Sampling focused on streams near the ultramafic rocks of the Fish Lake intrusive complex south of Eureka Creek and the Tangle Complex area east of Fourteen Mile Lake, as well as on those within the deformed metasedimentary, metavolcanic, and intrusive rocks of the Specimen Creek drainage and drainages east of Eureka Glacier. Major, minor, and trace elements were analyzed in aqueous samples for this reconnaissance aqueous geochemistry effort. The lithologic differences within the study area are reflected in the major-ion chemistry of the water. The dominant major cation in streams draining mafic and ultramafic rocks is Mg2+; abundant Mg and low Ca in these streams reflect the abundance of Mg-rich minerals in these intrusions. Nickel and Cu are detected in 84 percent and 87 percent of the filtered samples, respectively. Nickel and Cu concentrations ranged from Ni colloidal, phase.

  16. Effects of climate variability on saltwater intrusions in coastal aquifers in Southern Denmark

    Science.gov (United States)

    Meyer, Rena; Sonnenborg, Torben; Engesgaard, Peter; Høyer, Anne-Sophie; Jørgensen, Flemming; Hisnby, Klaus; Hansen, Birgitte; Jensen, Jørn Bo; Piotrowski, Jan A.

    2016-04-01

    As in many other regions of the world fresh water supply in Denmark is based on groundwater resources. Aquifers in the low-lying areas in the south-west of Jutland are particularly vulnerable to saltwater intrusions which are likely to intensify due to relative sea level rise. To understand the dynamics and development of this complex flow system, the initial hydrodynamic conditions imposed by the last Scandinavian Ice Sheet (SIS) must be taken into account. The whole region has undergone changes in climatic and hydraulic conditions within the last 15000 years that may show influence on the present flow conditions. It is likely that the groundwater-flow dynamics, driven by the postglacial hydraulic head drop and the relative sea level rise are not yet equilibrated. Enhanced by the potential future sea level rise due to climate change, contamination of fresh-water aquifers will continue. The 2800-km2 - large coast-to-coast study area located in the southern part of Jutland was partly overridden by the Weichselian ice sheet. Geophysical and geological mapping shows salt water intrusions up to 20 km inland from the present coast. Based on a geological voxel model spanning Miocene through Quaternary deposits a large-scale 3D numerical groundwater flow and salt water transport model has been developed. It includes density-driven flow and simulates the distribution of the current saltwater intrusions and their evolution during the last 15000 years. Particle tracking and direct age simulations are performed to identify recharge areas and constrain groundwater ages. The simulated ages are compared to ages derived from isotope analysis of groundwater samples both from Miocene and Quaternary aquifers. The origin of the groundwater is determined based on isotopic and chemical composition. Additionally, heavy noble gas analysis is carried out to estimate recharge temperatures and mechanisms at locations where groundwater recharge during the last glaciation is indicated. This

  17. The role of compassion, suffering, and intrusive thoughts in dementia caregiver depression.

    Science.gov (United States)

    Schulz, Richard; Savla, Jyoti; Czaja, Sara J; Monin, Joan

    2017-09-01

    Exposure to suffering of a relative or friend increases the risk for psychological and physical morbidity. However, little is known about the mechanisms that account for this effect. We test a theoretical model that identifies intrusive thoughts as a mediator of the relation between perceived physical and psychological suffering of the care recipient and caregiver depression. We also assess the role of compassion as a moderator of the relation between perceived suffering and intrusive thoughts. Hispanic and African American caregivers (N = 108) of persons with dementia were assessed three times within a one-year period. Using multilevel modeling, we assessed the mediating role of intrusive thoughts in the relation between perceived physical and psychological suffering and CG depression, and we tested moderated mediation to assess the role of caregiver compassion in the relation between perceived suffering and intrusive thoughts. The effects of perceived physical suffering on depression were completely mediated through intrusive thoughts, and compassion moderated the relation between physical suffering and intrusive thoughts. Caregivers who had greater compassion reported more intrusive thoughts even when perceived physical suffering of the CR was low. For perceived psychological suffering, the effects of suffering on depression were partially mediated through intrusive thoughts. Understanding the role of intrusive thoughts and compassion in familial relationships provides new insights into mechanisms driving caregiver well-being and presents new opportunities for intervention.

  18. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  19. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Directory of Open Access Journals (Sweden)

    Laura Jobson

    Full Text Available Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1. In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed. The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  20. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  1. Time Dependent Model of Magma Intrusion in and around Miyake and Kozu Islands, Central Japan in June-August, 2000

    Science.gov (United States)

    Murase, M.; Irwan, M.; Kariya, S.; Tabei, T.; Okuda, T.; Miyajima, R.; Kimata, F.; Fujii, N.

    2004-12-01

    We discuss a time dependent model of magma intrusion in and around Miyake and Kozu Islands, Central Japan from GPS measurements at 28 sites in Miyake Island, Kozu Island and their surrounding islands in the period from June 27 to August 27, 2000. A dike complex model of three sheets is assumed between Miyake and Kozu Islands, suggested from the precise hypocenter distribution map (Sakai et al., 2003). Other dike intrusion models, a dike with an aseismic creep model (Nishimura et al.,2001; Furuya et al.,2003) and a dike with a deep deflation source model (Yamaoka et al., submitted) , are also discussed. Akaike's Information Criteria (AIC) value of optimal parameters of a dike complex model indicates lower than that of other two models. After fixing the geometry of three dikes using a genetic algorithm (GA), the amounts of dike openings of top, inside, and bottom of each dike are estimated by GA for seven time periods. In the period from June 27 to July 8, dike opening is concentrated in the dike near Miyake Island, and a large deflation is also estimated at a depth of 5 km of Miyake Volcano. It suggests that magma is supplied from the depths of Miyake Island. In next period until August 10, a huge dike intrusion is characterized in the dike near Kozu Island and the lower parts of dike in central and near Miyake Island. This suggests that magma is supplied from depth between Miyake and Kozu Islands. In the period of August 10 to 27, a huge deflation is estimated at a depth of 10 km under Miyake Volcano, and dike opening is limited

  2. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  3. Nuclear-power-plant perimeter-intrusion alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  4. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  5. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi

    2013-01-01

    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

  6. ESTIMATION OF INTRUSION DETECTION PROBABILITY BY PASSIVE INFRARED DETECTORS

    Directory of Open Access Journals (Sweden)

    V. V. Volkhonskiy

    2015-07-01

    Full Text Available Subject of Research. The paper deals with estimation of detection probability of intruder by passive infrared detector in different conditions of velocity and direction for automated analyses of physical protection systems effectiveness. Method. Analytic formulas for detection distance distribution laws obtained by means of experimental histogram approximation are used. Main Results. Applicability of different distribution laws has been studied, such as Rayleigh, Gauss, Gamma, Maxwell and Weibull distribution. Based on walk tests results, approximation of experimental histograms of detection distance probability distribution laws by passive infrared detectors was done. Conformity of the histograms to the mentioned analytical laws according to fitting criterion 2 has been checked for different conditions of velocity and direction of intruder movement. Mean and variance of approximate distribution laws were equal to the same parameters of experimental histograms for corresponding intruder movement parameters. Approximation accuracy evaluation for above mentioned laws was done with significance level of 0.05. According to fitting criterion 2, the Rayleigh and Gamma laws are corresponded mostly close to the histograms for different velocity and direction of intruder movement. Dependences of approximation accuracy for different conditions of intrusion have been got. They are usable for choosing an approximation law in the certain condition. Practical Relevance. Analytic formulas for detection probability are usable for modeling of intrusion process and objective effectiveness estimation of physical protection systems by both developers and users.

  7. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  8. Features extraction algorithm about typical railway perimeter intrusion event

    Science.gov (United States)

    Zhou, Jieyun; Wang, Chaodong; Liu, Lihai

    2017-10-01

    Research purposes: Optical fiber vibration sensing system has been widely used in the oil, gas, frontier defence, prison and power industries. But, there are few reports about the application in railway defence. That is because the surrounding environment is complicated and there are many challenges to be overcomed in the optical fiber vibration sensing system application. For example, how to eliminate the effects of vibration caused by train, the natural environments such as wind and rain and how to identify and classify the intrusion events. In order to solve these problems, the feature signals of these events should be extracted firstly. Research conclusions: (1) In optical fiber vibration sensing system based on Sagnac interferometer, the peak-to-peak value, peak-to-average ratio, standard deviation, zero-crossing rate, short-term energy and kurtosis may serve as feature signals. (2) The feature signals of resting state, climbing concrete fence, breaking barbed wire, knocking concrete fence and rainstorm have been extracted, which shows significant difference among each other. (3) The research conclusions can be used in the identification and classification of intrusion events.

  9. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  10. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  11. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  12. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  13. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  14. Oxygen isotope mapping and evaluation of paleo-hydrothermal systems associated with synvolcanic intrusion and VMS deposits

    International Nuclear Information System (INIS)

    Taylor, B.E

    2001-01-01

    Whole-rock oxygen isotope mapping provides a useful method for the delineation and quantitative evaluation of paleo-hydrothermal systems associated with syn-volcanic intrusions and volcanic-associated massive sulfide (VMS) deposits. During the course of a four-year study of regional alteration systems associated with VMS Deposits, four syn-volcanic intrusive complexes in Canada were mapped using stable isotope techniques. The complexes included Noranda, Quebec; Clifford-Ben Nevis, Ontario; Snow Lake, Manitoba, and Sturgeon Lake, Ontario. This study was regional in extent, involving large areas and large numbers of whole-rock samples: Noranda (625 km 2 ;≥600 samples, plus others (total = 1198); Sturgeon Lake (525 km 2 ; 452 samples); Clifford-Ben Nevis (160 km 2 ; 251 samples); and Snow Lake (84 km 2 ; 575 samples). Isotopic data on whole-rock carbonates and hydrous minerals were also collected. The regional isotopic studies were carried out in concert with other studies on mineral assemblages and mineral composition, and on associated intrusive and extrusive rocks. The Clifford-Ben Nevis area was selected as a control area, in as much as it contains no known VMS deposits; all other areas are well-known, productive VMS districts. Oxygen isotope maps are, in a sense, thermal maps, illustrating the paleo-distribution of heat and fluids, and offering a potential aid to exploration. The isotopic data may be contoured to reveal zones of 18 O depletion and enrichment, relative to unaltered rocks. Zones of δ 18 O≤60% comprise rocks that have reacted with seawater at high (e.g., 300+ o C) temperatures. The volume of foot-wall rocks isotopically-depleted by water/rock interaction during the life of one or more episodes of submarine hydrothermal activity is proportional to the amount of heat available from the syn-volcanic intrusive center. These altered rocks comprise the reaction zone often inferred to have supplied metals and other constituents for the VMS deposits

  15. Evidence for stratification of basic, silicic, and hybrid magmas in the Newark Island layered intrusion, Main, Labrador

    Science.gov (United States)

    Wiebe, R. A.

    1987-04-01

    The Newark Island layered intrusion (NILI), located in the Nain anorthosite complex of Labrador, developed through a complex sequence of fractional crystallization, periodic replenishment of both basic and silicic magmas, and magma mixing. It is subdivided into a lower layered series and an upper hybrid series. Three large transgressive trough structures cut these cumulate rocks at different levels. Each trough is lined by granitic rocks and filled mainly by chilled mafic pillows that grade inward to massive olivine gabbro. Each of these troughs originated as a large feeder dike of granitic magma into the NILI chamber when it was floored by basic magma. This resident basic magma collapsed downward into the granitic feeder and formed chilled pillows. These pillows preserve the compositions of basic magma existing in the chamber at the time of granite replenishment. Pillows in the lowest trough show a wide compositional range and provide a direct record of compositional stratification of a magma chamber related to a layered intrusion. Note: Additional material for this article is Supplementary Data 8717, available on request from the GSA Documents Secretary (see footnote 1).

  16. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  17. ASSESSMENT OF VAPOR INTRUSION USING INDOOR AND SUB-SLAB AIR SAMPLING

    Science.gov (United States)

    The objective of this investigation was to develop a method for evaluating vapor intrusion using indoor and sub-slab air measurement and at the same time directly assist EPA’s New England Regional Office in evaluating vapor intrusion in 15 homes and one business near the former R...

