WorldWideScience

Sample records for biological intrusion erosion

  1. Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.

    1986-02-01

    This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user

  2. Preliminary assessment of geologic materials to minimize biological intrusion of low-level waste trench covers and plans for the future

    International Nuclear Information System (INIS)

    Hakonson, T.E.; White, G.C.; Gladney, E.S.; Muller, M.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause radionuclide transport from a waste site. Preliminary results demonstrate that a sandy backfill material offers little resistance to root and animal intrusion through the cover profile. However, bentonite clay, cobble, and cobble-gravel combinations do reduce plant root and animal intrusion through cover profiles compared with sandy backfill soil. However, bentonite clay barrier systems appear to be degraded by plant roots through time. Desiccation of the clay barrier by invading plant roots may limit the usefulness of bentonite clay as a moisture and/or biological carrier unless due consideration is given to this interaction. Future experiments are described that further examine the effect of plant roots on clay barrier systems and that determine the effectiveness of proposed biological barriers on larger scales and under various stress conditions

  3. Preliminary report of biological intrusion studies at the Idaho National Engineering Laboratory subsurface disposal area

    International Nuclear Information System (INIS)

    Reynolds, T.D.; Arthur, W.J.

    1983-01-01

    As part of a larger study on the effects of biological intrusion of plants and animals into the soil cover placed over low-level radioactive wastes stored at the Idaho National Engineering Laboratory Subsurface Disposal Area (SDA), research was initiated in the summer of 1982 to determine the burrow characteristics and movement patterns of several small mammal species, and the rooting depths of various plants. The depth, length, and volume of burrows were determined for four small mammal species: deer mouse (Peromyscus maniculatus), Ord's kangaroo rat (Dipodomys ordii), montane vole (Microtus montanus), and Townsend's ground squirrel (Spermophilis townsendii). The latter species excavated the greatest mean burrow depth (39 cm), length (404 cm), and volume (14.8 1). Movement patterns of three species were determined by radiotelemetry. The mean area of use for P. maniculatus, D. ordii, and M. montanus was 2.3, 1.5, and 1.2 ha respectively. Limited data on rooting depths of various native and introduced plant species at the SDA were obtained by literature review and excavation. During FY-83, experiments will be conducted, using the information obtained from the first year of this study, to evaluate the impact of burrowing mammals and root intrusion on the integrity of the soil cover currently existing at the SDA. Details of these experimental studies are presented

  4. Synthetic Versus Biological Mesh-Related Erosion After Laparoscopic Ventral Mesh Rectopexy: A Systematic Review.

    Science.gov (United States)

    Balla, Andrea; Quaresima, Silvia; Smolarek, Sebastian; Shalaby, Mostafa; Missori, Giulia; Sileri, Pierpaolo

    2017-04-01

    This review reports the incidence of mesh-related erosion after ventral mesh rectopexy to determine whether any difference exists in the erosion rate between synthetic and biological mesh. A systematic search of the MEDLINE and the Ovid databases was conducted to identify suitable articles published between 2004 and 2015. The search strategy capture terms were laparoscopic ventral mesh rectopexy, laparoscopic anterior rectopexy, robotic ventral rectopexy, and robotic anterior rectopexy. Eight studies (3,956 patients) were included in this review. Of those patients, 3,517 patients underwent laparoscopic ventral rectopexy (LVR) using synthetic mesh and 439 using biological mesh. Sixty-six erosions were observed with synthetic mesh (26 rectal, 32 vaginal, 8 recto-vaginal fistulae) and one (perineal erosion) with biological mesh. The synthetic and the biological mesh-related erosion rates were 1.87% and 0.22%, respectively. The time between rectopexy and diagnosis of mesh erosion ranged from 1.7 to 124 months. No mesh-related mortalities were reported. The incidence of mesh-related erosion after LVR is low and is more common after the placement of synthetic mesh. The use of biological mesh for LVR seems to be a safer option; however, large, multicenter, randomized, control trials with long follow-ups are required if a definitive answer is to be obtained.

  5. Intrusion of the Bay of Bengal water into the Arabian Sea during winter monsoon and associated chemical and biological response

    Digital Repository Service at National Institute of Oceanography (India)

    PrasannaKumar, S.; Narvekar, J.; Kumar, A.; Shaji, C.; Anand, P.; Sabu, P.; Rijomon, G.; Josia, J.; Jayaraj, K.A.; Radhika, A.; Nair, K.K.C.

    : Physicochemical properties. Citation: Prasanna Kumar, S., et al. (2004), Intrusion of the Bay of Bengal water into the Arabian Sea during winter monsoon and associated chemical and biological response, Geophys. Res. Lett., 31, L15304, doi:10.1029/2004GL020247. 1...

  6. How development and disturbance of biological soil crust do affect runoff and erosion in drylands?

    Energy Technology Data Exchange (ETDEWEB)

    Chamizo, S.; Canton, Y.; Afana, A.; Lazaro, R.; Domingo, F.; Sole-Benet, A.

    2009-07-01

    Deserts and semiarid ecosystems (shrub lands and grasslands) are the largest terrestrial biome, covering more than 40% of the Earth's terrestrial surface and Biological Soil Crusts (BSCs) are the predominant surface type in most of those ecosystems covering up to 70% of its surface. BSCs have been demonstrated to be very vulnerable to disturbance due to human activities and their loss has been implicated as a factor leading to accelerate soil erosion and other forms of land degradation. Incorporation of the response of different type of soil crusts and the effects of the their disturbance is likely to improve the prediction of runoff and water erosion models in arid and semi-arid catchments. The aim of this work is to analyse the influence of crust disturbance on infiltration and erosion. Extreme rainfall simulations at micro plots scale were performed in two semiarid ecosystems with different lithology and conditions of occurrence of BSCs: El Cautivo and Amoladeras. (Author) 10 refs.

  7. Bryophyte-dominated biological soil crusts mitigate soil erosion in an early successional Chinese subtropical forest

    Science.gov (United States)

    Seitz, Steffen; Nebel, Martin; Goebes, Philipp; Käppeler, Kathrin; Schmidt, Karsten; Shi, Xuezheng; Song, Zhengshan; Webber, Carla L.; Weber, Bettina; Scholten, Thomas

    2017-12-01

    This study investigated the development of biological soil crusts (biocrusts) in an early successional subtropical forest plantation and their impact on soil erosion. Within a biodiversity and ecosystem functioning experiment in southeast China (biodiversity and ecosystem functioning (BEF) China), the effect of these biocrusts on sediment delivery and runoff was assessed within micro-scale runoff plots under natural rainfall, and biocrust cover was surveyed over a 5-year period. Results showed that biocrusts occurred widely in the experimental forest ecosystem and developed from initial light cyanobacteria- and algae-dominated crusts to later-stage bryophyte-dominated crusts within only 3 years. Biocrust cover was still increasing after 6 years of tree growth. Within later-stage crusts, 25 bryophyte species were determined. Surrounding vegetation cover and terrain attributes significantly influenced the development of biocrusts. Besides high crown cover and leaf area index, the development of biocrusts was favoured by low slope gradients, slope orientations towards the incident sunlight and the altitude of the research plots. Measurements showed that bryophyte-dominated biocrusts strongly decreased soil erosion, being more effective than abiotic soil surface cover. Hence, their significant role in mitigating sediment delivery and runoff generation in mesic forest environments and their ability to quickly colonise soil surfaces after disturbance are of particular interest for soil erosion control in early-stage forest plantations.

  8. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  9. Biological water contamination in some cattle production fields of Argentina subjected to runoff and erosion

    Directory of Open Access Journals (Sweden)

    Celio I. Chagas

    2014-10-01

    Full Text Available Grain production has displaced livestock to marginal lands in most of the productive regions in Argentina since 1990. In the fertile Rolling Pampa region, extensive cattle production has been concentrated in lowlands subjected to flooding, salt excess, erosion and sedimentation processes but also in some feedlots recently located in sloping arable lands prone to soil erosion. We studied the concentration of microbiological contamination indicators in runoff water and sediments accumulated in depressions along the tributary network from these lands devoted to cattle production. The aims of this work were: (i to gather a reliable set of data from different monitoring periods and scales, (ii to search for simple and sensible variables to be used as indicators for surface water quality advising purposes and (iii to corroborate previous biological contamination conceptual models for this region. Concentration of pollution indicators in these ponds was related to mean stocking rates from nearby fields and proved to depend significantly on the accumulated water and sediments. Viable mesophiles and total coliforms were found mainly attached to large sediments rather than in the runoff water phase. Seasonal sampling showed that the time period between the last significant runoff event and each sampling date regarding enterococci proved to be a sensible variable for predicting contamination. Enterococci concentration tended to increase gradually until the next extraordinary runoff event washed away contaminants. The mentioned relationship may be useful for designing early warning surface water contamination programs regarding enterococci dynamics and other related microbial pollutants as well.

  10. Vapor Intrusion

    Science.gov (United States)

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  11. [Biological soil crust nitrogenase activity and its responses to hydro-thermic factors in different erosion regions on the Loess Plateau, China].