  18. Watchdog Sensor Network with Multi-Stage RF Signal Identification and Cooperative Intrusion Detection

    Science.gov (United States)

    2012-03-01

    143] Nadkarni , K. and A. Mishra. Intrusion detection in MANETS - the second wall of defence. in Industrial Electronics Society, 2003. IECON ’03...2002) [161] Mishra, A.; Nadkarni , K.; Patcha, A.; Intrusion Detection in Wireless Ad hoc networks, in Wireless Communications, IEEE, Volume 11

  19. Passive intrusion detection in wireless networks by exploiting clustering-based learning

    Science.gov (United States)

    Yang, Jie; Chen, Yingying; Desai, Sachi; Quoraishee, Shafik

    2010-04-01

    The large-scale wireless sensing data collected from wireless networks can be used for detecting intruders (e.g., enemies in tactical fields), and further facilitating real-time situation awareness in Army's networkcentric warfare applications such as intrusion detection, battlefield protection and emergency evacuation. In this work, we focus on exploiting Received Signal Strength (RSS) obtained from the existing wireless infrastructures for performing intrusion detection when the intruders or objects do not carry any radio devices. This is also known as passive intrusion detection. Passive intrusion detection based on the RSS data is an attractive approach as it reuses the existing wireless environmental data without requiring a specialized infrastructure. We propose a clustering-based learning mechanism for passive intrusion detection in wireless networks. Specifically, our detection scheme utilizes the clustering method to analyze the changes of RSS, caused by intrusions, at multiple devices to diagnose the presence of intrusions collaboratively. Our experimental results using an IEEE 802.15.4 (Zigbee) network in a real office environment show that our clustering-based learning can effectively detect the presence of intrusions.

  20. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of attacks. In order to enhance IDS performance, collaborative intrusion detection networks (CIDNs) are developed through enabling a set of IDS nodes to communicate with each other. Due to the distributed...

  1. First-Year Community College Students' Perceptions of and Attitudes toward Intrusive Academic Advising

    Science.gov (United States)

    Donaldson, Paul; McKinney, Lyle; Lee, Mimi; Pino, Diana

    2016-01-01

    For this study, we analyzed the relationship between intrusive academic advising and community college student success. Utilizing a qualitative, single-case study design, we conducted interviews with 12 students who participated in an intrusive advising program at a large, urban community college in Texas. Analysis of the interview data revealed…

  2. RePIDS: a multi tier real-time payload-based intrusion detection system

    NARCIS (Netherlands)

    Jamdagni, Aruna; Tan, Zhiyuan; Nanda, Priyadarsi; He, Xiangjian; Liu, Ren Ping

    2013-01-01

    Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detection. In this paper, we propose a 3-Tier Iterative

  3. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  4. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  5. Numerical Simulations, Mean Field Theory and Modulational Stability Analysis of Thermohaline Intrusions

    Science.gov (United States)

    2011-09-01

    the temporal and spatial variability of the ocean circulation (Schmitt, 2003). This signifies that these thermohaline intrusions cannot be ignored...still calculating the net effects of double diffusion via crude parameterizations, the study showed that the thermohaline circulations in the model...SIMULATIONS, MEAN FIELD THEORY AND MODULATIONAL STABLITY ANALYSIS OF THERMOHALINE INTRUSIONS by Mark A. Hebert September 2011 Thesis Advisor

  6. Numerical simulation and analysis of saltwater intrusion lengths in the Pearl River Delta, China

    NARCIS (Netherlands)

    Zhang, W.; Feng, H.; Zheng, J.; Hoitink, A.J.F.; Vegt, van der M.; Zhu, Y.; Cai, H.

    2013-01-01

    In recent years, large-scale saltwater intrusion has been threatening the freshwater supply in the metropolitan cities surrounding the Pearl River delta (PRD). Therefore, a better understanding of the saltwater intrusion process in this region is necessary for local water resource management. In

  7. Multi-Objective Management of Saltwater Intrusion in Groundwater. Optimization under Uncertainty

    NARCIS (Netherlands)

    Tran, T.M.

    2004-01-01

    Coastal aquifers are very vulnerable to seawater intrusion through, for example, the overdraft of groundwater exploitation or insufficient recharge from upstream. Problems of salt-intrusion into groundwater have become a considerable concern in many countries with coastal areas. There have been a

  8. Associations between intrusive thoughts, reality discrimination and hallucination-proneness in healthy young adults.

    Science.gov (United States)

    Smailes, David; Meins, Elizabeth; Fernyhough, Charles

    2015-01-01

    People who experience intrusive thoughts are at increased risk of developing hallucinatory experiences, as are people who have weak reality discrimination skills. No study has yet examined whether these two factors interact to make a person especially prone to hallucinatory experiences. The present study examined this question in a non-clinical sample. Participants were 160 students, who completed a reality discrimination task, as well as self-report measures of cannabis use, negative affect, intrusive thoughts and auditory hallucination-proneness. The possibility of an interaction between reality discrimination performance and level of intrusive thoughts was assessed using multiple regression. The number of reality discrimination errors and level of intrusive thoughts were independent predictors of hallucination-proneness. The reality discrimination errors × intrusive thoughts interaction term was significant, with participants who made many reality discrimination errors and reported high levels of intrusive thoughts being especially prone to hallucinatory experiences. Hallucinatory experiences are more likely to occur in people who report high levels of intrusive thoughts and have weak reality discrimination skills. If applicable to clinical samples, these findings suggest that improving patients' reality discrimination skills and reducing the number of intrusive thoughts they experience may reduce the frequency of hallucinatory experiences.

  9. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  10. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  11. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  12. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  13. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  14. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  16. Non-intrusive Quality Analysis of Monitoring Data

    CERN Document Server

    Brightwell, M; Suwalska, Anna

    2010-01-01

    Any large-scale operational system running over a variety of devices requires a monitoring mechanism to assess the health of the overall system. The Technical Infrastructure Monitoring System (TIM) at CERN is one such system, and monitors a wide variety of devices and their properties, such as electricity supplies, device temperatures, liquid flows etc. Without adequate quality assurance, the data collected from such devices leads to false-positives and false-negatives, reducing the effectiveness of the monitoring system. The quality must, however, be measured in a non-intrusive way, so that the critical path of the data flow is not affected by the quality computation. The quality computation should also scale to large volumes of incoming data. To address these challenges, we develop a new statistical module, which monitors the data collected by TIM and reports its quality to the operators. The statistical module uses Oracle RDBMS as the underlying store, and builds hierarchical summaries on the basic events ...

  17. Medical image of the week: alpha intrusion into REM sleep

    Directory of Open Access Journals (Sweden)

    Shetty S

    2015-12-01

    Full Text Available A 45-year-old woman with a past medical history of hypertension and chronic headaches was referred to the sleep laboratory for high clinical suspicion for sleep apnea based on a history of snoring, witnessed apnea and excessive daytime sleepiness. An overnight sleep study was performed. Images during N3 Sleep and REM sleep are shown (Figures 1 and 2. Alpha intrusion in delta sleep is seen in patients with fibromyalgia, depression, chronic fatigue syndrome, anxiety disorder, and primary sleep disorders like psychophysiological insomnia, obstructive sleep apnea, circadian disorders and narcolepsy (1. Bursts of alpha waves during REM sleep may be more common during phasic REM than tonic REM. The REM alpha bursts (alpha activity lasting at least 3 seconds without an increase in EMG amplitude may represent microarousals (2. Hypersynchronous theta activity should be differentiated from the spike and waveform activity seen in seizures.

  18. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  19. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  20. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  1. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    Science.gov (United States)

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  2. A Survey of Artificial Immune System Based Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Hua Yang

    2014-01-01

    Full Text Available In the area of computer security, Intrusion Detection (ID is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS. The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs. This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  3. A survey of artificial immune system based intrusion detection.

    Science.gov (United States)

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  4. A model for anomaly classification in intrusion detection systems

    Science.gov (United States)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  5. The uranium deposit at Kvanefjeld, the Ilimaussaq intrusion, South Greenland

    International Nuclear Information System (INIS)

    Soerensen, H.; Rose-Hansen, J.; Leth Nielsen, B.; Loevborg, L.; Soerensen, E.; Lundgaard, T.

    1974-01-01

    The uranium-thorium deposits is located in part of an alkaline intrusion consisting of peralkaline, agpaitic nepheline syenites. The radioactive minerals are steenstrupine, uranium-rich monazite, thorite and pigmentary material. The radio-element content varies from 100 to 3000 ppm U and 300 to 15000 ppm Th. Reasonably assured ore in the main area with a grade of 310 ppm is calculated to 5800 metric tons of uranium in 18.6 million metric tons of ore. Estimated additional reserves with a grade of 292 ppm U are 29.4 million tons of ore with 8700 tons of uranium and 3.5 million tons of ore with a grade of 350 ppm yielding 1200 tons of uranium. Estimates of amounts of thorium ore are 2.6 times those of uranium. A method of recovery of the uranium based on sulphating roasting and subsequent leaching with water is described. (author)

  6. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  7. Forecasting deflation, intrusion and eruption at inflating volcanoes

    Science.gov (United States)

    Blake, Stephen; Cortés, Joaquín A.

    2018-01-01

    A principal goal of volcanology is to successfully forecast the start of volcanic eruptions. This paper introduces a general forecasting method, which relies on a stream of monitoring data and a statistical description of a given threshold criterion for an eruption to start. Specifically we investigate the timing of intrusive and eruptive events at inflating volcanoes. The gradual inflation of the ground surface is a well-known phenomenon at many volcanoes and is attributable to pressurised magma accumulating within a shallow chamber. Inflation usually culminates in a rapid deflation event caused by magma escaping from the chamber to produce a shallow intrusion and, in some cases, a volcanic eruption. We show that the ground elevation during 15 inflation periods at Krafla volcano, Iceland, increased with time towards a limiting value by following a decaying exponential with characteristic timescale τ. The available data for Krafla, Kilauea and Mauna Loa volcanoes show that the duration of inflation (t*) is approximately equal to τ. The distribution of t* / τ values follows a log-logistic distribution in which the central 60% of the data lie between 0.99 deflation event starting during a specified time interval to be estimated. The time window in which there is a specified probability of deflation starting can also be forecast, and forecasts can be updated after each new deformation measurement. The method provides stronger forecasts than one based on the distribution of repose times alone and is transferable to other types of monitoring data and/or other patterns of pre-eruptive unrest.

  8. Continental crust formation on early Earth controlled by intrusive magmatism.

    Science.gov (United States)

    Rozel, A B; Golabek, G J; Jain, C; Tackley, P J; Gerya, T

    2017-05-18

    The global geodynamic regime of early Earth, which operated before the onset of plate tectonics, remains contentious. As geological and geochemical data suggest hotter Archean mantle temperature and more intense juvenile magmatism than in the present-day Earth, two crust-mantle interaction modes differing in melt eruption efficiency have been proposed: the Io-like heat-pipe tectonics regime dominated by volcanism and the "Plutonic squishy lid" tectonics regime governed by intrusive magmatism, which is thought to apply to the dynamics of Venus. Both tectonics regimes are capable of producing primordial tonalite-trondhjemite-granodiorite (TTG) continental crust but lithospheric geotherms and crust production rates as well as proportions of various TTG compositions differ greatly, which implies that the heat-pipe and Plutonic squishy lid hypotheses can be tested using natural data. Here we investigate the creation of primordial TTG-like continental crust using self-consistent numerical models of global thermochemical convection associated with magmatic processes. We show that the volcanism-dominated heat-pipe tectonics model results in cold crustal geotherms and is not able to produce Earth-like primordial continental crust. In contrast, the Plutonic squishy lid tectonics regime dominated by intrusive magmatism results in hotter crustal geotherms and is capable of reproducing the observed proportions of various TTG rocks. Using a systematic parameter study, we show that the typical modern eruption efficiency of less than 40 per cent leads to the production of the expected amounts of the three main primordial crustal compositions previously reported from field data (low-, medium- and high-pressure TTG). Our study thus suggests that the pre-plate-tectonics Archean Earth operated globally in the Plutonic squishy lid regime rather than in an Io-like heat-pipe regime.

  9. Modeling saltwater intrusion in highly heterogeneous coastal aquifers

    Science.gov (United States)

    Safi, Amir; El-Fadel, Mutasem; Doummar, Joanna; Abou Najm, Majdi; Alameddine, Ibrahim

    2016-04-01

    In this study, a 3D variable-density flow and solute transport model SEAWAT was used to examine the impact of macroscopic variation in a soil matrix on widening or narrowing the thickness of the saltwater-freshwater mixing zone. Located along the Eastern Mediterranean (Beirut), the pilot aquifer consists of karstified limestone of Cretaceous age overlain by Upper Tertiary and Quaternary unconsolidated deposits. The model used the advanced pilot-points parameterization coupled with PEST to characterize spatial heterogeneity. Historically simulated water levels were relied upon to reduce potential numerical instabilities induced by insensitive parameters in transient calibration. The latter demonstrated a high degree of heterogeneity in the middle parts of the aquifer and along western coastlines with specification of a high hydraulic conductivity and low storativity in fault networks. The response of the aquifer to seasonal stresses such as climate cycles, pumping rates and recharge rates was manifested as high fluctuations in potentiometric surface due to potential fast flow pathways along faults. The final distribution of saltwater intrusion supports two mechanisms 1) lateral encroachment of recent seawater into the western zone of the aquifer which is of most concern due to high horizontal hydraulic conductivity in the wave direction and 2) upconing in the northwest and southwest of the aquifer due to large vertical hydraulic conductivities that tend to exacerbate the vertical movement of salinity. Acknowledgments This study is part of a program on climate change and seawater intrusion along the Eastern Mediterranean funded by the International Development Research Center (IDRC) of Canada at the American University of Beirut (AUB). Special thanks are extended to Dr. Charlotte Macalister at IDRC for her support and feedback in implementing this program.