    Science.gov (United States)

    Ming, Jiao; Zhao, Yun-Ge; Xu, Ming-Xiang; Yang, Li-Na; Wang, Ai-Guo

    2013-07-01

    Based on field survey, the biological soil crusts at their stable development stage were collected from the water erosion region, water-wind erosion region, and wind erosion region on the Loess Plateau, aimed to study the effects of the variations of moisture and temperature on the crusts nitrogenase activity (NA). The NA of the crusts in the erosion regions decreased in the order of water erosion region (127.7 micromol x m(-2) x h(-1)) > water-wind erosion region (34.6 micromol x m(-2) x h(-1)) > wind erosion region (6.0 micromol x m(-2) x h(-1)), and the optimal temperature for the crust nitrogen fixation was 35 degrees C, 25 degrees C, and 15 degrees C, respectively. At the optimal temperature and 100% -40% field water-holding capacity, the NA of the crusts from the water erosion and water-wind erosion regions had no significant difference. The NA of the crusts from the wind erosion region was more sensitive to the variation of moisture, showing a dramatic decline when the moisture decreased to 80% field water-holding capacity, and totally lost when the moisture decreased to 20% field water-holding capacity. The differences in the NA of the crusts from the three erosion regions and the responses of the NA to the variations of moisture and temperature were likely associated with the climate, environment, and the crust species composition.

  12. [Effects of biological regulated measures on active organic carbon and erosion-resistance in the Three Gorges Reservoir region soil].

    Science.gov (United States)

    Huang, Ru; Huang, Lin; He, Bing-Hui; Zhou, Li-Jiang; Yu, Chuan; Wang, Feng

    2013-07-01

    To gain a better knowledge of characteristics of soils and provide a scientific basis for soil erosion control in the Three Gorges Reservoir Area, contents of aggregates and total soil organic carbon (SOC), as well as soil active organic carbon fractions including particulate organic carbon (POC), readily oxidized organic carbon (ROC), dissolved organic carbon (DOC), microbial biomass carbon (MBC) in the 0-30 cm soil layer under seven different biological regulated measures were studied by the field investigation combined with the laboratory analysis. Results showed that the content of the SOC and active organic carbon fractions decreased with the increasing soil depth; the content of the SOC and active organic carbon fractions in 0-10 cm was significantly higher than that in 20-30 cm. The stability of soil aggregates were also significantly influenced by biological regulated measures, the content of > 0.25 mm water-stable aggregates in seven types of biological regulated measures was in the order of Koelreuteria bipinnata + Cassia suffruticasa > hedgerows > closed forest > natural restoration > economic forest > traditional planting > control plot, moreover, the content of 0.25 mm water-stable aggregates correlated positively with the content of SOC. Soils under different biological regulated measures all demonstrated fractal features, and soil under the measure of Koelreuteria bipinnata + Cassia suffruticasa was found to have the lowest value of fractal dimension and soil erodiable K, indicating a relatively strong structure stability and erosion-resistant capacity. Negative correlation was observed when compared the content of active organic carbon fractions with the soil erodiable K. It can be concluded that properties of soil can be managed through biological regulated measures; thence had an influence on the soil erosion-resistant capacity.

  13. BIOLOGICAL WAYS OF STRUGGLE AGAINST WATER EROSION ON ARABLE SLOPES OF THE CENTRAL RUSSIA

    Directory of Open Access Journals (Sweden)

    Tatyana ANISIMOVA

    2013-12-01

    Full Text Available In article are proved a choice of ways of struggle against water erosion of arable slopes on the basis of harnessing the potential of bio-based agrocenosis. Efficiency of use long-term lupine in quality green manure and phyto-ameliorant on eroded soddy-podzolic sandy soils of the Vladimir area is shown.

  14. Forest-biological erosion control on coal-mine spoil banks in Bulgaria

    International Nuclear Information System (INIS)

    Haigh, M.J.; Gentcheva-Kostadinova, S.; Zheleva, E.

    1995-01-01

    The forest fallowing of coal-mine spoils helps re-establish the processes of natural, self-sustaining, soil formation. Environmental monitoring in Bulgaria demonstrates that forestation can moderate soil pH (from ph> 3.0 to pH 1.3 g/cm 3 in the 0-5 cm layer) in the case of coal briquette spoils at Pernik, near Sofia. Ground losses from forested, 16-17 degree slope, coal briquette-spoils at Pernik are a quarter of those from an entirely unvegetated section of the same embankment (48.5 vs 12. 1 mm in the period 1988-1994) despite the absence of ground cover beneath the trees. On lignite spoil banks, at Maritsa-Iztok, central Bulgaria, forestation increases the organic content of the soil to greater depths than revegetation with grass, and to a greater degree than conventional agricultural cultivation. On Pinus nigra forested crest sites at Pernik, and in Robinia pseudacacia forested groves on the lignite minespoil banks at Maritsa-Iztok, slopes showed ground advance rather than ground retreat. Slopes protected by mechanical means alone did not allow soil growth and, where the structure broke down, they suffered as much erosion as untreated sites. In sum, the forest fallowing of surface coal-mine disturbed land accelerates organic matter accumulation in the soil, helps improve soil structure, reduces erosion, and may transform soil loss into soil gain, even on steeply sloping sites. 17 refs., 3 figs., 1 tab

  15. Biologically-initiated rock crust on sandstone: Mechanical and hydraulic properties and resistance to erosion

    Czech Academy of Sciences Publication Activity Database

    Slavík, M.; Bruthans, J.; Filippi, Michal; Schweigstillová, Jana; Falteisek, L.; Řihošek, J.

    2017-01-01

    Roč. 278, FEB 1 (2017), s. 298-313 ISSN 0169-555X R&D Projects: GA ČR GA13-28040S; GA ČR(CZ) GA16-19459S Institutional support: RVO:67985831 ; RVO:67985891 Keywords : biofilm * biocrust * biologically-initiated rock crust * sandstone protection * case hardening Subject RIV: DB - Geology ; Mineralogy; DB - Geology ; Mineralogy (USMH-B) OBOR OECD: Geology; Geology (USMH-B) Impact factor: 2.958, year: 2016

  16. Measurement error causes scale-dependent threshold erosion of biological signals in animal movement data.

    Science.gov (United States)

    Bradshaw, Corey J A; Sims, David W; Hays, Graeme C

    2007-03-01

    Recent advances in telemetry technology have created a wealth of tracking data available for many animal species moving over spatial scales from tens of meters to tens of thousands of kilometers. Increasingly, such data sets are being used for quantitative movement analyses aimed at extracting fundamental biological signals such as optimal searching behavior and scale-dependent foraging decisions. We show here that the location error inherent in various tracking technologies reduces the ability to detect patterns of behavior within movements. Our analyses endeavored to set out a series of initial ground rules for ecologists to help ensure that sampling noise is not misinterpreted as a real biological signal. We simulated animal movement tracks using specialized random walks known as Lévy flights at three spatial scales of investigation: 100-km, 10-km, and 1-km maximum daily step lengths. The locations generated in the simulations were then blurred using known error distributions associated with commonly applied tracking methods: the Global Positioning System (GPS), Argos polar-orbiting satellites, and light-level geolocation. Deviations from the idealized Lévy flight pattern were assessed for each track after incrementing levels of location error were applied at each spatial scale, with additional assessments of the effect of error on scale-dependent movement patterns measured using fractal mean dimension and first-passage time (FPT) analyses. The accuracy of parameter estimation (Lévy mu, fractal mean D, and variance in FPT) declined precipitously at threshold errors relative to each spatial scale. At 100-km maximum daily step lengths, error standard deviations of > or = 10 km seriously eroded the biological patterns evident in the simulated tracks, with analogous thresholds at the 10-km and 1-km scales (error SD > or = 1.3 km and 0.07 km, respectively). Temporal subsampling of the simulated tracks maintained some elements of the biological signals depending on

  17. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  18. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  19. Saliva and dental erosion

    Directory of Open Access Journals (Sweden)

    Marília Afonso Rabelo Buzalaf

    2012-10-01

    Full Text Available Dental erosion is a multifactorial condition. The consideration of chemical, biological and behavioral factors is fundamental for its prevention and therapy. Among the biological factors, saliva is one of the most important parameters in the protection against erosive wear. Objective: This review discusses the role of salivary factors on the development of dental erosion. Material and Methods: A search was undertaken on MeDLINe website for papers from 1969 to 2010. The keywords used in the research were "saliva", "acquired pellicle", "salivary flow", "salivary buffering capacity" and "dental erosion". Inclusion of studies, data extraction and quality assessment were undertaken independently and in duplicate by two members of the review team. Disagreements were solved by discussion and consensus or by a third party. Results: Several characteristics and properties of saliva play an important role in dental erosion. Salivary clearance gradually eliminates the acids through swallowing and saliva presents buffering capacity causing neutralization and buffering of dietary acids. Salivary flow allows dilution of the acids. In addition, saliva is supersaturated with respect to tooth mineral, providing calcium, phosphate and fluoride necessary for remineralization after an erosive challenge. Furthermore, many proteins present in saliva and acquired pellicle play an important role in dental erosion. Conclusions: Saliva is the most important biological factor affecting the progression of dental erosion. Knowledge of its components and properties involved in this protective role can drive the development of preventive measures targeting to enhance its known beneficial effects.

  20. Saliva and dental erosion

    Science.gov (United States)

    BUZALAF, Marília Afonso Rabelo; HANNAS, Angélicas Reis; KATO, Melissa Thiemi

    2012-01-01

    Dental erosion is a multifactorial condition. The consideration of chemical, biological and behavioral factors is fundamental for its prevention and therapy. Among the biological factors, saliva is one of the most important parameters in the protection against erosive wear. Objective This review discusses the role of salivary factors on the development of dental erosion. Material and Methods A search was undertaken on MEDLINE website for papers from 1969 to 2010. The keywords used in the research were "saliva", "acquired pellicle", "salivary flow", "salivary buffering capacity" and "dental erosion". Inclusion of studies, data extraction and quality assessment were undertaken independently and in duplicate by two members of the review team. Disagreements were solved by discussion and consensus or by a third party. Results Several characteristics and properties of saliva play an important role in dental erosion. Salivary clearance gradually eliminates the acids through swallowing and saliva presents buffering capacity causing neutralization and buffering of dietary acids. Salivary flow allows dilution of the acids. In addition, saliva is supersaturated with respect to tooth mineral, providing calcium, phosphate and fluoride necessary for remineralization after an erosive challenge. Furthermore, many proteins present in saliva and acquired pellicle play an important role in dental erosion. Conclusions Saliva is the most important biological factor affecting the progression of dental erosion. Knowledge of its components and properties involved in this protective role can drive the development of preventive measures targeting to enhance its known beneficial effects. PMID:23138733

  1. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  3. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  4. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  5. Erosive gastritis

    International Nuclear Information System (INIS)

    Mohammed, S.H.; Conrad, C.; Kjoergaad, J.