  10. SALVAGE D2.2 Description of the developed algorithms for intrusion detection in smart grid components

    DEFF Research Database (Denmark)

    Kosek, Anna Magdalena; Korman, Matus; Heussen, Kai

    2016-01-01

    This report presents developed model-based anomaly detection techniques used for intrusion detection in smart grid.......This report presents developed model-based anomaly detection techniques used for intrusion detection in smart grid....

  11. Petrographic and Geochemical Characterization of Ore-Bearing Intrusions of the Noril'sk type, Siberia; With Discussion of Their Origin, Including Additional Datasets and Core Logs

    Science.gov (United States)

    Czamanske, Gerald K.

    2002-01-01

    The Noril'sk I, Talnakh, and Kharaelakh intrusions of the Noril'sk district host one of the outstanding metal concentrations in the world; contained Cu-Ni resources are comparable to the deposits at Sudbury, Ontario and the platinum group element (PGE) resource is second only to that of the Bushveld Complex. Our opportunity to cooperatively sample and study this district in Siberian Russia arose in 1990 through a memorandum of understanding between the U.S. Geological Survey and the former Ministry of Geology of the U.S.S.R. The world-class significance of these deposits and the possibility that understanding their geologic context, including construction of a credible 'ore-deposit model,' will lead to discovery of similar deposits elsewhere, inspired extensive studies of the ores, the mafic-intrusions which host them, and associated flood basalts.

  12. Geochemistry and petrogenesis of the Feshark intrusion (NE Isfahan city

    Directory of Open Access Journals (Sweden)

    Ali Kananian

    2017-11-01

    Full Text Available Introduction Granitic rocks are the most abundant rock types in various tectonic settings and they have originated from mantle-derived magmas and/or partial melting of crustal rocks. The Oligo-Miocene Feshark intrusion is situated in the northeast of the city of Isfahan, and a small part of Urumieh–Dokhtar Magmatic Arc is between 52º21' E to 52º26'E and 32º50' N to - 32º53' N. The pluton has intruded into lower Eocene volcanic rocks such as rhyolite, andesite, and dacite and limestone. Analytical methods Fifteen representative samples from the Feshark intrusion were selected on the basis of their freshness. The major elements and some trace elements were analyzed by X-ray fluorescence (XRF at Naruto University in Japan and the trace-element compositions were determined at the ALS Chemex lab. Results The Feshark intrusion can be divided into two phases, namely granodiorite with slightly granite and tonalite composition and quartz diorite with various quartz diorite and quartz monzodiorite abundant enclaves according to Middlemost (1994 classification. The quartz diorite show dark grey and are abundant at the western part of the intrusive rocks. Granodiorite are typically of white-light grey in color and change gradually into granite and tonalite. The granodiorite and granite rocks consist of quartz, K-feldspar, plagioclase, biotite, and amphibole, whereas in the quartz diorites the mineral assemblages between different minerals are very similar to those observed in the granodiorite. However, amphibole and plagioclase are more abundant and quartz and K-feldspar modal contents are lower than in the granodiorite whereas pyroxene occurs as rare grains. They are characterized as metaluminous to mildly peraluminous based on alumina saturation index (e.g. Shand, 1943 and are mostly medium-K calc-alkaline in nature (Rickwood, 1989. Discussion In the Yb vs. La/Yb and Tb/Yb variation diagrams (He et al., 2009, the studied samples show small

  13. Geochemical and isotopic evidence for palaeo-seawater intrusion into the south coast aquifer of Laizhou Bay, China

    International Nuclear Information System (INIS)

    Han Dongmei; Kohfahl, Claus; Song, Xianfang; Xiao Guoqiang; Yang Jilong

    2011-01-01

    Highlights: → Hydrochemistry, multi-isotopes, and hydraulic data were used to study saltwater intrusion. → Salt sources and their contributions to the salinity distribution are identified. → Groundwater age and mixing behavior are estimated. → Hydrogeochemical evolution of different types of groundwater is determined. → Multi-approach study can improve the understanding of reactive transport processes. - Abstract: This research aims to improve the current knowledge of groundwater salinisation processes in coastal aquifers using combined hydrochemical and isotopic parameters and inverse hydrochemical modelling. Field investigations were conducted in Laizhou Bay, which is the area most seriously affected by seawater intrusion in north China. During three sampling campaigns along a vertical transect in the Changyi-Liutuan area, 95 ground- and surface-water samples were collected for major ion and isotope analysis ( 2 H/ 18 O, 3 H, 14 C, 34 S). The groundwater changes along the general flowpath towards the coast from fresh ( 100 g/L). Molar Cl/Br ratios are close to those of seawater in almost all groundwater samples, indicating that brines and deep seawater evolved from different events of palaeo-seawater intrusion. Depleted isotopic signatures of brines and deep saline water point to a former, initially depleted seawater reservoir due to runoff dilution. Tritium and 14 C activities in deep saline water below confining units indicate isolation from modern precipitation and significant residence times. Brine water shows a wide range of 3 H and 14 C ages due to the complex conditions of mixing without isolation from modern groundwater. Sulphur-34 isotope ratios support seawater intrusion as a possible salt origin, although this parameter does not exclude gypsum dissolution. The combined use of Cl and 18 O yields four different end-members of groundwater, and three different mixing scenarios were identified explaining the hydrochemical composition of

  14. Geochemical and isotopic evidence for palaeo-seawater intrusion into the south coast aquifer of Laizhou Bay, China

    Energy Technology Data Exchange (ETDEWEB)

    Han Dongmei [Key Laboratory of Water Cycle and Related Land Surface Processes, Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, Beijing 100101 (China); Kohfahl, Claus [Instituto Geologico y Minero de Espana, Plaza de Espana, 41013 Seville (Spain); Song, Xianfang, E-mail: songxf@igsnrr.ac.cn [Key Laboratory of Water Cycle and Related Land Surface Processes, Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, Beijing 100101 (China); Xiao Guoqiang; Yang Jilong [Tianjin Institute of Geology and Mineral Resources, Tianjin 300170 (China)

    2011-05-15

    Highlights: > Hydrochemistry, multi-isotopes, and hydraulic data were used to study saltwater intrusion. > Salt sources and their contributions to the salinity distribution are identified. > Groundwater age and mixing behavior are estimated. > Hydrogeochemical evolution of different types of groundwater is determined. > Multi-approach study can improve the understanding of reactive transport processes. - Abstract: This research aims to improve the current knowledge of groundwater salinisation processes in coastal aquifers using combined hydrochemical and isotopic parameters and inverse hydrochemical modelling. Field investigations were conducted in Laizhou Bay, which is the area most seriously affected by seawater intrusion in north China. During three sampling campaigns along a vertical transect in the Changyi-Liutuan area, 95 ground- and surface-water samples were collected for major ion and isotope analysis ({sup 2}H/{sup 18}O, {sup 3}H, {sup 14}C, {sup 34}S). The groundwater changes along the general flowpath towards the coast from fresh (<1 g/L), brackish (1-10 g/L), saline (10-100 g/L) to brine water (>100 g/L). Molar Cl/Br ratios are close to those of seawater in almost all groundwater samples, indicating that brines and deep seawater evolved from different events of palaeo-seawater intrusion. Depleted isotopic signatures of brines and deep saline water point to a former, initially depleted seawater reservoir due to runoff dilution. Tritium and {sup 14}C activities in deep saline water below confining units indicate isolation from modern precipitation and significant residence times. Brine water shows a wide range of {sup 3}H and {sup 14}C ages due to the complex conditions of mixing without isolation from modern groundwater. Sulphur-34 isotope ratios support seawater intrusion as a possible salt origin, although this parameter does not exclude gypsum dissolution. The combined use of Cl and {sup 18}O yields four different end-members of groundwater, and

  15. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  16. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms.

    Science.gov (United States)

    Ólafsson, Ragnar P; Snorrason, Ívar; Bjarnason, Reynar K; Emmelkamp, Paul M G; Ólason, Daníel Þ; Kristjánsson, Árni

    2014-12-01

    Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing more focused study of the processes involved in controlling intrusive thoughts may be needed. In two experiments, control over neutral, standardized intrusive and personal intrusive thoughts was investigated as participants attempted to replace them with neutral thoughts. Non-selected university students (Experiment 1: N = 61) and university students scoring high and low on self-report measure of OC symptoms (Experiment 2: N = 40) performed a computerized thought replacement task. In experiment 1 replacing personal intrusive thoughts took longer than replacing neutral thoughts. Self-reports showed that intrusive thoughts were rated more difficult to replace and were associated with greater thought reoccurrence during replacement, larger emotional reaction and more discomfort. These results were largely replicated in experiment 2. Furthermore, the high OC symptom group experienced greater overall difficulty controlling thoughts on the replacement task, experienced more reoccurrences of personal intrusive thoughts, larger emotional reactions and discomfort associated with them, and felt a greater urge to remove them. All participants were non-clinical university students, and older adults with OCD should be tested. The findings are in line with cognitive behavioural theories of OCD. They support the usefulness of thought replacement as a research paradigm to study thought control in OCD and possibly other psychological conditions characterized by repetitive thoughts. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Accounting for intrusive thoughts in PTSD: Contributions of cognitive control and deliberate regulation strategies.

    Science.gov (United States)

    Bomyea, Jessica; Lang, Ariel J

    2016-03-01

    Persistent, trauma-related intrusive thoughts are common in individuals with posttraumatic stress disorder (PTSD). Automatic aspects of cognitive functioning (including executive functioning) and maladaptive deliberate attempts at cognitive regulation have been proposed as individual difference factors that may perpetuate intrusive thoughts. The current study sought to examine the joint contribution of these two factors on intrusive thoughts in PTSD. Forty-two women with PTSD completed an executive functioning assessment followed by a thought suppression task. Intrusive thoughts (frequency and duration), as well as participants' use of specific cognitive regulation strategies (avoidance-based thought regulation strategies; TRS), were measured during the task. Hierarchical linear regression was used to examine the interaction of executive functioning and TRS on intrusive thoughts. Greater use of TRS was associated with greater intrusive thought persistence for those with low executive functioning, but not those with high executive functioning. Data was collected cross-sectionally and the laboratory thought suppression task may not correspond to naturalistic thought regulation. Results are consistent with prior literature suggesting that certain responses deployed by individuals to control intrusive thoughts may be unhelpful, but that a higher level of cognitive capacity may mitigate this effect. Implications of these findings for recent models of cognition in PTSD are discussed. Published by Elsevier B.V.

  18. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  19. Changes in maxillary incisor dental pulp blood flow during intrusion by mini-implants.

    Science.gov (United States)

    Sabuncuoglu, Fidan Alakus; Ersahan, Seyda

    2014-10-01

    The aim of this clinical study was to identify changes in pulpal blood flow (PBF) in human central incisors resulting from short- and long-term intrusive orthodontic forces from mini-implants. A total of 40 sound upper central and lateral incisors in 20 patients scheduled for intrusion for orthodontic reasons were divided into two groups. From each group, 20 teeth were subjected to intrusive force from mini-implants (Group 1 = Light Force: 40 g; Group 2 = Heavy Force: 120 g), whereas the remaining 20 contralateral teeth were not subjected to forces from mini-implants and served as controls. Laser-Doppler flowmetry (LDF) measurements were recorded at baseline and at 3 days and 3 weeks following intrusion. PBF decreased significantly at 3 days (Light Force Group: 7.72 ± 0.50; Heavy Force Group: 7.72 ± 0.52) and then increased towards baseline at 3 weeks (Light Force Group: 10.37 ± 0.58; Heavy Force Group: 10.31 ± 0.45) following intrusion. In other words, despite slight regressive changes in pulpal tissue in the short-term, PBF improved after 3 weeks following intrusion by mini-implants, indicating that the changes observed in PBF is reversible, even following radical incisor intrusion.