    1982-01-01

    Erosive gastritis is a well-defined radiologic and endoscopic entity. It is one of the common causes of upper gastrointestinal bleeding, yet it is seldom diagnosed and often confused with a number of other diseases. This communication re-emphasizes the characteristic endoscopic and radiologic features of erosive gastritis and its differential diagnosis. Two representative cases are reported. (orig.)

  6. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  7. Oceanic thermohaline intrusions: theory

    Science.gov (United States)

    Ruddick, Barry; Kerr, Oliver

    2003-03-01

    This is a review of theories governing growth and evolution of thermohaline intrusive motions. We discuss theories based on eddy coefficients and salt finger flux ratios and also on molecular Fickian diffusion, drawing relationships and parallels where possible. We discuss linear theories of various physical configurations, effects of rotation and shear, and nonlinear theories. A key requirement for such theories to become quantitatively correct is the development and field testing of relationships between double-diffusive fluxes and average vertical gradients of temperature and salinity. While we have some ideas about the functional dependencies and rough observational constraints on the magnitudes of such flux/gradient relationships, many questions will not be answered until usable ‘flux laws’ exist. Furthermore, numerical experiments on double-diffusive intrusions are currently feasible, but will have more quantitative meaning when fluxes are parameterised with such laws. We conclude that more work needs to be done in at least two areas. Firstly, tests of linear theory against observations should continue, particularly to discover the extent to which linear theories actually explain the genesis of intrusions. Secondly, theoretical studies are needed on the nonlinear effects that control the evolution and finite amplitude state of intrusions, since these determine the lateral fluxes of salt, heat, and momentum.

  8. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  9. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  10. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  11. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    protection in the United States. AFIT-ENG-13-M-49 NETWORK INTRUSION DATASET ASSESSMENT THESIS Presented to the Faculty Department of Electrical and...conclusions as to its use as a benchmark dataset vary: Cho et al. [10] recommend not using the KDD99 dataset at all, while Engen et al. [16] suggest that...more care be taken in interpretation of results, but recommend continued use. As discussed by Engen et al. [16], researchers continue to use the KDD99

  12. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  13. Erhversbetinget erosion?

    DEFF Research Database (Denmark)

    Dige, Irene; Gjørup, Hans; Nyvad, Bente

    2012-01-01

    Baggrund – I forbindelse med dental erosion er en grundig udredning af patienten vigtig, således at årsagen til erosionernes opståen findes, og der kan iværksættes adækvat forebyggende indsats. En sådan udredning er ikke mindst vigtig, når arbejdsmiljøet mistænkes. Patienttilfælde – En 30-årig...... arbejdsskade, men ikke anerkendt, da erosioner ikke er optaget på Arbejdsskadestyrelsens liste over erhvervssygdomme. En systematisk registrering af lignende tilfælde kunne imidlertid på sigt ændre retspraksis for fremtidige patienter med arbejdsbetinget erosion....

  14. Wireless Intrusion Detection

    Science.gov (United States)

    2007-03-01

    LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Frequency Error (kHz) Figure 3-8 Frequency error Distributions...0.40 0.45 Linksys/CIAMPIAJ1 Linksys/LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Received Power (dBm) Figure 3-10...Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Rise-Time (samples) Figure 3-12 Packet Rise-Time Distributions During Intrusion

  15. Motion effects on intrusion development

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Holmes, E.A.; Becker, E.S.

    2010-01-01

    Analogue studies on intrusion development have found that visuospatial tasks performed during the encoding of aversive information reduce subsequent intrusion development. However, these studies cannot rule out a physical explanation in terms of simple movement. In the current study we addressed

  16. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  17. Work zone intrusion alarm effectiveness.

    Science.gov (United States)

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  18. Environment-Sensitive Intrusion Detection

    National Research Council Canada - National Science Library

    Giffin, Jonathan T; Dagon, David; Jha, Somesh; Lee, Wenke; Miller, Barton P

    2006-01-01

    .... We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy...

  19. An immunological approach to intrusion detection

    OpenAIRE

    Watkins, A.

    2000-01-01

    This paper presents an examination of intrusion detection schemes. It discusses\\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\\ud effective, approach to intrusion detection as modeled on the human immune system. The\\ud discussion looks at some of the implications raised by intrusion detection research for\\ud information security in general.

  20. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  1. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    present technique. The present technique may be useful for monitoring refractive indices of active chemical solutions which was not possible with intrusive-type FO sensors. 2. Sensor principle. For a circular beam of light with cross-sectional area A, incident at an angle θi on the surface of a second medium, the power ...

  2. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system.

  3. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position.

  4. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index ...

  5. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  6. Computer Network Equipment for Intrusion Detection Research

    National Research Council Canada - National Science Library

    Ye, Nong

    2000-01-01

    .... To test the process model, the system-level intrusion detection techniques and the working prototype of the intrusion detection system, a set of computer and network equipment has been purchased...

  7. Erosion and Errors

    NARCIS (Netherlands)

    Huisman, H.; Heeres, Glenn; Os, van Bertil; Derickx, Willem; Schoorl, J.M.

    2016-01-01

    Slope soil erosion is one of the main threats to archaeological sites. Several methods were applied to establish the erosion rates at archaeological sites. Digital elevation models (DEMs) from three different dates were used. We compared the elevations from these three models to estimate erosion. We

  8. Assessing storm erosion hazards

    NARCIS (Netherlands)

    Ranasinghe, Ranasinghe W M R J B; Callaghan, D.; Ciavola, Paolo; Coco, Giovanni

    2017-01-01

    The storm erosion hazard on coasts is usually expressed as an erosion volume and/or associated episodic coastline retreat. The accurate assessment of present-day and future storm erosion volumes is a key task for coastal zone managers, planners and engineers. There are four main approaches that can

  9. Mapping erosion from space

    NARCIS (Netherlands)

    Vrieling, A.

    2007-01-01

    Soil erosion by water is the most important land degradation problem worldwide. Spatial information on erosion is required for defining effective soil and water conservation strategies. Satellite remote sensing can provide relevant input to regional erosion assessment. This thesis comprises a review

  10. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  11. Poleward intrusion in the northern Galician shelf

    Science.gov (United States)

    Alvarez, I.; Ospina-Alvarez, N.; deCastro, M.; Varela, M.; Gomez-Gesteira, M.; Prego, R.

    2010-05-01

    The evolution of a warm water mass related to the Iberian Poleward Current (IPC) was characterized along the northern Galician shelf in November 2008 by means of Sea Surface Temperature and wind data. It was observed that under upwelling favorable conditions water temperature decreased along the northern coast and a temperature break appeared between Cape Vilano and Cape Ortegal showing a relaxation of the poleward intrusion. The effect of the IPC was also analyzed inside the Northern Galician Rias taking into account the hydrographical and biogeochemical properties measured on November 18. Water driven by the IPC was observed close to the mouth of the rias, around Cape Estaca de Bares, causing a nutrient salts decrease. Inside the rias a slight biological activity was found near surface resulting from fluvial contributions.

  12. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-12-15

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  13. Marshes on the Move: Testing effects of seawater intrusion on vegetation communities of the salt marsh-upland ecotone

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress to...

  14. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  15. Erosion resistance of bionic functional surfaces inspired from desert scorpions.

    Science.gov (United States)

    Zhiwu, Han; Junqiu, Zhang; Chao, Ge; Li, Wen; Ren, Luquan

    2012-02-07

    In this paper, a bionic method is presented to improve the erosion resistance of machine components. Desert scorpion (Androctonus australis) is a typical animal living in sandy deserts, and may face erosive action of blowing sand at a high speed. Based on the idea of bionics and biologic experimental techniques, the mechanisms of the sand erosion resistance of desert scorpion were investigated. Results showed that the desert scorpions used special microtextures such as bumps and grooves to construct the functional surfaces to achieve the erosion resistance. In order to understand the erosion resistance mechanisms of such functional surfaces, the combination of computational and experimental research were carried out in this paper. The Computational Fluid Dynamics (CFD) method was applied to predict the erosion performance of the bionic functional surfaces. The result demonstrated that the microtextured surfaces exhibited better erosion resistance than the smooth surfaces. The further erosion tests indicated that the groove surfaces exhibited better erosion performance at 30° injection angle. In order to determine the effect of the groove dimensions on the erosion resistance, regression analysis of orthogonal multinomials was also performed under a certain erosion condition, and the regression equation between the erosion rate and groove distance, width, and height was established.

  16. Catalytic interface erosion

    International Nuclear Information System (INIS)

    Meng, H.; Cohen, E.G.D.