  20. Toddler inhibited temperament, maternal cortisol reactivity and embarrassment, and intrusive parenting.

    Science.gov (United States)

    Kiel, Elizabeth J; Buss, Kristin A

    2013-06-01

    The relevance of parenting behavior to toddlers' development necessitates a better understanding of the influences on parents during parent-child interactions. Toddlers' inhibited temperament may relate to parenting behaviors, such as intrusiveness, that predict outcomes later in childhood. The conditions under which inhibited temperament relates to intrusiveness, however, remain understudied. A multimethod approach would acknowledge that several levels of processes determine mothers' experiences during situations in which they witness their toddlers interacting with novelty. As such, the current study examined maternal cortisol reactivity and embarrassment about shyness as moderators of the relation between toddlers' inhibited temperament and maternal intrusive behavior. Participants included 92 24-month-old toddlers and their mothers. Toddlers' inhibited temperament and maternal intrusiveness were measured observationally in the laboratory. Mothers supplied saliva samples at the beginning of the laboratory visit and 20 minutes after observation. Maternal cortisol reactivity interacted with inhibited temperament in relation to intrusive behavior, such that mothers with higher levels of cortisol reactivity were observed to be more intrusive with more highly inhibited toddlers. Embarrassment related to intrusive behavior as a main effect. These results highlight the importance of considering child characteristics and psychobiological processes in relation to parenting behavior. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  1. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  2. Successfully controlling intrusive memories is harder when control must be sustained.

    Science.gov (United States)

    van Schie, Kevin; Anderson, Michael C

    2017-10-01

    After unpleasant events, people often experience intrusive memories that undermine their peace of mind. In response, they often suppress these unwanted memories from awareness. Such efforts may fail, however, when inhibitory control demands are high due to the need to sustain control, or when fatigue compromises inhibitory capacity. Here we examined how sustained inhibitory demand affected intrusive memories in the Think/No-Think paradigm. To isolate intrusions, participants reported, trial-by-trial, whether their preceding attempt to suppress retrieval had triggered retrieval of the memory they intended to suppress. Such counter-intentional retrievals provide a laboratory model of the sort of involuntary retrieval that may underlie intrusive memories. Using this method, we found that longer duration trials increased the probability of an intrusion. Moreover, on later No-Think trials, control over intrusions suddenly declined, with longer trial durations triggering more relapses of items that had been previously been purged. Thus, the challenges of controlling retrieval appear to cause a decline in control over time, due to a change in state, such as fatigue. These findings raise the possibility that characteristics often true of people with psychiatric disorders - such as compromised sleep, and increased demand on control - may contribute to difficulties in suppressing intrusive memories.

  3. The roles of noradrenergic and glucocorticoid activation in the development of intrusive memories.

    Directory of Open Access Journals (Sweden)

    Richard A Bryant

    Full Text Available Intrusive memories are a common feature of many psychological disorders. Recent evidence has potentially extended cognitive models of intrusions by identifying the role of biological markers of arousal at the time of consolidation in subsequent memory for emotional events. This study investigated the role of arousal during consolidation in the development of intrusive memories. Seventy-eight university students (37 men and 41 women viewed 20 negative and 20 neutral images. Half the participants then underwent a cold pressor test (High Stress, immersing their hand in ice water, while the remaining participants immersed their hand in warm water (Low Stress. Samples of salivary alpha-amylase (sAA and cortisol were collected from participants at baseline and following the stressor challenge. Participants completed a delayed free recall test and intrusion questionnaires two days later. Participants in the High Stress condition reported more intrusions of negative images than participants in the Low Stress condition. An interaction variable in a linear regression of increased noradrenergic and cortisol values predicted intrusive memories of emotional stimuli for men but not women. These findings are consistent with recent evidence of the combined effects of noradrenaline and corticoid responses to stress on emotional memories, and also with increasing evidence of gender differences in how stress hormones influence formation of emotional memories. These findings point to possible mechanisms by which development of intrusions may be prevented after consolidation of traumatic experiences.

  4. Structural control on basaltic dike and sill emplacement, Paiute Ridge mafic intrusion complex, southern Nevada

    International Nuclear Information System (INIS)

    Carter Krogh, K.E.; Valentine, G.A.

    1996-08-01

    Late Miocene basaltic sills and dikes in the Paiute Ridge area of southern nevada show evidence that their emplacement was structurally controlled. Basaltic dikes in this area formed by dilating pre-existing vertical to steeply E-dipping normal faults. Magma propagation along these faults must have required less energy than the creation of a self-propagated fracture at dike tips and the magma pressure must have been greater than the compressive stress perpendicular to the fault surface. N- to NE-trending en echelon dikes formed locally and are not obviously attached to the three main dikes in the area. The en echelon segments are probably pieces of deeper dikes, which are segmented perhaps as a result of a documented rotation of the regional stresses. Alternatively, changes in orientation of principal stresses in the vicinity of each en echelon dike could have resulted from local loads associated with paleotopographic highs or nearby structures. Sills locally branched off some dikes within 300 m of the paleosurface. These subhorizontal bodies occur consistently in the hanging wall block of the dike-injected faults, and intrude Tertiary tuffs near the Paleozoic-Tertiary contact. The authors suggest that the change in stresses near the earth's surface, the material strength of the tuff and paleozoic rocks, and the Paleozoic bedding dip direction probably controlled the location of sill formation and direction of sill propagation. The two largest sills deflected the overlying tuffs to form lopoliths, indicating that the magma pressure exceeded vertical stresses at that location and that the shallow level and large size of the sills allowed interaction with the free (earth's) surface. 32 refs., 4 figs., 1 tab

  5. Volcanic source inversion using a genetic algorithm and an elastic-gravitational layered earth model for magmatic intrusions

    Science.gov (United States)

    Tiampo, K. F.; Fernández, J.; Jentzsch, G.; Charco, M.; Rundle, J. B.

    2004-11-01

    Here we present an inversion methodology using the combination of a genetic algorithm (GA) inversion program, and an elastic-gravitational earth model to determine the parameters of a volcanic intrusion. Results from the integration of the elastic-gravitational model, a suite of FORTRAN 77 programs developed to compute the displacements due to volcanic loading, with the GA inversion code, written in the C programming language, are presented. These codes allow for the calculation of displacements (horizontal and vertical), tilt, vertical strain and potential and gravity changes on the surface of an elastic-gravitational layered Earth model due to the magmatic intrusion. We detail the appropriate methodology for examining the sensitivity of the model to variation in the constituent parameters using the GA, and present, for the first time, a Monte Carlo technique for evaluating the propagation of error through the GA inversion process. One application example is given at Mayon volcano, Philippines, for the inversion program, the sensitivity analysis, and the error evaluation. The integration of the GA with the complex elastic-gravitational model is a blueprint for an efficient nonlinear inversion methodology and its implementation into an effective tool for the evaluation of parameter sensitivity. Finally, the extension of this inversion algorithm and the error assessment methodology has important implications to the modeling and data assimilation of a number of other nonlinear applications in the field of geosciences.

  6. Toward a realistic deformation model of the 2008 magmatic intrusion at Etna from combined DInSAR and GPS observations

    Science.gov (United States)

    Currenti, Gilda; Napoli, Rosalba; Del Negro, Ciro

    2011-12-01

    The combination of (i) DInSAR data, capable of observing deformation pattern at a spatial resolution unachievable with other sparse geodetic measurements, (ii) continuous GPS data, able to provide temporal constraints on source evolution, and (iii) numerical modeling procedures, appropriate to consider a non-uniform opening distribution of a source embedded in a 3D heterogeneous medium, allowed us to infer a complex and realistic deformation model of the magmatic intrusion that occurred in the northern flank of Etna on 13 May 2008. Numerical modeling of ground deformation data defines a near-vertical dyke intruded for 2.5 km starting from a depth of 1400 m asl right below the summit craters and reaching shallow crust level in the northern flank. From the estimated opening distribution of the propagating magma-filled crack, which reached a maximum value of about 2 m, a volumetric expansion of crustal rocks of about 5.3 × 10 6 m 3 was obtained. Also, we clarified the temporal evolution of the northward magmatic intrusion, which lasted just over 5 h with an initial magma propagation velocity of about 1.2 km/h, and decreased to about 0.24 km/h as the driving pressure lowered due to the effusive activity started at southern vents.

  7. Numerical and physical modeling of cutoff walls against saltwater intrusion

    Science.gov (United States)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo

    2017-04-01

    Seawater intrusion is a relevant problem for many communities living in small islands, where the amount of fresh water available for human consumption depends on the delicate equilibrium between the natural groundwater recharge from rainfall and the surrounding sea. However, it can represent a significant issue also for coastal regions where groundwater is extracted for water supply: an excessive extraction to meet growing demands for drinking water and irrigation purposes leads to a decrease of seaward flows of fresh water and consequently to an increase of seawater intrusion into coastal aquifers. Cutoff walls represent one of the possible strategies that can be adopted to reduce seawater intrusion into coastal aquifers and to limit the inland progression of the saltwater wedge. In this study, on the basis of several preliminary simulations developed by the SUTRA code, a cutoff wall occluding 70% of the aquifer depth is designed for a physical experiment, whose setup details are reported as follows. The physical model represents the terminal part of a coastal aquifer and consists of a flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 49 cm with glass beads with a d50 of 0.6 mm and a uniformity coefficient d60/d10 1.5. The resulting porous medium is homogeneous, with porosity of about 0.37 and hydraulic conductivity of about 1.3 10-3 m/s. Upstream from the sandbox, a tank filled by freshwater provides recharge for the aquifer. The downstream tank simulates the sea and red food dye is added to the saltwater to easily visualize the salt wedge. The volume of the downstream tank is about five times the upstream one, and, due to the small filtration discharge, minimizing salt concentration variations due to the incoming freshwater flow. The hydraulic gradient during the tests is constant, due to the fixed water level in the tanks. Water levels and discharged flow rate are continuously monitored. The cutoff wall was realized with sodium bentonite

  8. Intrusion mechanics according to Burstone with the NiTi-SE-steel uprighting spring.

    Science.gov (United States)

    Sander, F G; Wichelhaus, A; Schiemann, C

    1996-08-01

    Intrusion mechanics according to Burstone can be regarded as a practicable method for the intrusion of incisors. 1. By applying the NiTi-SE-steel uprighting spring, relatively constant forces can be exerted over a large range of intrusion on both sides of the anterior tooth archwire. 2. By bending a 150 degrees tip-back bend or a curvature into the steel portion, the uprighting spring presented here is brought into the plastic range of the characteristic curve of force. 3. Application of sliding hooks on the intrusion spring permits readjustment for force transfer onto the anterior archwire. 4. Connecting the anterior archwire with the posterior elements by means of a steel ligature can be recommended only in some cases, because sagittally directed forces may be produced. 5. The adult patients presented showed an average intrusion of 0.6 mm/month, if a linear connection was presupposed. 6. An intrusive effect on the incisors could first be detected clinically after 6 to 8 weeks. 7. Application of a torque-key proves especially useful in controlling the incisor position during intrusion in order to avoid unnecessary radiography. 8. Actual prediction of the centre of resistance with the help of a cephalometric radiograph proved not to be feasible. 9. The calculated maximal intrusion of the mandibular incisors was 7 mm. 10. The torque-segmented archwire with crimped hooks and pseudoelastic springs between the molars and the crimped hooks proved very effective for retrusion and intrusion of maxillary incisors. The maxillary anterior teeth can be retruded by a total of 7 mm without readjustment. 11. Constant moments and forces could be transferred by applying preformed arch wires and segmented arch wires.

  9. A web-based examination of experiences with intrusive thoughts across the adult lifespan

    Science.gov (United States)

    Magee, Joshua C.; Smyth, Frederick L.; Teachman, Bethany A.

    2014-01-01

    Objectives Intrusive thoughts and images are common across the adult lifespan, but vary in their consequences. Understanding age-related experiences with intrusive thoughts is important for identifying risk and protective factors for intrusive thought problems across the adult lifespan. This study characterized age trajectories for six aspects of experiences with intrusive thoughts using Internet data collection. Method Participants (N=1427; ages 18–87) were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought for one minute, and then later to monitor the thought for a second minute. Participants tracked thought recurrences during each thinking period, then reported their positive and negative affect following each thinking period, as well as their effort expended suppressing the thought, and perceived difficulty controlling the intrusive thought. Multilevel modeling and generalized estimating equations modeled the continuous relationships between age and each dependent variable. Results As expected, older age was associated with less decline in positive affect while engaging with an intrusive thought. Interestingly, older age was also associated with a sharper rise and fall of negative affect. Suppression effort increased linearly with age (though perceived difficulty did not). Finally, no age differences were found in either the frequency or duration of the thought’s recurrence, adding to previous evidence that older adults function similarly to younger adults in their control of intrusive thoughts, despite certain age-related declines in cognitive functioning. Conclusion These findings suggest a dissociation between age-related changes in emotional versus cognitive characteristics of engaging with intrusive thoughts. PMID:24460223

  10. Seawater intrusion vulnerability indicators for freshwater lenses in strip islands

    Science.gov (United States)

    Morgan, L.; Werner, A. D.