    1995-01-01

    We study interface erosion processes: catalytic erosions. We present two cases. (1) The erosion of a completely occupied lattice by one single moving particle starting from somewhere inside the lattice, considering deterministic as well as probabilistic erosion rules. In the latter case, the eroded regions appear to have interfaces with continuously tunable fractal dimensions. (2) The kinetic roughening of an initially flat surface, where ballistic or diffusion-limited particles, which remain intact themselves, erode the surface coming from the outside, using the same erosion rules as in (1). Many features resembling realistic interfaces, for example, islands and inlets, are generated. The dependence of the surface width on the system size is due to both the erosion mechanism and the way particles move before reaching the surface

  17. Protection from erosion following wildfire

    Science.gov (United States)

    Peter R. Robichaud; William J. Elliot

    2006-01-01

    Erosion in the first year after a wildfire can be up to three orders of magnitude greater than the erosion from undisturbed forests. To mitigate potential postfire erosion, various erosion control treatments are applied on highly erodible areas with downstream resources in need of protection. Because postfire erosion rates generally decline by an order of magnitude for...

  18. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  19. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  20. Biology

    Indian Academy of Sciences (India)

    I am particularly happy that the Academy is bringing out this document by Professor M S. Valiathan on Ayurvedic Biology. It is an effort to place before the scientific community, especially that of India, the unique scientific opportunities that arise out of viewing Ayurveda from the perspective of contemporary science, its tools ...

  1. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    Sulfide intrusion in seagrasses represents a global threat to seagrasses. In contrast seegrasses grow in hostile sediments, where they are constantly exposed to sulfide intrusion. Little is known about the strategies to survive sulfide intrusion, if there are detoxification mechanisms and sulfur...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  2. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  3. Effectiveness of the GAEC cross compliance standards Rational management of set aside, Grass strips to control soil erosion and Vegetation buffers along watercourses on surface animal diversity and biological quality of soil

    Directory of Open Access Journals (Sweden)

    Marta Biaggini

    2011-08-01

    Full Text Available Landscape simplification and loss of natural and semi-natural habitats are the major causes of biodiversity decrease in agricultural landscapes. In order to mitigate the effects of intensive agricultural management the Ministry of Agricultural, Food and Forestry Policies in Italy has included the agronomic measures Rational management of set aside, Grass strips to control soil erosion and Vegetation buffers along watercourses in the decree on cross compliance. In this paper we review the results of a field research performed in Central Italy. The aim of the study was to evaluate the efficacy of the above mentioned GAEC standards for animal diversity enhancement. Using different animal groups as indicators, superficial Arthropod fauna and Herpetofauna, we found striking differences in the biodiversity levels of areas characterized by the application or by the lack of GAEC standards, with the latter being characterized by a significatively impoverished fauna. In particular, the set aside area and the buffer of riparian vegetation resulted of primary importance to allow higher biodiversity levels. Also the analysis of the biological quality of the soil, as assessed through the QBS-ar index based on edaphic micro-Arthropod fauna, indicated a higher quality of semi-natural habitats with respect to arable lands.

  4. The roles of noradrenergic and glucocorticoid activation in the development of intrusive memories.

    Directory of Open Access Journals (Sweden)

    Richard A Bryant

    Full Text Available Intrusive memories are a common feature of many psychological disorders. Recent evidence has potentially extended cognitive models of intrusions by identifying the role of biological markers of arousal at the time of consolidation in subsequent memory for emotional events. This study investigated the role of arousal during consolidation in the development of intrusive memories. Seventy-eight university students (37 men and 41 women viewed 20 negative and 20 neutral images. Half the participants then underwent a cold pressor test (High Stress, immersing their hand in ice water, while the remaining participants immersed their hand in warm water (Low Stress. Samples of salivary alpha-amylase (sAA and cortisol were collected from participants at baseline and following the stressor challenge. Participants completed a delayed free recall test and intrusion questionnaires two days later. Participants in the High Stress condition reported more intrusions of negative images than participants in the Low Stress condition. An interaction variable in a linear regression of increased noradrenergic and cortisol values predicted intrusive memories of emotional stimuli for men but not women. These findings are consistent with recent evidence of the combined effects of noradrenaline and corticoid responses to stress on emotional memories, and also with increasing evidence of gender differences in how stress hormones influence formation of emotional memories. These findings point to possible mechanisms by which development of intrusions may be prevented after consolidation of traumatic experiences.

  5. Dental erosion: causes, diagnostics and treatment.

    Directory of Open Access Journals (Sweden)

    Cecilia Sosa-Puente

    2014-12-01

    Full Text Available Despite being a commonly studied topic, it is difficult to find studies which explain the problem of dental erosion. For this article, literature was analyzed to find information on the agents which trigger dental erosion, the main diagnosis methods, the most common treatments used nowadays and the interrelationship with dental materials. The etiology of dental erosion is multifactorial, including acids, eating disorders and gastro-esophageal reflux. However, biological factors such as saliva or habits also play a part in the establishment of this condition. In order to establish a reliable diagnosis, clinical appearance becomes decisive. The Basic Index Erosive Wear Examination (BEWE, created in 2008, is an auxiliary diagnosis tool for assessing the status and progress of the erosion. Treatment should be linked to the eradication of the causative agent and it can range from simple observational monitoring of slightly affected teeth to the placement of total crowns in the most severe cases, but this will depend entirely on the extent, severity, symptoms and type of dentition. Regarding dental materials used in the treatment of eroded parts, there are glass ionomer and composite; the latter presents the greatest resistance to biodegradation when interacting with acids. Glass ionomers are the most vulnerable material while resin is seen as the most resistant. In conclusion, dental erosion has become an issue of great importance in the dental practice because of its serious impact on dental structures. Consequently, it is ranked among the most important dental disorders in the present day.

  6. An artificial bioindicator system for network intrusion detection.

    Science.gov (United States)

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  7. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  8. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  9. Erosion in America

    Energy Technology Data Exchange (ETDEWEB)

    1984-03-23

    The US loses about five billion tons of soil a year from erosion, and scientists estimate that from 20 to 50% of world cropland suffers from excessive erosion. The effect of erosion is a loss in both land and water productivity. When combined with the problems of overpopulation, overgrazing, and deforestation, the environmental impacts are very serious. There are some signs that countries are beginning to adopt conservation tilling techniques, but even cooperative government programs in the US such as the 1983 Payment-in-Kind (PIK) program have had only partial success because of expanded production on marginal farmlands. 20 reference 5 figures.

  10. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...

  11. Traumatic intrusions as 'worse case scenario's'.

    Science.gov (United States)

    Merckelbach, H; Muris, P; Horselenberg, R; Rassin, E

    1998-11-01

    While some clinicians assume that traumatic intrusions are historically accurate revisualizations of traumatic incidents, others have suggested that these types of intrusions may represent a worse case scenario (i.e. exaggerated) version of the trauma. To explore this issue, a survey was conducted among undergraduate students (N = 189). Of the 69 respondents who had been the victim of or witness to a relatively recent trauma, 15 (22%) reported an exaggerated perception of the traumatic incident. Exaggerated intrusions were found to have more flashback qualities and tended to have a higher frequency than 'realistic' intrusions. These findings are well in line with the idea that intrusions are not necessarily veridical copies of traumatic events.

  12. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  13. A New Method for Intrusion Detection using Manifold Learning Algorithm

    OpenAIRE

    Guoping Hou; Xuan Ma; Yuelei Zhang

    2013-01-01

    Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion fea...

  14. Measurement of erosion: Is it possible?

    NARCIS (Netherlands)

    Stroosnijder, L.

    2005-01-01

    Reasons for erosion measurements are: (1) to determine the environmental impact of erosion and conservation practices, (2) scientific erosion research; (3) development and evaluation of erosion control technology; (4) development of erosion prediction technology and (5) allocation of conservation

  15. Does Canoeing Increase Streambank Erosion?

    Science.gov (United States)

    Edward A. Hansen

    1975-01-01

    Describes research on the Pine River in Michigan to determine if large increases in canoeing accelerated streambank erosion. Most erosion was natural, but people sliding and camping on streambanks created some erosion. Heavy canoe traffic was not a cause of erosion.

  16. Rainfall erosivity in Europe.

    Science.gov (United States)

    Panagos, Panos; Ballabio, Cristiano; Borrelli, Pasquale; Meusburger, Katrin; Klik, Andreas; Rousseva, Svetla; Tadić, Melita Perčec; Michaelides, Silas; Hrabalíková, Michaela; Olsen, Preben; Aalto, Juha; Lakatos, Mónika; Rymszewicz, Anna; Dumitrescu, Alexandru; Beguería, Santiago; Alewell, Christine

    2015-04-01

    Rainfall is one the main drivers of soil erosion. The erosive force of rainfall is expressed as rainfall erosivity. Rainfall erosivity considers the rainfall amount and intensity, and is most commonly expressed as the R-factor in the USLE model and its revised version, RUSLE. At national and continental levels, the scarce availability of data obliges soil erosion modellers to estimate this factor based on rainfall data with only low temporal resolution (daily, monthly, annual averages). The purpose of this study is to assess rainfall erosivity in Europe in the form of the RUSLE R-factor, based on the best available datasets. Data have been collected from 1541 precipitation stations in all European Union (EU) Member States and Switzerland, with temporal resolutions of 5 to 60 min. The R-factor values calculated from precipitation data of different temporal resolutions were normalised to R-factor values with temporal resolutions of 30 min using linear regression functions. Precipitation time series ranged from a minimum of 5 years to a maximum of 40 years. The average time series per precipitation station is around 17.1 years, the most datasets including the first decade of the 21st century. Gaussian Process Regression (GPR) has been used to interpolate the R-factor station values to a European rainfall erosivity map at 1 km resolution. The covariates used for the R-factor interpolation were climatic data (total precipitation, seasonal precipitation, precipitation of driest/wettest months, average temperature), elevation and latitude/longitude. The mean R-factor for the EU plus Switzerland is 722 MJ mm ha(-1) h(-1) yr(-1), with the highest values (>1000 MJ mm ha(-1) h(-1) yr(-1)) in the Mediterranean and alpine regions and the lowest (<500 MJ mm ha(-1) h(-1) yr(-1)) in the Nordic countries. The erosivity density (erosivity normalised to annual precipitation amounts) was also the highest in Mediterranean regions which implies high risk for erosive events and floods

  17. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  18. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    is known about the strategies of seagrasses to survive sulfide intrusion, their potential detoxification mechanisms and sulfur nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  19. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  20. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  1. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  2. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  3. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  4. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  5. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  6. Erosive Lichen Planus.

    Science.gov (United States)

    Mauskar, Melissa

    2017-09-01

    Lichen planus is an inflammatory mucocutaneous condition with a myriad of clinical manifestations. There are 3 forms of lichen planus that effect the vulva: papulosquamous, hypertrophic, and erosive. Erosive lichen planus can progress to vulvar scaring, vaginal stenosis, and squamous cell carcinoma; these long-term sequelae cause sexual distress, depression, and decreased quality of life for patients. Diagnosis is often delayed because of patient embarrassment or clinician misdiagnosis. Early recognition and treatment is essential to decreasing the morbidity of this condition. Multimodal treatment, along with a multidisciplinary approach, will improve outcomes and further clinical advances in studying this condition. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. The neural representation of intrusive thoughts

    Science.gov (United States)

    Schmiedek, Florian; Brose, Annette; Schott, Björn H.; Lindenberger, Ulman; Lövden, Martin

    2013-01-01

    Based on the philosophical notion that language embodies thought we investigated whether a habitual tendency for intrusive thought that younger and older participants report over a period of 100 sessions, spread out over about 6 months, is associated with brain regions related to language production. In favour of this hypothesis, we found that individual differences in habitual intrusive thoughts are correlated with activity in the left inferior frontal gyrus (IFG, Broca’s area) as well as the cingulate cortex (CC) during a two-choice reaction-time task in fMRI. Participants who habitually tended to experience intrusive thoughts showed greater activity during task-free (baseline) compared to task periods in brain regions involved in language production. Task performance was unrelated to individual differences in intrusive thoughts. We conclude that intrusive thoughts may be represented in a language-like format and that individuals reporting a habitually higher tendency for intrusive thoughts may have stronger and more habitual inner speech processes. PMID:22563007

  8. Control of erosive tooth wear: possibilities and rationale

    Directory of Open Access Journals (Sweden)

    Mônica Campos Serra

    2009-06-01

    Full Text Available Dental erosion is a type of wear caused by non bacterial acids or chelation. There is evidence of a significant increase in the prevalence of dental wear in the deciduous and permanent teeth as a consequence of the frequent intake of acidic foods and drinks, or due to gastric acid which may reach the oral cavity following reflux or vomiting episodes. The presence of acids is a prerequisite for dental erosion, but the erosive wear is complex and depends on the interaction of biological, chemical and behavioral factors. Even though erosion may be defined or described as an isolated process, in clinical situations other wear phenomena are expected to occur concomitantly, such as abrasive wear (which occurs, e.g, due to tooth brushing or mastication. In order to control dental loss due to erosive wear it is crucial to take into account its multifactorial nature, which predisposes some individuals to the condition.

  9. Bentonite erosion. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Birgersson, Martin; Boergesson, Lennart; Hedstroem, Magnus; Karnland, Ola; Nilsson, Ulf (Clay Technology AB, Lund (Sweden))

    2009-12-15

    Low saline water may reach KBS-3 repository depth, e.g. during periods of glaciation. Under such aqueous conditions, the montmorillonite part of the bentonite buffer might transform into a sol and thereby be transported away with flowing water in fractures. The primary aim with this report is to improve the understanding of the basic principles for this possible montmorillonite particle release. The report includes experimental and theoretical work performed at Clay Technology. Natural bentonite and ion-exchanged purified montmorillonite from three different geographical origins, Wyoming (U.S.), Milos (Greece) and Kutch (India) have been studied. Experimental and/or theoretical investigations have been performed with respect to: - Free swelling ability; - Rheological properties; - Rate of bentonite loss into fractures; - Filtering; - Ion exchange; - Sol formation ability; - Ion diffusion; - Mass loss due to erosion. The performed erosion experiments show that erosion does not occur in a mixed calcium/sodium montmorillonite with at least 20% calcium in exchange positions, when the external solution contains above 4 mM charge equivalents. This result is in agreement with the presented conceptual view of sol formation and measured equilibrium properties in mixed calcium/sodium montmorillonite. The findings imply that the buffer will be stable for non-glacial conditions. However, erosion due to sol formation cannot be ruled out for glacial conditions.

  10. Dune erosion above revetments

    NARCIS (Netherlands)

    Van Thiel de Vries, J.S.M.

    2012-01-01

    In a situation with a narrow dune, the dune base can be protected with a revetment to reduce dune erosion during extreme events. To quantify the effects of a revetment on storm impact, the functionality of the numerical storm impact model XBeach (Roelvink et al., 2009) is extended to account for the

  11. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  12. Categorization of erosion control matting.

    Science.gov (United States)

    2012-05-29

    Erosion control is a critical aspect of any Georgia Department of Transportation (GDOT) : construction project, with the extreme negative impacts of high sediment loads in natural : waterways having been well documented. A variety of erosion control ...

  13. Soil erosion and agricultural sustainability

    OpenAIRE

    Montgomery, David R.

    2007-01-01

    Data drawn from a global compilation of studies quantitatively confirm the long-articulated contention that erosion rates from conventionally plowed agricultural fields average 1–2 orders of magnitude greater than rates of soil production, erosion under native vegetation, and long-term geological erosion. The general equivalence of the latter indicates that, considered globally, hillslope soil production and erosion evolve to balance geologic and climate forcing, whereas conventional plow-bas...

  14. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  15. Seismicity, seismology and erosion

    Science.gov (United States)

    Hovius, Niels; Meunier, Patrick; Burtin, Arnaud; Marc, Odin

    2013-04-01

    At the interface of geomorphology and seismology, patterns of erosion can be used to constrain seismic processes, and seismological instruments to determine geomorphic activity. For example, earthquakes trigger mass wasting in proportion to peak ground velocity or acceleration, modulated by local geologic and topographic conditions. This geomorphic response determines the mass balance and net topographic effect of earthquakes. It can also be used to obtain information about the distribution of seismic slip where instrumental observations are not available. Equally, seismometers can register the signals of geomorphic processes, revealing their location, type and magnitude. The high temporal resolution of such records can help determine the exact meteorological conditions that gave rise to erosion events, and the interactions between individual surface processes during such events. We will illustrate this synergy of disciplines with examples from active mountain belts around the world, including Taiwan, Japan, Papua New Guinea and the Alps.

  16. Rainfall erosivity map for Ghana

    International Nuclear Information System (INIS)

    Oduro Afriyie, K.

    1995-10-01

    Monthly rainfall data, spanning over a period of more than thirty years, were used to compute rainfall erosivity indices for various stations in Ghana, using the Fournier index, c, defined as p 2 /P, where p is the rainfall amount in the wettest month and P is the annual rainfall amount. Values of the rainfall erosivity indices ranged from 24.5 mm at Sunyani in the mid-portion of Ghana to 180.9 mm at Axim in the south western coastal portion. The indices were used to construct a rainfall erosivity map for the country. The map revealed that Ghana may be broadly divided into five major erosion risk zones. The middle sector of Ghana is generally in the low erosion risk zone; the northern sector is in the moderate to severe erosion risk zone, while the coastal sector is in the severe to extreme severe erosion risk zone. (author). 11 refs, 1 fig., 1 tab

  17. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  18. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  19. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  20. Actinides, accelerators and erosion

    Directory of Open Access Journals (Sweden)

    Fifield L.K.

    2012-10-01

    Full Text Available Fallout isotopes can be used as artificial tracers of soil erosion and sediment accumulation. The most commonly used isotope to date has been 137Cs. Concentrations of 137Cs are, however, significantly lower in the Southern Hemisphere, and furthermore have now declined to 35% of original values due to radioactive decay. As a consequence the future utility of 137Cs is limited in Australia, with many erosion applications becoming untenable within the next 20 years, and there is a need to replace it with another tracer. Plutonium could fill this role, and has the advantages that there were six times as many atoms of Pu as of 137Cs in fallout, and any loss to decay has been negligible due to the long half-lives of the plutonium isotopes. Uranium-236 is another long-lived fallout isotope with significant potential for exploitation as a tracer of soil and sediment movement. Uranium is expected to be more mobile in soils than plutonium (or caesium, and hence the 236U/Pu ratio will vary with soil depth, and so could provide an independent measure of the amount of soil loss. In this paper we discuss accelerator based ultra-sensitive measurements of plutonium and 236U isotopes and their advantages over 137Cs as tracers of soil erosion and sediment movement.