    2014-12-01

    Freshwater lenses on small islands have been described as some of the most vulnerable aquifer systems in the world. Yet, little guidance is available regarding methods for rapidly assessing the vulnerability of freshwater lenses to the potential effects of climate change. To address this gap we employ a steady-state analytic modelling approach to develop seawater intrusion (SWI) vulnerability indicator equations. The vulnerability indicator equations quantify the propensity for SWI to occur in strip islands due to both recharge change and sea-level rise (SLR) (incorporating the effect of land surface inundation (LSI)). This work extends that of Werner et al. (2012) who developed SWI vulnerability indicator equations for unconfined and confined continental aquifers, and did not consider LSI. Flux-controlled and head-controlled conceptualisations of freshwater lenses are adopted. Under flux-controlled conditions the water table is able to rise unencumbered by land surface effects. Under head-controlled conditions the head is fixed at the centre of the lens due to, for example, centrally located topographic controls, surface water features or pumping. A number of inferences about SWI vulnerability in freshwater lenses can be made from the analysis: (1) SWI vulnerability indicators for SLR (under flux-controlled conditions) are proportional to lens thickness (or volume) and the rate of LSI and inversely proportional to island width; (2) SWI vulnerability indicators for recharge change (under flux-controlled conditions) are proportional to lens thickness (or volume) and inversely proportional to recharge; (3) SLR has greater impact under head-controlled conditions rather than flux-controlled conditions, whereas the opposite is the case for LSI and recharge change. Example applications to several case studies illustrate use of the method for rapidly ranking lenses according to vulnerability, thereby allowing for prioritisation of areas where further and more detailed SWI

  11. Magma Intrusion, Deformation: the Importance of Crustal Layering.

    Science.gov (United States)

    Amoruso, A.; Crescentini, L.; Linde, A. T.; Sacks, I. S.

    2007-12-01

    The Campi Flegrei caldera (CF) is a volcano-tectonic depression, between Naples and the volcanic islands of Ischia and Procida, and is a highly populated area (about 400000 people). Since the last eruption (Monte Nuovo, 1538 A.D.) the CF caldera suffered notable unrest episodes, including large ground deformations, seismic swarms and increases in the degassing activity. The caldera had been continuously subsiding (at about 1.5 cm per year) from 1538 till 1969. A substantial ground uplift, more than 1 m of deformation, occurred in the period 1969-1972 and, after a small subsidence of about 30 cm after 1972, a very strong uplift occurred in the period 1982-1984 (about 1.8 m), with subsequent partial recovery. Superposed on the still continuing subsidence are some short uplift phases (mini-uplifts during 1989, 1994, 2000, 2004-2006); ground level remains about 2.5 m above pre-1970 levels at the town of Pozzuoli. Early papers on the 1982-1984 CF unrest usually invoked magmatic intrusion to explain observed ground deformation and gravity changes. Later papers invoked fluid intrusions or hybrid sources (including both magmatic and hydrothermal components). Some authors suggested the key role of freely slipping ring faults on the deformation pattern. We show that crustal layering plays a key role in deformation (horizontal and vertical displacement) pattern as well as gravity changes. Using a layered model appropriate for the CF caldera (based on seismically derived estimates of the P wave speed for the crust) we are able to better fit all deformation (horizontal and vertical displacement) and gravity data for the 1982-1984 large uplift with a horizontal crack source intruded by silicate melts. The same source is shared by the most recent (2004-2006) mini-uplift. In the case of the 1982-1984 large uplift, we also investigate whether the presence of a deeper deflating supply reservoir (as suggested for Uzu volcano in Japan) is required by the data.

  12. Full distributed fiber optical sensor for intrusion detection in application to buried pipelines

    Science.gov (United States)

    Gao, Jianzhong; Jiang, Zhuangde; Zhao, Yulong; Zhu, Li; Zhao, Guoxian

    2005-11-01

    Based on the microbend effect of optical fiber, a distributed sensor for real-time continuous monitoring of intrusion in application to buried pipelines is proposed. The sensing element is a long cable with a special structure made up of an elastic polymer wire, an optical fiber, and a metal wire. The damage point is located with an embedded optical time domain reflectometry (OTDR) instrument. The intrusion types can be indicated by the amplitude of output voltage. Experimental results show that the detection system can alarm adequately under abnormal load and can locate the intrusion point within 22.4 m for distance of 3.023 km.

  13. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenchao Li

    2014-01-01

    abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV. Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

  14. A buried intrusion monitoring system based on high sensitivity optical fiber geophone

    Science.gov (United States)

    Li, Shujuan; Zhang, Faxiang; Zhang, Xiaolei; Sun, Zhihui; Min, Li; Wang, Chang

    2017-10-01

    A new intrusion monitoring system is designed, based on a high sensitivity fiber grating geophone and PGC interferometric demodulation. A kind of high sensitive fiber Bragg grating geophone is designed. The sensitivity of the geophone is analyzed by finite element software. The PGC interferometric demodulation algorithm is used to detect the wavelength of the geophone, to reduce the noise of the system and improve the signal-to-noise ratio. Invasive monitoring test was carried out, the personnel and vehicles invading signal were collected and analyzed. Test results show that the intrusion monitoring system based on fiber geophone can effectively identify remote intrusion, and has low false alarm rate.

  15. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks.

    Science.gov (United States)

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-11-17

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented.

  16. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Butun

    2015-11-01

    Full Text Available In this work, an intrusion detection system (IDS framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1 “downward-IDS (D-IDS” to detect the abnormal behavior (intrusion of the subordinate (member nodes; and (2 “upward-IDS (U-IDS” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops and U-IDS (monitoring group size of the framework are evaluated and presented.

  17. Network intrusion detector: NID user`s guide V 1.0

    Energy Technology Data Exchange (ETDEWEB)

    Palasek, R. [ed.

    1994-04-01

    The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

  18. Contextualising Water Use in Residential Settings: A Survey of Non-Intrusive Techniques and Approaches

    Directory of Open Access Journals (Sweden)

    Davide Carboni

    2016-05-01

    Full Text Available Water monitoring in households is important to ensure the sustainability of fresh water reserves on our planet. It provides stakeholders with the statistics required to formulate optimal strategies in residential water management. However, this should not be prohibitive and appliance-level water monitoring cannot practically be achieved by deploying sensors on every faucet or water-consuming device of interest due to the higher hardware costs and complexity, not to mention the risk of accidental leakages that can derive from the extra plumbing needed. Machine learning and data mining techniques are promising techniques to analyse monitored data to obtain non-intrusive water usage disaggregation. This is because they can discern water usage from the aggregated data acquired from a single point of observation. This paper provides an overview of water usage disaggregation systems and related techniques adopted for water event classification. The state-of-the art of algorithms and testbeds used for fixture recognition are reviewed and a discussion on the prominent challenges and future research are also included.

  19. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello

    2015-11-01

    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  20. Will subglacial rhyolite eruptions be explosive or intrusive? Some insights from analytical models

    Science.gov (United States)

    Tuffen, H.; McGarvie, D. W.; Gilbert, J. S.

    Simple analytical models of subglacial eruptions are presented, which simulate evolving subglacial cavities and volcanic edifices during rhyolitic eruptions beneath temperate glaciers. They show that the relative sizes of cavity and edifice may strongly influence the eruption mechanisms. Intrusive eruptions will occur if the edifice fills the cavity, with rising magma quenched within the edifice and slow melting of ice. Explosive magma-water interaction may occur if a water- or steam-filled gap develops above the edifice. Meltwater is assumed to drain away continuously, but any gap above the edifice will be filled by meltwater or steam. Ductile roof closure will occur if the glacier weight exceeds the cavity pressure and is modelled here using Nye's law. The results show that the effusion rate is an important control on the eruption style, with explosive eruptions favoured by large effusion rates. The models are used to explain contrasting eruption mechanisms during various Quaternary subglacial rhyolite eruptions at Torfajökull, Iceland. Although the models are simplistic, they are first attempts to unravel the complex feedbacks between subglacial eruption mechanisms and glacier response that can lead to a variety of eruptive scenarios and associated hazards.

  1. A Culturometric Exploration of Intrusions of Globalisation on Transnational Identities: The Jamaican Example

    Directory of Open Access Journals (Sweden)

    Béatrice BOUFOY-BASTICK

    2010-05-01

    Full Text Available Trans-national identity is a composite of individual and group identity development, construction and negotiation. It is of importance to the collective and to the individual. Its significance extends from collective national action through its influences on governmental policy to the individual who simply asks, "Who am I?" Globalization and modern labor movements between countries with diasporic populations complicate the already complex rapidly changing interdependencies of cultural-ethnic identities comprising individual and collective trans-national identity. This paper utilizes an instrument for assessing, comparing and tracking the changing composite cultural-ethnic identities of individuals and groups that comprise trans-national identity. The instrument is the Cultural Index (Boufoy-Bastick, 2001, 2002, 2007, 2008; a two-item ipsative scale capable of being grounded in each group's definition of their own identity. Jamaican respondents (N=126 participated in a one-on-one Mall interrupt survey to assess the relative contributions of Jamaican, African and Anglo-American cultures to their trans-national identity. Gender and age comparisons, tested for both construct and concurrent validity, showed that Anglo-American culture currently has a significantly smaller impact on Jamaican's collective trans-national identity than do both African and Jamaican cultures. The research is important for monitoring the intrusions of Globalization on the trans-national identities of diasporic communities.

  2. A Precise U-Pb Zircon age for the Skaergaard Intrusion: Magmatic Cooling History Refinement and Palaeogene Igneous Correlations, East Greenland

    Science.gov (United States)

    Hamilton, M. A.; Brooks, C. K.

    2004-05-01

    intrusive complexes (e.g. Rum, Cuillins, Mull) of the Hebridean province, Scotland [6]. [1] Norton, D., & Taylor, H.P. Jr. (1979) J. Petrol, 20, 421 [2] Hirschmann, M.M. et al. (1997) Earth Planet. Sci. Lett. 146, 645 [3] Barfod, G.H. et al. (2003) Chem. Geol. 200, 241 [4] Andreasen, R., Peate, D.W. & Brooks, C.K. (in press) J. Petrol. [5] Storey, M. et al. (1996) Eos, Trans. AGU, 77 (46), F839 [6] Hamilton, M.A. et al. (1998) Nature, 394, 260.

  3. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  4. Non-Intrusive, Distributed Gas Sensing Technology for Advanced Spacesuits

    Science.gov (United States)

    Delgado, Jesus; Phillips, Straun; Rubtsov, Vladimir; Chullen, Cinda

    2015-01-01

    Chemical sensors for monitoring gas composition, including oxygen, humidity, carbon dioxide, and trace contaminants, are needed to characterize and validate spacesuit design and operating parameters. This paper reports on the first prototypes of a non-intrusive gas sensing technology based on flexible sensitive patches positioned inside spacesuit prototypes and interrogated via optical fibers routed outside the suit, taking advantage of the transparent materials of the suit prototypes. The sensitive patches are based on luminescent materials whose emission parameters vary with the partial pressure of a specific gas. Patches sensitive to carbon dioxide, humidity, and temperature have been developed, and their preliminary laboratory characterization in Mark III-like helmet parts is described. The first prototype system consists of a four-channel fiber optic luminescent detector that can be used to monitor any of the selected target gases at four locations. To switch from one gas to another we replace the (disposable) sensor patches and adjust the system settings. Repeatability among sensitive patches and of sensor performance from location to location has been confirmed, assuring that suit engineers will have flexibility in selecting multiple sensing points, fitting the sensor elements into the spacesuit, and easily repositioning the sensor elements as desired. The evaluation of the first prototype for monitoring carbon dioxide during washout studies in a spacesuit prototype is presented.

  5. Autonomous acoustic/seismic networks for intrusion detection and assessment

    International Nuclear Information System (INIS)

    Swanson, D.C.; Kurtz, P.H.

    1995-01-01

    Passive acoustic and seismic sensors have the unique capability for inexpensive non-line-of-sight (NLOS) detection and identification of vehicle movements as well as human and machine activity. By networking multiple sensor sites, one can use on-site processing to minimize internode communications for data fusion to localize the target of interest. Since all acoustic and seismic sources have characteristic directivity responses to their respective noise signatures, the network also offers the ability to observe and identify these characteristics. However, in many perimeter defense situations, a simple detection is all that's really needed. Therefore, the intelligent sensor processing goal is to reduce the false alarm rate in the presence of significant changes in background noise and the environment. The authors have developed a generic hardware platform for acoustic/seismic detection and environmental characterization. They have also developed adaptive models for predicting target detectability in a dynamic environment for performance prediction of the sensor networks. Initial performance tests of the hardware are very encouraging and the authors expect acoustic/seismic sensor networks and the environmental models to have a wide variety uses in surveillance and intrusion detection

  6. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Dhanalakshmi Krishnan Sadhasivan

    2017-01-01

    Full Text Available Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.