  1. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  2. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  3. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  4. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2001-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  5. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2002-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  6. Soil erosion in Iran: Issues and solutions

    Science.gov (United States)

    Hamidreza Sadeghi, Seyed; Cerdà, Artemi

    2015-04-01

    Iran currently faces many soil erosion-related problems (see citations below). These issues are resulted from some inherent characteristic and anthropogenic triggering forces. Nowadays, the latter plays more important rule to accelerate the erosion with further emphasis on soil erosion-prone arid and semi arid regions of the country. This contribution attempts to identify and describe the existing main reasons behind accelerated soil erosion in Iran. Appropriate solutions viz. structural and non-structural approaches will be then advised to combat or minimise the problems. Iran can be used as a pilot research site to understand the soil erosion processes in semiarid, arid and mountainous terrain and our research will review the scientific literature and will give an insight of the soil erosion rates in the main factors of the soil erosion in Iran. Key words: Anthropogenic Erosion, Land Degradation; Sediment Management; Sediment Problems Acknowledgements The research projects GL2008-02879/BTE, LEDDRA 243857 and PREVENTING AND REMEDIATING DEGRADATION OF SOILS IN EUROPE THROUGH LAND CARE (RECARE)FP7-ENV-2013- supported this research. References Aghili Nategh, N., Hemmat, A., & Sadeghi, M. (2014). Assessing confined and semi-confined compression curves of highly calcareous remolded soil amended with farmyard manure. Journal of Terramechanics, 53, 75-82. Arekhi, S., Bolourani, A. D., Shabani, A., Fathizad, H., Ahamdy-Asbchin, S. 2012. Mapping Soil Erosion and Sediment Yield Susceptibility using RUSLE, Remote Sensing and GIS (Case study: Cham Gardalan Watershed, Iran). Advances in Environmental Biology, 6(1), 109-124. Arekhi, S., Shabani, A., Rostamizad, G. 2012. Application of the modified universal soil loss equation (MUSLE) in prediction of sediment yield (Case study: Kengir Watershed, Iran). Arabian Journal of Geosciences, 5(6), 1259-1267.Sadeghi, S. H., Moosavi, V., Karami, A., Behnia, N. 2012. Soil erosion assessment and prioritization of affecting factors at plot

  7. A Study of Cavitation Erosion

    International Nuclear Information System (INIS)

    Hiromu Isaka; Masatsugu Tsutsumi; Tadashi Shiraishi; Hiroyuki Kobayashi

    2002-01-01

    The authors performed experimental study for the purpose of the following two items from a viewpoint of cavitation erosion of a cylindrical orifice in view of a problem at the letdown orifice in PWR (Pressurized Water Reactor). 1. To get the critical cavitation parameter of the cylindrical orifice to establish the design criteria for prevention of cavitation erosion, and 2. to ascertain the erosion rate in such an eventuality that the cavitation erosion occurs with the orifice made of stainless steel with precipitation hardening (17-4-Cu hardening type stainless steel), so that we confirm the appropriateness of the design criteria. Regarding the 1. item, we carried out the cavitation tests to get the critical cavitation parameters inside and downstream of the orifice. The test results showed that the cavitation parameter at inception is independent of the length or the diameter of the orifice. Moreover, the design criteria of cavitation erosion of cylindrical orifices have been established. Regarding the 2. item, we tested the erosion rate under high-pressure conditions. The cavitation erosion actually occurred in the cylindrical orifice at the tests that was strongly resemble to the erosion occurred at the plant. It will be seldom to reproduce resemble cavitation erosion in a cylindrical orifice with the hard material used at plants. We could establish the criteria for preventing the cavitation erosion from the test results. (authors)

  8. Crusts: biological

    Science.gov (United States)

    Belnap, Jayne; Elias, Scott A.

    2013-01-01

    Biological soil crusts, a community of cyanobacteria, lichens, mosses, and fungi, are an essential part of dryland ecosystems. They are critical in the stabilization of soils, protecting them from wind and water erosion. Similarly, these soil surface communities also stabilized soils on early Earth, allowing vascular plants to establish. They contribute nitrogen and carbon to otherwise relatively infertile dryland soils, and have a strong influence on hydrologic cycles. Their presence can also influence vascular plant establishment and nutrition.

  9. Web Defacement and Intrusion Monitoring Tool: WDIMT

    CSIR Research Space (South Africa)

    Masango, Mfundo G

    2017-09-01

    Full Text Available at altering the content of the web pages or to make the website inactive. This paper proposes a Web Defacement and Intrusion Monitoring Tool, that could be a possible solution to the rapid identification of altered or deleted web pages. The proposed tool...

  10. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  11. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  12. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    https://dx.doi.org/10.4314/jasem.v21i2.18. Key words: Escravos, Vertical electrical sounding, Saltwater Intrusion, freshwater lenses, Aquifer, groundwater. Globally groundwater contributes a greater percentage of water usage in domestic, irrigation of agricultural farms and industrial purposes. Though groundwater is not the ...

  13. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  14. A terminological matter: paragenesis, antigravitative erosion or antigravitational erosion ?

    Directory of Open Access Journals (Sweden)

    Pasini G.

    2009-07-01

    Full Text Available In the speleological literature three terms are utilized to designate the “ascending erosion”: paragenesis (= paragénésis, coined in1968, antigravitative erosion (= erosione antigravitativa, coined in 1966 and antigravitational erosion (wrong English translation ofthe Italian term erosione antigravitativa, utilized later on. The term paragenesis should be abandoned because of the priority of theterm erosione antigravitativa - on the ground of the “law of priority” – and because of its ambiguous etimology. On the other hand,the term antigravitational erosion should be forsaken in favour of the term antigravitative erosion, given the meaning that the termsgravitation and gravity have in Physics. Therefore, to designate the phenomenon of the “ascending erosion” there would be nothingleft but the term antigravitative erosion.The antigravitative erosion process and its recognizability are illustrated.Examples of caves with evident antigravitative erosion phenomena, developed in different karstifiable rocks and in several partsof the world, are given.It is recalled that the antigravitative erosion is a phenomenon well-known since 1942 and widely proven and supported, and that it isrelatively easy – in many cases - to recognize the antigravitative origin of karstic passages.It is stressed that the antigravitative erosion is an important phenomenon, exclusive of the karstic caves and unique in nature.

  15. Eolian erosion of the Martian surface. I - Erosion rate similitude

    Science.gov (United States)

    Iversen, J. D.; White, B. R.; Greeley, R.; Pollack, J. B.

    1975-01-01

    A similitude parameter is derived which is based on theoretical considerations of erosion due to sand in saltation. This parameter has been used to correlate wind tunnel experiments of particle flow over model craters. The characteristics of the flow field in the vicinity and downstream of a crater are discussed and it is shown that erosion is initiated in areas lying under a pair of trailing vortices. The erosion rate parameter is used to calculate erosion rates on Mars, reported in Part 2, to be published later.

  16. Vapor Intrusion Characterization Report (Revision 1.0)

    Science.gov (United States)

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  17. On the Feasibility of Intrusion Detection Inside Workstation Disks

    National Research Council Canada - National Science Library

    Griffin, John L; Pennington, Adam; Bucy, John S; Choundappan, Deepa; Muralidharan, Nithya; Ganger, Gregory R

    2003-01-01

    Storage-based intrusion detection systems (IDSs) can be valuable tools in monitoring for and notifying administrators of malicious software executing on a host computer, including many common intrusion tool kits...

  18. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  19. Thermal effects of water intrusion in hydrophobic nanoporous materials.

    Science.gov (United States)

    Karbowiak, Thomas; Paulin, Christian; Ballandras, Anthony; Weber, Guy; Bellat, Jean-Pierre

    2009-07-29

    Liquid water intrusion in hydrophobic nanoporous silicalite-1, a pure siliceous zeolite, in isothermal conditions under high pressure produces an endothermic effect. After intrusion, confined water in zeolite pores is in a different state from that of the liquid bulk water. Such forced intrusion also chemically modifies the material and tends to render it slightly more hydrophilic.

  20. Shoulder erosions in renal osteodystrophy

    International Nuclear Information System (INIS)

    Bonavita, J.A.; Dalinka, M.K.

    1980-01-01

    The radiographic manifestations of renal osteodystrophy may be articular as well as osseous. The latter are well recognized, i.e. subperiosteal and subchondral bony resorption. Recently attention has been directed to the occurrence of an erosive arthritis of the hands and wrists in hyperparathyroidism. The authors present six patients with humeral head erosions, all of whom were on chronic long-term hemodialysis. These intra-articular erosions occurred at the 'bare' area of the humeral head and thus represent an erosive arthritis and therefore can be distinguished from the usual sites of subchondral and subperiosteal bony resorption seen in hyperparathyroidism. (orig.) [de

  1. Multiperspective analysis of erosion tolerance

    Directory of Open Access Journals (Sweden)

    Sparovek Gerd

    2003-01-01

    Full Text Available Erosion tolerance is the most multidisciplinary field of soil erosion research. Scientists have shown lack in ability to adequately analyze the huge list of variables that influence soil loss tolerance definitions. For these the perspectives of erosion made by farmers, environmentalists, society and politicians have to be considered simultaneously. Partial and biased definitions of erosion tolerance may explain not only the polemic nature of the currently suggested values but also, in part, the nonadoption of the desired levels of erosion control. To move towards a solution, considerable changes would have to occur on how this topic is investigated, especially among scientists, who would have to change methods and strategies and extend the perspective of research out of the boundaries of the physical processes and the frontiers of the academy. A more effective integration and communication with the society and farmers, to learn about their perspective of erosion and a multidisciplinary approach, integrating soil, social, economic and environmental sciences are essential for improved erosion tolerance definitions. In the opinion of the authors, soil erosion research is not moving in this direction and a better understanding of erosion tolerance is not to be expected in the near future.

  2. In-Situ Measurement of Hall Thruster Erosion Using a Fiber Optic Regression Probe

    Science.gov (United States)

    Polzin, Kurt; Korman, Valentin

    2009-01-01

    One potential life-limiting mechanism in a Hall thruster is the erosion of the ceramic material comprising the discharge channel. This is especially true for missions that require long thrusting periods and can be problematic for lifetime qualification, especially when attempting to qualify a thruster by analysis rather than a test lasting the full duration of the mission. In addition to lifetime, several analytical and numerical models include electrode erosion as a mechanism contributing to enhanced transport properties. However, there is still a great deal of dispute over the importance of erosion to transport in Hall thrusters. The capability to perform an in-situ measurement of discharge channel erosion is useful in addressing both the lifetime and transport concerns. An in-situ measurement would allow for real-time data regarding the erosion rates at different operating points, providing a quick method for empirically anchoring any analysis geared towards lifetime qualification. Erosion rate data over a thruster s operating envelope would also be useful in the modeling of the detailed physics inside the discharge chamber. There are many different sensors and techniques that have been employed to quantify discharge channel erosion in Hall thrusters. Snapshots of the wear pattern can be obtained at regular shutdown intervals using laser profilometry. Many non-intrusive techniques of varying complexity and sensitivity have been employed to detect the time-varying presence of erosion products in the thruster plume. These include the use quartz crystal microbalances, emission spectroscopy, laser induced flourescence, and cavity ring-down spectroscopy. While these techniques can provide a very accurate picture of the level of eroded material in the thruster plume, it is more difficult to use them to determine the location from which the material was eroded. Furthermore, none of the methods cited provide a true in-situ measure of erosion at the channel surface while

  3. Plasma erosion switch

    International Nuclear Information System (INIS)

    Mendel, C.W. Jr.; Goldstein, S.A.; Miller, P.A.

    1976-01-01

    The plasma erosion switch is a device capable of initially carrying high currents, and then of opening in nanoseconds to stand off high voltages. It depends upon the erosion of a plasma which initially fills the switch. The sheath between the plasma and the cathode behaves as a diode with a rapidly increasing A-K gap. Preliminary tests of the switch on the Proto I accelerator at Sandia will be described. In these tests, the switch consisted of a cylinder of highly ionized plasma four inches in diameter and one-inch thick surrounding a one-inch cathode. The switch shorted out prepulse voltages and allowed energy to be stored in the diode inductance outside the switch until the accelerator current reached 75 kA. The switch impedance then rose rapidly to approximately 100 ω in 5 nanoseconds, whereupon the accelerator current transferred to the cathode. Current rise rates of 3.10 13 A/sec were limited by cathode turn-on. Voltage rise rates of 10 15 V/sec were achieved. The elimination of prepulse and machine turn-on transients allowed A-K gaps of 2 mm to be used with 2.5 MV pulses, yielding average E fields of 12 MV/cm. Staged versions of the device are being built and should improve rise rates. The switch shows promise for use with future, higher power, lower inductance machines

  4. Erosion in extruder flow

    Science.gov (United States)

    Kaufman, Miron; Fodor, Petru S.

    A detailed analysis of the fluid flow in Tadmor's unwound channel model of the single screw extruder is performed by combining numerical and analytical methods. Using the analytical solution for the longitudinal velocity field (in the limit of zero Reynolds number) allows us to devote all the computational resources solely for a detailed numerical solution of the transversal velocity field. This high resolution 3D model of the fluid flow in a single-screw extruder allows us to identify the position and extent of Moffatt eddies that impede mixing. We further consider the erosion of particles (e.g. carbon-black agglomerates) advected by the polymeric flow. We assume a particle to be made of primary fragments bound together. In the erosion process a primary fragment breaks out of a given particle. Particles are advected by the laminar flow and they disperse because of the shear stresses imparted by the fluid. The time evolution of the numbers of particles of different sizes is described by the Bateman coupled differential equations used to model radioactivity. Using the particle size distribution we compute an entropic fragmentation index which varies from 0 for a monodisperse system to 1 for an extreme poly-disperse system.

  5. Remote erosion and corrosion monitoring of subsea pipelines using acoustic telemetry and wet-mate connector technology

    Energy Technology Data Exchange (ETDEWEB)

    Painter, Howard; Barlow, Stewart [Teledyne ODI, Thousand Oaks, CA (United States); Clarke, Daniel [Teledyne Cormon, Thousand Oaks, CA (United States); Green, Dale [Teledyne Benthos, North Falmouth, MA (United States)

    2009-07-01

    This paper will present a novel approach for monitoring erosion and corrosion using proven sub sea technologies: intrusive erosion and corrosion monitoring, acoustic telemetry and wet-mateable connector technology. Intrusive metal loss based monitoring systems on sub sea pipelines are increasingly being used because of their ability to directly measure erosion and corrosion. These systems are integrated with the sub sea production control system or located close to the platform and hard-wired. However, locations remote from a sub sea control system or platform requires a dedicated communication system and long lengths of cable that can be cost prohibitive to procure and install. The system presented consists of an intrusive erosion or corrosion monitor with pressure and temperature transmitters, a retrievable electronics module with an acoustic modem, a data storage module, and a replaceable power module. Time-stamped erosion and corrosion data can be transmitted via an acoustic link to a surface platform, a vessel of opportunity or to a relaying modem. Acoustic signals can be transmitted up to 6 km from the monitoring location. The power module along with data module and acoustic modem are mounted on the erosion and corrosion module using wet-mateable connectors, allowing retrieval by remotely operated vehicles. The collected data can be used to assess the cumulative erosion and corrosion as well as use the real-time metal loss rate data to correlate with operational parameters. Benefits include optimization of corrosion inhibitor dosage rates, mitigation of damage caused by solids production, and increased flow assurance. (author)

  6. Erosion mechanism and erosion products in carbon-based materials

    Energy Technology Data Exchange (ETDEWEB)

    Arkhipov, N.; Bakhtin, V.; Barsuk, V.; Kurkin, S.; Mironova, E.; Piazza, G.; Safronov, V. E-mail: vsafr@rico.ttk.ru; Scaffidi-Argentina, F.; Toporkov, D.; Vasenin, S.; Wuerz, H.; Zhitlukhin, A

    2002-12-01

    Plasma/material interaction was studied in disruption simulation experiments at the plasma gun facility MK-200. Graphite and carbon-fibre composites were exposed to pulsed energetic plasma under heat loads typically expected for disruptions in future tokamaks. Erosion rates, erosion mechanisms and the properties of the eroded carbon have been studied.

  7. Do erosion control and snakes mesh?

    Science.gov (United States)

    Christopher Barton; Karen Kinkead

    2005-01-01

    In the battle to curb soil erosion and sedimentation, numberous techniques and products for controlling erosion and sedimentation have been developed and are being implemented. Rolled erosion control products, such as a temporary erosion control blankets and permanent turf reinforcement mats, represent one type of erosion control product that has been used extensively...

  8. Rill erosion rates in burned forests

    Science.gov (United States)

    Joseph W. Wagenbrenner; Peter R. Robichaud

    2011-01-01

    Introduction Wildfires often produce large increases in runoff and erosion rates (e.g., Moody and Martin, 2009), and land managers need to predict the frequency and magnitude of postfire erosion to determine the needs for hazard response and possible erosion mitigation to reduce the impacts of increased erosion on public safety and valued resources. The Water Erosion...

  9. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  10. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  11. The Development of Agent Information for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro

    2017-10-01

    Full Text Available As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

  12. Decadal changes in bathymetry of the Yangtze River Estuary: Human impacts and potential saltwater intrusion

    Science.gov (United States)

    Wu, Shuaihu; Cheng, Heqin; Xu, Y. Jun; Li, Jiufa; Zheng, Shuwei

    2016-12-01

    This study analyzed bathymetric changes of the 77-km Yangtze River Estuary in China over the past ten years in order to understand the impacts of recent human activities on the estuary of a large alluvial river. Morphological changes were assessed by analyzing digitized bathymetric data of the estuarine channels from 2002 to 2013. Additionally, multi-beam bathymetric measurements made in 2012, 2014 and 2015 were utilized to investigate microtophographic bedforms of the lower reach of the estuary. Our results showed that the middle and upper reaches of the Yangtze River Estuary experienced substantial channel bed erosion in the past 10 years, and that the recent human activities have contributed to the change. These included the construction of a 70 km2 reservoir along the Yangtze River Estuary, the Qingcaosha Reservoir, for drinking water supply for the City of Shanghai, which has caused progressive bed erosion in the North Channel. The net volume of channel erosion in the Hengsha Passage from 2002 to 2013 was 0.86 × 108 m3. A large amount of the eroded sediment was trapped downstream, causing overall accretion in the upper reach of the North Passage. The middle and upper reaches of the South Passage also experienced intense erosion (0.45 × 108 m3) in the past ten years, while high accretion occurred in the lower reach because of the Deepening Waterway Project. The channel dredging left a large range of dredging marks and hollows in the North Passage. The increasing saltwater intrusion found in the Yangtze River Estuary may have been a consequence of either dredging or erosion, or both combined.

  13. Rainfall erosivity: An historical review

    Science.gov (United States)

    Rainfall erosivity is the capability of rainfall to cause soil loss from hillslopes by water. Modern definitions of rainfall erosivity began with the development of the Universal Soil Loss Equation (USLE), where rainfall characteristics were statistically related to soil loss from thousands of plot...

  14. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  15. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  16. A simplified approach to true molar intrusion

    Directory of Open Access Journals (Sweden)

    Flieger Stefanie

    2012-11-01

    Full Text Available Abstract Background Orthodontic management of anterior open bites is a demanding task for orthodontists. Molar intrusion as a primary means of open bite correction entails the need for appropriate anchorage. Orthodontic mini implants can provide the required mechanical support. The suggested procedure aims to reduce the risk of complications such as root damage or soft tissue irritations while minimizing overall complexity. Methods Three female patients aged 14, 18 and 19 years who decided against a surgical correction were treated with a device consisting of mini implants in the palatal slope, a palatal bar and intrusion cantilevers. Results In all three patients, an open bite reduction of more than a millimeter occurred within four months. An anterior overbite of 2 mm or more could be established within 6 to 9 months. Conclusions The method presented in this article enables the practitioner to use mini implants in an easily accessible insertion site. A lab-side procedure is optional but not required.