  7. Predictors of Intrusive Sexual Behaviors in Preschool-Aged Children.

    Science.gov (United States)

    Smith, Tyler J; Lindsey, Rebecca A; Bohora, Som; Silovsky, Jane F

    2018-04-10

    Intrusive sexual behaviors (ISBs) are a specific type of problematic sexual behavior characterized by the invasive nature of the acts (e.g., touching others' private parts, attempting intercourse; Friedrich, 1997). The limited amount of research on ISBs has focused on sexual abuse history as the primary predictor. However, Friedrich, Davies, Feher, and Wright (2003) found that ISBs in children up to age 12 were related to four broad conceptual factors: (a) exposure to sexual content, (b) exposure to violent behavior, (c) family adversity, and (d) child vulnerabilities. The current study sought to replicate Friedrich's study using a clinical sample of 217 preschool-aged children (ages two to six). Results supported variables from within the child vulnerabilities construct (externalizing behaviors, β EXT  = 0.032, p = 0.001), post-traumatic stress disorder (PTSD) criteria met (β PTSD  = 0.177, p = 0.02), and an inverse relationship with age (β AGE  = -0.206, p = 0.024). These results highlight the importance of considering childhood behavioral patterns and reactivity to traumatic events as correlates of ISBs in young children.

  8. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara

    2012-03-30

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  9. Flexible Training's Intrusion on Work/Life Balance

    Directory of Open Access Journals (Sweden)

    Zane BERGE

    2005-04-01

    Full Text Available Flexible Training's Intrusion on Work/Life Balance Seema TAKIYAJennifer ARCHBOLDZane BERGEBaltimore, USA Learning interventions should be aligned with the human learning system. To be effective, they have to support human learning, not work against it. Thalheimer, 2004 ABSTRACT With more companies allowing “flextime”, more access to elearning, and telecomuting, the line between workplace flexibility and work-life balance begins to blur. Companies “sell” to employees the flexibility of being able to complete training programs from the comfort of the participant's home, allowing them to learn at their own speed. In many ways, this solution is of great value to many employees. What also must be considered with the flexibility such training offers, is the unintentional consequences. This article explores questions such as does this flexibility create a 24-hour work day where the employee is continually accessible to work? Does it result in less family, personal and leisure time to the detriment of the worker?

  10. Non-intrusive long-term monitoring approaches

    International Nuclear Information System (INIS)

    Smathers, D.; Mangan, D.

    1998-01-01

    In order to promote internatinal confidence that the US and Russia are disarming per their commitments under Article 6 of the Non-Proliferation Treaty, an international verification regime may be applied to US and Russian excess fissile materials. Initially, it is envisioned that this verification regime would be applied at storage facilities; however, it should be anticipated that the verification regime would continue throughout any material disposition activities, should such activities be pursued. once the materials are accepted into the verification regime, it is assumed that long term monitoring will be used to maintain continuity of knowledge. The requirements for long term storage monitoring include unattended operation for extended periods of time, minimal intrusiveness on the host nation's safety and security activities, data collection incorporating data authentication, and monitoring redundancy to allow resolution of anomalies and to continue coverage in the event of equipment failures. Additional requirements include effective data review and analysis processes, operation during storage facility loading, procedure for removal of inventory items for safety-related surveillance, and low cost, reliable equipment. A monitoring system might include both continuous monitoring of storagecontainers and continuous area monitoring. These would be complemented with periodic on-site inspections. A fissile material storage facility is not a static operation. The initial studies have shown there are a number of valid reasons why a host nation may need them to remove material from the storage facility. A practical monitoring system must be able to accommodate necessary material movements

  11. Anomaly based Intrusion Detection using Modified Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    B.S. Harish

    2017-12-01

    Full Text Available This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information. As a result, Intrusion Detection System has become an indispensable component of computer security. The proposed method consists of three steps: Pre-Processing, Feature Selection and Clustering. In pre-processing step, the duplicate samples are eliminated from the sample set. Next, principal component analysis is adopted to select the most discriminative features. In clustering step, the network samples are clustered using Robust Spatial Kernel Fuzzy C-Means (RSKFCM algorithm. RSKFCM is a variant of traditional Fuzzy C-Means which considers the neighbourhood membership information and uses kernel distance metric. To evaluate the proposed method, we conducted experiments on standard dataset and compared the results with state-of-the-art methods. We used cluster validity indices, accuracy and false positive rate as performance metrics. Experimental results inferred that, the proposed method achieves better results compared to other methods.

  12. Active Learning Framework for Non-Intrusive Load Monitoring: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Xin

    2016-05-16

    Non-Intrusive Load Monitoring (NILM) is a set of techniques that estimate the electricity usage of individual appliances from power measurements taken at a limited number of locations in a building. One of the key challenges in NILM is having too much data without class labels yet being unable to label the data manually for cost or time constraints. This paper presents an active learning framework that helps existing NILM techniques to overcome this challenge. Active learning is an advanced machine learning method that interactively queries a user for the class label information. Unlike most existing NILM systems that heuristically request user inputs, the proposed method only needs minimally sufficient information from a user to build a compact and yet highly representative load signature library. Initial results indicate the proposed method can reduce the user inputs by up to 90% while still achieving similar disaggregation performance compared to a heuristic method. Thus, the proposed method can substantially reduce the burden on the user, improve the performance of a NILM system with limited user inputs, and overcome the key market barriers to the wide adoption of NILM technologies.

  13. Assessing the risk of saltwater intrusion in coastal aquifers

    Science.gov (United States)

    Klassen, J.; Allen, D. M.

    2017-08-01

    In coastal regions, the quality of groundwater can be compromised due to saltwater intrusion (SWI) caused by natural (sea level rise (SLR) and storm surge) and anthropogenic (pumping) hazards. The goal of this research was to develop and test an approach for assessing the risk of SWI in coastal aquifers. The Gulf Islands in British Columbia (BC) was the case study area. The vulnerability of the bedrock aquifers to SWI was assessed spatially by mapping hazards in combination with the aquifer susceptibility. Climate change related hazards, including SLR and storm surge overwash, were integrated into floodplain maps for each island using projected SLR data for 2100 in combination with estimated storm surge levels based on data collected over a forty year period. When combined with maps showing the density of pumping wells, coastal zones that may be at higher risk of SWI were identified for this particular coastal area of BC. Hazards due to pumping have the greatest influence on the vulnerability. Risk was evaluated spatially using an economic valuation of loss - here replacement of a water supply. The combination of chemical indicators of SWI and risk assessment maps are potentially useful tools for identifying areas vulnerable to SWI, and these tools can be used to improve decision-making related to monitoring and community development for coastal areas, thereby increasing resilience.

  14. A graphical feature generation approach for intrusion detection

    Directory of Open Access Journals (Sweden)

    Chen Shi

    2016-01-01

    Full Text Available In order to develop a novel effective and efficient intrusion detection system, a novel hybrid method based on a graphical features-based k-nearest neighbor approach, namely GFNN, is proposed in this paper. In GFNN, k-means clustering algorithm is used to extract cluster centre of each class in the given dataset. Then, the distance between a specific data sample and each cluster centre is calculated, and a radar chart is plotted based on the new data composed of distance based features. The sub-barycentre based features for each sample are extracted from the radar chart. As a result, our proposed approach transforms the original multi-dimensional feature space into 5-dimensional sub-barycentre feature space. The experimental results of 10-fold cross-validation based on the KDDcup99 dataset show that the GFNN not only performs better than or similar to several other approaches in terms of classification accuracy, precision, and recall. It also provides high computational efficiency for the time of classifier training and testing.

  15. Revisiting Emplacement Depths of the Fine Gold Intrusive Suite, West-Central Sierra Nevada

    Science.gov (United States)

    Head, D.; Lackey, J.

    2013-12-01

    The Fine Gold Intrusive Suite (FGIS) is a large intrusive complex in the west central portion of the Sierra Nevada Batholith. Portions of the Sierra Nevada Batholith have been well studied for plutonic pressure and crystallization histories (e.g., Ague and Brimhall, 1988, GSAB), whereas the regional depth of emplacement of the FGIS is not well characterized, and in previous work pressure estimates were not corrected for crystallization temperatures. An accurate sense of barometric gradient in the FGIS is important to evaluate the roles of pre-batholithic structural breaks in controlling magma emplacement levels, and also to reconstruct erosional levels within the Sierra Nevada as a whole. In this study, samples from the FGIS, all from the Bass Lake Tonalite, were petrographically characterized to identify those samples that contain mineral assemblage and crystallization textures appropriate for application of the Aluminum-in-Hornblende barometer of Hammarstrom and Zen (1986) re-calibrated by Anderson and Smith (1995). Analysis of these samples and use of the barometer results in both pressure and temperature of crystallization. FGIS amphiboles are typical magnesio-hornblende on average: K0.2Na0.1Ca1.8[Mg2.4(Al,Fe3+)(0.2-0.6)]Si6.7Ti0.1Al1.3O22(OH)2. Plagioclase compositional ranges are Ab(54-69)An(30-45)Or(0-1). Bass Lake Tonalite data of Ague and Brimhall (1988) were re-calculated for typical plagioclase composition in the Bass Lake Tonalite (Ab62An37Or1), yielding slightly higher crystallization pressures (3.3 to 5.8 kbar) than the original range (2.4 to 4.5 kbar). New FGIS crystallization pressures of 2.6 to 3.5 kbar match the recalculated data well, thus providing larger coverage for estimates of emplacement depth. Apparent temperatures from adjacent amphibole and plagioclase rims were found to be 691 to 767°C. When all barometric data are considered together, and uncertainties of the calibration are factored in, we find that FGIS crystallization pressures

  16. Diagnostic Indicators for Shipboard Mechanical Systems Using Non-Intrusive Load Monitoring

    National Research Council Canada - National Science Library

    McKay, Thomas D

    2006-01-01

    This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main propulsion engines...

  17. Replacing intrusive thoughts: investigating thought control in relation to OCD symptoms

    NARCIS (Netherlands)

    Ólafsson, R.P.; Snorrason, Í.; Bjarnason, R.K.; Emmelkamp, P.M.G.; Ólason, D.Þ.; Kristjánsson, Á

    2014-01-01

    Background and objectives: Control of obsessive thoughts in Obsessive Compulsive Disorder (OCD) involves both avoidance and removal of undesirable intrusive thoughts. Thought suppression tasks tap both of these processes but experimental results have been inconsistent. Experimental tasks allowing

  18. Intrusion detection techniques for plant-wide network in a nuclear power plant

    International Nuclear Information System (INIS)

    Rajasekhar, P.; Shrikhande, S.V.; Biswas, B.B.; Patil, R.K.

    2012-01-01

    Nuclear power plants have a lot of critical data to be sent to the operator workstations. A plant wide integrated communication network, with high throughput, determinism and redundancy, is required between the workstations and the field. Switched Ethernet network is a promising prospect for such an integrated communication network. But for such an integrated system, intrusion is a major issue. Hence the network should have an intrusion detection system to make the network data secure and enhance the network availability. Intrusion detection is the process of monitoring the events occurring in a network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of network security policies, acceptable user policies, or standard security practices. This paper states the various intrusion detection techniques and approaches which are applicable for analysis of a plant wide network. (author)

  19. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  20. Maxillary molar intrusion with zygomatic anchorage in open bite treatment: lateral and oblique cephalometric evaluation.

    Science.gov (United States)

    Oliveira, Talles Fernando Medeiros de; Nakao, Cecília Yuriko; Gonçalves, João Roberto; Santos-Pinto, Ary

    2015-03-01

    We aimed to use lateral and oblique radiographs to evaluate dental and skeletal changes arising from maxillary molar intrusion with zygomatic anchorage in open bite patients. We conducted a pilot study including nine patients (six females and three males; mean age, 18.7 ± 5.1 years) with skeletal open bite treated with titanium miniplates for posterior dentoalveolar intrusion. Lateral and oblique (right and left, 45°) radiographs were obtained before (T1) and 6 months after intrusion (T2). A paired t test was used for statistical evaluation. The maxillary posterior teeth were intruded 2.03 ± 0.87 mm (p open bite with skeletal anchorage provided intrusion of molars and counterclockwise rotation of the mandible, resulting in open bite closure.

  1. Novel Non-Intrusive Vibration Monitoring System for Turbopumps, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — AI Signal Research, Inc. proposes to develop a Non-Intrusive Vibration Measurement System (NI-VMS) for turbopumps which will provide effective on-board/off-board...

  2. Multi-Use Non-Intrusive Flow Characterization System (FCS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation is a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic flows, capable of...

  3. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  4. Multi-Use Non-Intrusive Flow Characterization System (FCS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The product of the Phase II effort will be a Multi-Use Non-Intrusive Flow Characterization System (FCS) for densified, normal boiling point, and two-phase cryogenic...

  5. Automatic Extraction and Coordination of Audit Data and Features for Intrusion and Damage Assessment

    National Research Council Canada - National Science Library

    Ye, Nong

    2006-01-01

    .... We create a new attack-norm separation approach to developing detection models for building cyber sensors monitoring and identifying intrusion data characteristics at various points along the path...

  6. Evaluation of two arch designs for orthodontic intrusion and retraction of teeth

    Directory of Open Access Journals (Sweden)

    Sukhbir Singh Chopra

    2010-01-01

    Conclusion: Both the designs of intrusion arch wires used in the present study allow the clinician to deliver a well-controlled force system with minimal chair side adjustments and with no additional deleterious effects on the buccal segments.

  7. Quantitative analysis of residential parking intrusions by passenger vehicles in New York City.

    Science.gov (United States)

    2017-05-01

    This paper investigates the spatial patterns of residential parking intrusions in New York City, their determinants, and an : estimated number and spatial patterns of induced excessive vehicle miles traveled (VMT). The paper analyzes parking tickets ...

  8. The Role of Subtropical Intrusion in the Development of Typhoon Usagi (5W) 2007

    National Research Council Canada - National Science Library

    DeLeon, Raymund P

    2008-01-01

    ... of a decaying baroclinic system in the WNP. This analysis of the formation of Usagi points to sub-tropical intrusion of a strong lower-tropospheric baroclinic system undergoing decay as potential seedlings for typhoon formation in areas...

  9. Early Permian intrusions in the Paleozoic sediments of the Eastern North Sea area

    DEFF Research Database (Denmark)

    Clausen, O.R.; Andresen, Katrine Juul; Rasmussen, Jens Andreas

    This study presents the geometry of Paleozoic intrusions in the Skagerrak area located at the northern flank of the Ringkøbing-Fyn High and suggests factors controlling the formation of the intrusions. The intrusions have here been mapped in detail using 3D seismic data. The study area is located...... in the Northern Permian Basin which in the eastern North Sea is separated from the Southern Permian Basin by the Ringkøbing-Fyn High. The Permian basins were initiated during thermal subsidence following a late Carboniferous- early Permian rifting phase associated with extensive igneous activity recorded across...... the entire North Sea Basin. The easternmost intrusions and extrusions have been associated to the “Skagerrak-Centered Large Igneous Province” that has an early Permian age of c. 297 Ma. Compared to the Southern Permian Basin which historically has been intensely investigated because of the known presence...

  10. State-of-the-art technologies for intrusion and obstacle detection for railroad operations

    Science.gov (United States)

    2007-07-01

    This report provides an update on the state-of-the-art technologies with intrusion and obstacle detection capabilities for rail rights of way (ROW) and crossings. A workshop entitled Intruder and Obstacle Detection Systems (IODS) for Railroads Requir...

  11. Intrusion recognition for optic fiber vibration sensor based on the selective attention mechanism

    Science.gov (United States)

    Xu, Haiyan; Xie, Yingjuan; Li, Min; Zhang, Zhuo; Zhang, Xuewu

    2017-11-01

    Distributed fiber-optic vibration sensors receive extensive investigation and play a significant role in the sensor panorama. A fiber optic perimeter detection system based on all-fiber interferometric sensor is proposed, through the back-end analysis, processing and intelligent identification, which can distinguish effects of different intrusion activities. In this paper, an intrusion recognition based on the auditory selective attention mechanism is proposed. Firstly, considering the time-frequency of vibration, the spectrogram is calculated. Secondly, imitating the selective attention mechanism, the color, direction and brightness map of the spectrogram is computed. Based on these maps, the feature matrix is formed after normalization. The system could recognize the intrusion activities occurred along the perimeter sensors. Experiment results show that the proposed method for the perimeter is able to differentiate intrusion signals from ambient noises. What's more, the recognition rate of the system is improved while deduced the false alarm rate, the approach is proved by large practical experiment and project.

  12. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems

    National Research Council Canada - National Science Library

    Fink, G

    2002-01-01

    ...) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues...

  13. Efficiency of two protocols for maxillary molar intrusion with mini-implants

    Directory of Open Access Journals (Sweden)

    Juliana Volpato Curi Paccini

    Full Text Available ABSTRACT Objective: The aim of this study was to compare the efficiency of two protocols for maxillary molar intrusion with two or three mini-implants. Methods: Twenty five maxillary first molars extruded for loss of their antagonists in adult subjects were selected. The sample was divided into two groups, according to the intrusion protocol with two or three mini-implants. Group 1 consisted of 15 molars that were intruded by two mini-implants. Group 2 consisted of 10 molars intruded by three mini-implants. Changes with treatment were analyzed in lateral cephalograms at the beginning and at the end of intrusion of maxillary molars. Results: Results showed that there was no difference in efficiency for the two intrusion protocols. It was concluded that extruded maxillary molars can be intruded with two or three mini-implants with similar efficiency.

  14. Efficiency of two protocols for maxillary molar intrusion with mini-implants.

    Science.gov (United States)

    Paccini, Juliana Volpato Curi; Cotrim-Ferreira, Flávio Augusto; Ferreira, Flávio Vellini; Freitas, Karina Maria Salvatore de; Cançado, Rodrigo Hermont; Valarelli, Fabrício Pinelli

    2016-06-01

    The aim of this study was to compare the efficiency of two protocols for maxillary molar intrusion with two or three mini-implants. Twenty five maxillary first molars extruded for loss of their antagonists in adult subjects were selected. The sample was divided into two groups, according to the intrusion protocol with two or three mini-implants. Group 1 consisted of 15 molars that were intruded by two mini-implants. Group 2 consisted of 10 molars intruded by three mini-implants. Changes with treatment were analyzed in lateral cephalograms at the beginning and at the end of intrusion of maxillary molars. Results showed that there was no difference in efficiency for the two intrusion protocols. It was concluded that extruded maxillary molars can be intruded with two or three mini-implants with similar efficiency.

  15. Novel Non-Intrusive Vibration Monitoring System for Turbopumps, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  16. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combination developed when commercial sensors were unavailable and the future application of expert systems. 5 refs

  17. The evolution of interior intrusion detection technology at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Graham, R.H.; Workhoven, R.M.

    1987-01-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the U.S. Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). The authors also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems

  18. Visuospatial context learning and configuration learning is associated with analogue traumatic intrusions

    NARCIS (Netherlands)

    Meyer, T.; Krans, J.; van Ast, V.; Smeets, T.

    2017-01-01

    Background and objectives Cognitive and information processing theories of Post-Traumatic Stress Disorder (PTSD) assert that trauma intrusions are characterized by poor contextual embedding of visuospatial memories. Therefore, efficient encoding of visuospatial contextual information might protect

  19. Evaluation of deterioration of structural concrete due to chloride intrusion and other damaging mechanisms.

    Science.gov (United States)

    2015-09-01

    Kentucky's bridges continue to age and experience distress. The intrusion of chlorides into : concrete remains the primary mechanism for deterioration. It leads to reinforcing steel corrosion : that damages the adjoining concrete structure. This stud...

  20. The relationship between loss of parents in the holocaust, intrusive memories, and distress among child survivors.

    Science.gov (United States)

    Letzter-Pouw, Sonia; Werner, Perla

    2012-04-01

    The prevalence of intrusive memories of the Holocaust and their relationship to distress was examined among 272 child survivors in Israel. Using attachment theory as a conceptual framework, the authors also examined the effects of type of experience and loss of parents in the Holocaust, psychological resources, other life events, and sociodemographic characteristics on distress and symptomatic behavior. Eighty five percent of the participants reported suffering from intrusive memories. Structural equation modeling showed that survivors who lost one or both parents in the Holocaust suffered more distress because of more intrusive memories. These findings suggest that intrusive memories may be part of unfinished mourning processes related to the loss of parents in the Holocaust. © 2012 American Orthopsychiatric Association.

  1. Floor-fractured craters on the Moon: an evidence of past intrusive magmatic activity

    Science.gov (United States)

    Thorey, C.; Michaut, C.

    2012-12-01

    Floor-fractured lunar craters (FFC's) are a class of craters modified by post impact mechanisms. They are defined by distinctive shallow, often plate-like or convex floors, wide floor moats and radial, concentric and polygonal floor-fractures, suggesting an endogenous process of modification. Two main mechanisms have been proposed to account for such observations : 1) viscous relaxation and 2) spreading of magmatic intrusions at depth below the crater. Here, we propose to test the case of magmatic intrusions. We develop a model for the dynamics of magma spreading below an elastic crust with a crater-like topography and above a rigid horizontal surface. Results show first that the lithostatic pressure increase at the crater rim prevents the intrusion from spreading horizontally giving rise to intrusion thickening and to an uplift of the crater floor. Second, the deformation of the overlying crust exerts a strong control on the intrusion shape, and hence, on the nature of the crater floor uplift. As the deformation can only occur over a minimum flexural wavelength noted Λ, the intrusion shape shows a bell-shaped geometry for crater radius smaller than 3Λ, or a flat top with smooth edges for crater radius larger than 3Λ. For given crustal elastic properties, the crust flexural wavelength increases with the intrusion depth. Therefore, for a large intrusion depth or small crater size, we observe a convex uplift of the crater floor. On the contrary, for a small intrusion depth or large crater size, the crater floor undergoes a piston-like uplift and a circular moat forms just before the rim. The depth of the moat is controlled by the thickening of the crust at the crater rim. On the contrary to viscous relaxation models, our model is thus able to reproduce most of the features of FFC's, including small-scale features. Spreading of a magmatic intrusion at depth can thus be considered as the main endogenous mechanism at the origin of the deformations observed at FFC

  2. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    International Nuclear Information System (INIS)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation

  3. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  4. Network intrusion detection by the coevolutionary immune algorithm of artificial immune systems with clonal selection

    Science.gov (United States)

    Salamatova, T.; Zhukov, V.

    2017-02-01

    The paper presents the application of the artificial immune systems apparatus as a heuristic method of network intrusion detection for algorithmic provision of intrusion detection systems. The coevolutionary immune algorithm of artificial immune systems with clonal selection was elaborated. In testing different datasets the empirical results of evaluation of the algorithm effectiveness were achieved. To identify the degree of efficiency the algorithm was compared with analogs. The fundamental rules based of solutions generated by this algorithm are described in the article.

  5. Simulating the effect of slab features on vapor intrusion of crack entry

    OpenAIRE

    Yao, Yijun; Pennell, Kelly G.; Suuberg, Eric M.

    2013-01-01

    In vapor intrusion screening models, a most widely employed assumption in simulating the entry of contaminant into a building is that of a crack in the building foundation slab. Some modelers employed a perimeter crack hypothesis while others chose not to identify the crack type. However, few studies have systematically investigated the influence on vapor intrusion predictions of slab crack features, such as the shape and distribution of slab cracks and related to this overall building founda...

  6. Attacks against intrusion detection networks: evasion, reverse engineering and optimal countermeasures

    OpenAIRE

    Pastrana Portillo, Sergio

    2016-01-01

    Intrusion Detection Networks (IDNs) constitute a primary element in current cyberdefense systems. IDNs are composed of different nodes distributed among a network infrastructure, performing functions such as local detection --mostly by Intrusion Detection Systems (IDS) --, information sharing with other nodes in the IDN, and aggregation and correlation of data from different sources. Overall, they are able to detect distributed attacks taking place at large scale or in different parts of the ...

  7. Multiple Levels of Bilingual Language Control: Evidence from Language Intrusions in Reading Aloud

    OpenAIRE

    Gollan, Tamar H.; Schotter, Elizabeth R.; Gomez, Joanne; Murillo, Mayra; Rayner, Keith

    2013-01-01

    Bilinguals rarely produce words in an unintended language. However, we induced such intrusion errors (e.g., saying el instead of he) in 32 Spanish-English bilinguals who read aloud language-selective and language-mixed paragraphs with English or Spanish word order. Bilinguals produced language intrusions almost exclusively in language-mixed paragraphs, and most often when attempting to produce dominant-language targets (accent-only errors also exhibited reversed language dominance effects). M...

  8. Intrusive thoughts and young children's knowledge about thinking following a natural disaster.

    Science.gov (United States)

    Sprung, Manuel; Harris, Paul L

    2010-10-01

    Hurricane Katrina devastated the Mississippi Gulf Coast in August 2005. Intrusive re-experiencing is a common posttraumatic stress symptom. However, young children with limited introspection skills might have difficulties identifying their intrusive thoughts. A sample of 165 5- to 9-year-old children were surveyed about their unwanted intrusive thoughts and their knowledge about thinking, 10 months following the hurricane. Results replicate and extend the findings from a previous study (Sprung, 2008). Although there was no difference in the overall occurrence of intrusive thoughts, there was a striking difference between hurricane-exposed and control children in their contents. Children's knowledge about thinking was linked to their ability to report on their negative intrusive thoughts, even taking language ability into account. There is a shift toward negative content following hurricane exposure compared with non-hurricane-exposed children and knowledge about thinking is linked to the reporting of such intrusive thoughts. Implications for current research on autobiographical memory and for interventions following potentially traumatic events are discussed. © 2010 The Authors. Journal compilation © 2010 Association for Child and Adolescent Mental Health.

  9. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Science.gov (United States)

    Gong, Wenping; Lin, Zhongyuan; Chen, Yunzhen; Chen, Zhaoyun; Zhang, Heng

    2018-02-01

    Salt intrusion in the Pearl River estuary (PRE) is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST) modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  10. Association between intrusive negative autobiographical memories and depression: A meta-analytic investigation.

    Science.gov (United States)

    Mihailova, Stella; Jobson, Laura

    2018-02-23

    The study investigated several associations between depression and intrusive negative autobiographical memories. A systematic literature search identified 23 eligible studies (N = 2,582), which provided 59 effect sizes. Separate meta-analyses indicated that depression was moderately, positively associated with intrusive memory frequency, memory distress, maladaptive memory appraisals, memory avoidance, and memory rumination. Intrusive memory vividness was not significantly associated with depression. There were insufficient data to examine the relationship between depression and memory vantage perspective. Between-study heterogeneity was high for intrusive memory frequency and memory avoidance, and the percentage of females in studies significantly moderated the relationship between these variables and depression. An additional exploratory meta-analysis (3 studies; N = 257) indicated that intrusive memories were experienced more frequently by those with posttraumatic stress disorder than those with depression. Overall, the findings suggest that intrusive memories warrant clinical attention as they may contribute to the maintenance of depressive symptomatology. Copyright © 2018 John Wiley & Sons, Ltd.

  11. Effect of winds and waves on salt intrusion in the Pearl River estuary

    Directory of Open Access Journals (Sweden)

    W. Gong

    2018-02-01

    Full Text Available Salt intrusion in the Pearl River estuary (PRE is a dynamic process that is influenced by a range of factors and to date, few studies have examined the effects of winds and waves on salt intrusion in the PRE. We investigate these effects using the Coupled Ocean-Atmosphere-Wave-Sediment Transport (COAWST modeling system applied to the PRE. After careful validation, the model is used for a series of diagnostic simulations. It is revealed that the local wind considerably strengthens the salt intrusion by lowering the water level in the eastern part of the estuary and increasing the bottom landward flow. The remote wind increases the water mixing on the continental shelf, elevates the water level on the shelf and in the PRE and pumps saltier shelf water into the estuary by Ekman transport. Enhancement of the salt intrusion is comparable between the remote and local winds. Waves decrease the salt intrusion by increasing the water mixing. Sensitivity analysis shows that the axial down-estuary wind, is most efficient in driving increases in salt intrusion via wind straining effect.

  12. Anterior Deep Bite Malocclusion Treated with Connecticut Intrusion Arch: Biomechanical Consideration

    Science.gov (United States)

    Bansal, Abhishek; Sami, Laique; Tapashetti, Roopali; Gaikwad, Shashank

    2014-01-01

    Most Class II division 2 malocclusion manifest a severe deep bite, the orthodontic correction of deep overbite can be achieved with several mechanisms one such mechanics is true intrusion of anterior teeth. Deep overbite correction by intrusion of anterior teeth affords a number of advantages which includes simplifying control of the vertical dimension and allowing forward rotation of mandible to aid in Class II correction. It also aid in correction of a high gingival smile line. This case report presents the patient of a 14-year-old boy with Class II division 2 subdivision malocclusion treated with connecticut intrusion arch and also highlights the biomechanical aspect of this appliance. Intrusion of anterior teeth is difficult. An appropriate, effective and clinically manageable biomechanical system is required. The treatment approach shown in this case can treat the deep overbite precisely with incisor intrusion. The article shows the versatility of Connecticut Intrusion Arch and by applying the sound biomechanical principles we can execute the planned mechanics with minimal side effects. PMID:24995261

  13. Intrusive fathering, children's self-regulation and social skills: a mediation analysis.

    Science.gov (United States)

    Stevenson, M; Crnic, K

    2013-06-01

    Fathers have unique influences on children's development, and particularly in the development of social skills. Although father-child relationship influences on children's social competence have received increased attention in general, research on fathering in families of children with developmental delays (DD) is scant. This study examined the pathway of influence among paternal intrusive behaviour, child social skills and child self-regulatory ability, testing a model whereby child regulatory behaviour mediates relations between fathering and child social skills. Participants were 97 families of children with early identified DD enrolled in an extensive longitudinal study. Father and mother child-directed intrusiveness was coded live in naturalistic home observations at child age 4.5, child behaviour dysregulation was coded from a video-taped laboratory problem-solving task at child age 5, and child social skills were measured using independent teacher reports at child age 6. Analyses tested for mediation of the relationship between fathers' intrusiveness and child social skills by child behaviour dysregulation. Fathers' intrusiveness, controlling for mothers' intrusiveness and child behaviour problems, was related to later child decreased social skills and this relationship was mediated by child behaviour dysregulation. Intrusive fathering appears to carry unique risk for the development of social skills in children with DD. Findings are discussed as they related to theories of fatherhood and parenting in children with DD, as well as implications for intervention and future research. © 2012 The Authors. Journal of Intellectual Disability Research © 2012 John Wiley & Sons Ltd, MENCAP & IASSID.

  14. Working with an Electronic Medical Record in Ambulatory Care: A Study of Patient Perceptions of Intrusiveness.

    Science.gov (United States)

    Rizer, Milisa K; Sieck, Cynthia; Lehman, Jennifer S; Hefner, Jennifer L; Huerta, Timothy R; McAlearney, Ann Scheck

    2017-01-01

    To assess patient perceptions of electronic medical record (EMR) intrusiveness during ambulatory visits to clinics associated with a large academic medical center. We conducted a survey of patients seen at any of 98 academic medical center clinics. The survey assessed demographics, visit satisfaction, computer use, and perceived intrusiveness of the computer. Of 7,058 patients, slightly more than 80 percent reported that the physician had used the computer while in the room, but only 24 percent were shown results in the EMR. Most patients were very satisfied or satisfied with their visit and did not find the computer intrusive (83 percent). Younger respondents, those shown results, and those who reported that the physician used the computer were more likely to perceive the computer as intrusive. Qualitative comments suggest different perceptions related to computer intrusiveness than to EMR use more generally. Patients were generally accepting of EMRs and therefore use of computers in the exam room. However, subgroups of patients may require greater study to better understand patient perceptions related to EMR use and intrusiveness. Results suggest the need for greater focus on how physicians use computers in the exam room in a manner that facilitates maintaining good rapport with patients.

  15. Intrusive thoughts in obsessive-compulsive disorder and eating disorder patients: a differential analysis.

    Science.gov (United States)

    García-Soriano, Gemma; Roncero, Maria; Perpiñá, Conxa; Belloch, Amparo

    2014-05-01

    The present study aims to compare the unwanted intrusions experienced by obsessive-compulsive (OCD) and eating disorder (ED) patients, their appraisals, and their control strategies and analyse which variables predict the intrusions' disruption and emotional disturbance in each group. Seventy-nine OCD and 177 ED patients completed two equivalent self-reports designed to assess OCD-related and ED-related intrusions, their dysfunctional appraisals, and associated control strategies. OCD and ED patients experienced intrusions with comparable frequency and emotional disturbance, but OCD patients experienced greater disruption. Differences appeared between groups on some appraisals and control strategies. Intolerance to uncertainty (OCD group) and thought importance (ED group) predicted their respective emotional disturbance and disruption. Additionally, control importance (OCD group) and thought-action fusion moral (OCD and ED groups) predicted their emotional disturbance. OCD and ED share the presence of intrusions; however, different variables explain why they are disruptive and emotionally disturbing. Cognitive intrusions require further investigation as a transdiagnostic variable. Copyright © 2014 John Wiley & Sons, Ltd and Eating Disorders Association.

  16. Non-Intrusive Solution of Stochastic and Parametric Equations

    KAUST Repository

    Matthies, Hermann

    2015-01-07

    the subspace spanned by the approximating functions. Usually this will involve minimising some norm of the difference between the true parametric solution and the approximation. Such methods are sometimes called pseudo-spectral projections, or regression solutions. On the other hand, methods which try to ensure that the approximation satisfies the parametric equation as well as possible are often based on a Rayleigh-Ritz or Galerkin type of “ansatz”, which leads to a coupled system for the unknown coefficients. This is often taken as an indication that the original solver can not be used, i.e. that these methods are “intrusive”. But in many circumstances these methods may as well be used in a non-intrusive fashion. Some very effective new methods based on low-rank approximations fall in the class of “not obviously non-intrusive” methods; hence it is important to show here how this may be computed non-intrusively.

  17. Groundwater salinity in a floodplain forest impacted by saltwater intrusion.

    Science.gov (United States)

    Kaplan, David A; Muñoz-Carpena, Rafael

    2014-11-15

    Coastal wetlands occupy a delicate position at the intersection of fresh and saline waters. Changing climate and watershed hydrology can lead to saltwater intrusion into historically freshwater systems, causing plant mortality and loss of freshwater habitat. Understanding the hydrological functioning of tidally influenced floodplain forests is essential for advancing ecosystem protection and restoration goals, however finding direct relationships between hydrological inputs and floodplain hydrology is complicated by interactions between surface water, groundwater, and atmospheric fluxes in variably saturated soils with heterogeneous vegetation and topography. Thus, an alternative method for identifying common trends and causal factors is required. Dynamic factor analysis (DFA), a time series dimension reduction technique, models temporal variation in observed data as linear combinations of common trends, which represent unexplained common variability, and explanatory variables. DFA was applied to model shallow groundwater salinity in the forested floodplain wetlands of the Loxahatchee River (Florida, USA), where altered watershed hydrology has led to changing hydroperiod and salinity regimes and undesired vegetative changes. Long-term, high-resolution groundwater salinity datasets revealed dynamics over seasonal and yearly time periods as well as over tidal cycles and storm events. DFA identified shared trends among salinity time series and a full dynamic factor model simulated observed series well (overall coefficient of efficiency, Ceff=0.85; 0.52≤Ceff≤0.99). A reduced multilinear model based solely on explanatory variables identified in the DFA had fair to good results (Ceff=0.58; 0.38≤Ceff≤0.75) and may be used to assess the effects of restoration and management scenarios on shallow groundwater salinity in the Loxahatchee River floodplain. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. Lower heart rate variability at baseline is associated with more consecutive intrusive memories in an experimental distressing film paradigm.

    Science.gov (United States)

    Rombold-Bruehl, Felicitas; Otte, Christian; Renneberg, Babette; Schmied, Anna; Zimmermann-Viehoff, Frank; Wingenfeld, Katja; Roepke, Stefan

    2017-10-12

    First evidence suggests that lower heart rate variability (HRV) is associated with more cognitive control deficits, a risk factor for the development of intrusive memories. The aim of this study was to determine whether high-frequency (HF) and low-frequency/high-frequency (LF/HF) ratio components of HRV at rest before an intrusion-inducing stressor would predict consecutive intrusive memories. Healthy female participants (n = 60) watched an established distressing film which induced intrusions. HF and LF/HF ratio were measured for 5 min prior to the stressor. The number of consecutive intrusions resulting from the distressing film was assessed throughout the following 4 days. The main effect LF/HF ratio was associated with more intrusive memories, whereas, the main effect HF was associated with more intrusions on a trend level. The time × HF and time × LF/HF ratio interactions were significant, indicating a different course of number of intrusions over the 4 days depending on HF and LF/HF ratio. The regression-based parameter estimates revealed a significant association of lower HF and number of intrusions on days 1 and 2 and a significant association of higher LF/HF (i.e. lower HRV) and number of intrusions on day 1. The results suggest that higher baseline LF/HF ratio (i.e. lower HRV) predicts more intrusive memories in healthy women after watching a distressing film. Furthermore, the results suggest that women with lower baseline HF and higher LF/HF ratio recover at a slower rate from watching the distressing film by showing a delayed decrease in intrusive memories. Our findings support the notion that lower baseline HRV before a trauma might be a vulnerability factor for subsequent intrusive memories.

  19. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  20. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    (Chattopadhyay and Hashmi 1984; Maitra 1992;. Srivastava et al 2005; Srivastava and Sinha 2007a,. 2007b) and Samchampi igneous complex of Mikir. Hills (Nag et al 1999; Saha et al 2010) are worth mentioning. The Mawpyut ultramafic complex. (Maitra 1992; Maitra et al 2003) in Jaintia Hills of the Meghalaya plateau ...