  17. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  18. Intrusion Learning: An Overview of an Emergent Discipline

    Directory of Open Access Journals (Sweden)

    Tony Bailetti

    2016-02-01

    Full Text Available The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.

  19. Rainfall Erosivity in Europe

    DEFF Research Database (Denmark)

    Panagos, Panos; Ballabio, Cristiano; Borrelli, Pasquale

    2015-01-01

    on the best available datasets. Data have been collected from 1541 precipitation stations in all European Union (EU) Member States and Switzerland, with temporal resolutions of 5 to 60 min. The R-factor values calculated from precipitation data of different temporal resolutions were normalised to R......-factor values with temporal resolutions of 30 min using linear regression functions. Precipitation time series ranged from a minimum of 5 years to a maximum of 40 years. The average time series per precipitation station is around 17.1 years, the most datasets including the first decade of the 21st century....... Gaussian Process Regression (GPR) has been used to interpolate the R-factor station values to a European rainfall erosivity map at 1 km resolution. The covariates used for the R-factor interpolation were climatic data (total precipitation, seasonal precipitation, precipitation of driest/wettest months...

  20. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  1. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  2. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  3. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  4. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  5. Noble gas systematics of the Skaergaard intrusion

    Science.gov (United States)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Raatmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  6. Erosion and Accretion on a Mudflat: The Importance of Very Shallow-Water Effects

    NARCIS (Netherlands)

    Shi, B.; Cooper, J.R.; Pratolongo; Gao, S.; Bouma, T.J.; Li, G.; Li, C.; Yang, S.L.; Wang, Y.

    2017-01-01

    Understanding erosion and accretion dynamics during an entire tidal cycle is important for assessing their impacts on the habitats of biological communities and the long-term morphological evolution of intertidal mudflats. However, previous studies often omitted erosion and accretion during very

  7. Multifactorial analysis of factors associated with the incidence and progression of erosive tooth wear

    NARCIS (Netherlands)

    El Aidi, H.; Bronkhorst, E.M.; Huysmans, M.C.D.N.J.M.; Truin, G.J.

    2011-01-01

    To prevent erosive tooth wear, early diagnosis and identification of causative factors are essential. The aim of the present 3-year longitudinal study was to investigate the association between a broad collection of biological and behavioural factors and the incidence and progression of erosive

  8. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  9. Using REE tracers to measure sheet erosion changing to rill erosion

    International Nuclear Information System (INIS)

    Liu Puling; Xue Yazhou; Song Wei; Wang Mingyi; Ju Tongjun

    2004-01-01

    Rare Earth Elements (REE) tracer method was used to study sheet erosion changing to rill erosion on slope land. By placing different rare earth elements of different soil depth across a slope in an indoor plot, two simulated rainfalls were applied to study the change of erosion type and the rill erosion process. The results indicate that the main erosion type is sheet erosion at the beginning of the rainfalls, and serious erosion happens after rill erosion appears. Accumulated sheet and rill erosion amounts increase with the rainfalls time. The percentage of sheet erosion amount decreases and rill erosion percentage increases with time. At the end of the rainfalls, the total rill erosion amounts are 4-5 times more than sheet erosion. In this paper, a new REE tracer method was used to quantitatively distinguish sheet and rill erosion amounts. The new REE tracer method should be useful to future studying of erosion processes on slope lands. (authors)

  10. Comparison of methods for calculating water erosion

    OpenAIRE

    SVOBODOVÁ, Pavlína

    2011-01-01

    Bachelor thesis presents a comparison of methods for calculating water erosion. The aim is to summarize available evidence concerning the problems of water erosion. There are presented some methods how to calculate average annual erosion of soils, and selected models for calculating the erosion immediately. There are also listed possible erosion control measures through which we can at least slow the effects of erosion, rather than stop completely.

  11. Erosion and deposition in tokamaks

    International Nuclear Information System (INIS)

    Staudenmaier, G.

    1985-01-01

    The flow of metal impurities from the wall and limiter to the plasma, and back towards the wall, is investigated using surface collection probes and subsequent surface analysis in order to understand impuritiy generation and impurity transport. Impurity fluxes and their scrapeoff lengths have been investigated for several years in a large number of tokamaks. The results are summarized and discussed. Erosion exceeding deposition was first observed to occur at limiterlike structures closest to the plasma edge. Recently, a new probe has been developed to measure quantitatively the erosion in ASDEX. Subsequent quantitative surface analysis is performed in situ by electron induced x-ray analysis. Erosion caused either by ions (limiter) or charge exchange neutrals (wall) can be investigated separately. The erosion at the wall is about two orders of magnitude smaller than the erosion at limiterlike structures, which is of the order of one monolayer per discharge. Simultaneous measurements of deposition and erosion have been performed to elucidate net values of deposition and erosion

  12. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  13. Gastric Mucosal Erosions - Radiologic evaluation -

    International Nuclear Information System (INIS)

    Kim, Seung Hyup

    1985-01-01

    70 cases of gastric mucosal erosions were diagnosed by double contrast upper gastrointestinal examinations and endoscopic findings. Analyzing the radiologic findings of these 70 cases of gastric mucosal erosions, the following results were obtained. 1. Among the total 70 cases, 65 cases were typical varioliform erosions showing central depressions and surrounding mucosal elevations. Remaining 5 cases were erosions of acute phase having multiple irregular depressions without surrounding elevations. 2. The gastric antrum was involved alone or in part in all cases. Duodenal bulb was involved with gastric antrum in 4 cases. 3. The majority of the cases had multiple erosions. There were only 2 cases of single erosion. 4. In 65 cases of varioliform erosions; 1) The diameter of the surrounding elevations varied from 3 to 20 mm with the majority (47 cases) between 6 and 10 mm. 2) In general, the surrounding elevations with sharp margin on double contrast films were also clearly demonstrated on compression films but those with faint margin were not. 3) The size of the central barium collections varied from pinpoint to 10 mm with the majority under 5 mm. The shape of the central barium collections in majority of the cases were round with a few cases of linear, triangular or star-shape. 5. In 5 cases of acute phase erosions; 1) All the 5 cases were females. 2) On double contrast radiography, all the cases showed multiple irregular depressed lesions without surrounding elevations. 3) 1 case had the history of hematemesis. 4) In 1 case, there was marked radiological improvement on follow-up study of 2 months interval. 6. In 23 cases, there were coexistent diseases with gastric mucosal erosions. These were 13 cases of duodenal bulb ulcers,7 cases of benign gastric ulcers and 3 others

  14. Project test plan for runoff and erosion on fine-soil barrier surfaces and rock-covered side slopes

    Energy Technology Data Exchange (ETDEWEB)

    Walters, W.H.; Hoover, K.A.; Cadwell, L.L.

    1990-06-01

    Pacific Northwest Laboratory (PNL) and Westinghouse Hanford Company are working together to develop protective barriers to isolate near-surface radioactive waste. The purpose of the barriers is to protect defense wastes at the US Department of Energy's (DOE) Hanford Site from infiltration of precipitation, biointrusion, and surficial erosion for up to 10,000 years without the need for long-term monitoring, maintenance, or institutional control. The barriers will be constructed of layered earth and rock material designed to direct surface and groundwater pathways away from the buried waste. To address soil erosion as it applies to barrier design and long-term stability, a task designed to study this problem has been included in the Protective Barriers Program at PNL. The barrier soil-erosion task will investigate the ability of the soil cover and side slopes to resist the erosional and destabilizing processes from externally applied water. The study will include identification and field testing of the dominant processes contributing to erosion and barrier failure. The effects of rock mulches, vegetation cover on the top fine-grained soil surface, as well as the stability of rock armoring on the side slopes, will be evaluated. Some of the testing will include the effects of animal intrusion on barrier erosion, and these will be coordinated with other animal intrusion studies. 6 refs., 4 figs., 1 tab.

  15. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  16. Erosive tooth wear in children

    NARCIS (Netherlands)

    Carvalho, T.S.; Lussi, A.; Jaeggi, T.; Gambon, D.L.; Lussi, A.; Ganss, C.

    2014-01-01

    Erosive tooth wear in children is a common condition. Besides the anatomical differences between deciduous and permanent teeth, additional histological differences may influence their susceptibility to dissolution. Considering laboratory studies alone, it is not clear whether deciduous teeth are

  17. Compost for steep slope erosion.

    Science.gov (United States)

    2008-06-01

    This study was initiated to develop guidelines for maintenance erosion control measures for steep slopes. The study focused on evaluating and monitoring KY-31 fescue germination rates using two media treatments 1) 100 percent by weight compost and 2)...

  18. Erosion-resistant composite material

    Science.gov (United States)

    Finch, C.B.; Tennery, V.J.; Curlee, R.M.

    A highly erosion-resistant composite material is formed of chemical vapor-deposited titanium diboride on a sintered titanium diboride-nickel substrate. This material may be suitable for use in cutting tools, coal liquefaction systems, etc.

  19. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  20. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  1. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  2. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  3. Soil Erosion and Agricultural Sustainability

    Science.gov (United States)

    Montgomery, D. R.

    2009-04-01

    Data drawn from a global compilation of studies support the long articulated contention that erosion rates from conventionally plowed agricultural fields greatly exceed rates of soil production, erosion under native vegetation, and long-term geological erosion. Whereas data compiled from around the world show that soil erosion under conventional agriculture exceeds both rates of soil production and geological erosion rates by up to several orders of magnitude, similar global distributions of soil production and geological erosion rates suggest an approximate balance. Net soil erosion rates in conventionally plowed fields on the order of 1 mm/yr can erode typical hillslope soil profiles over centuries to millennia, time-scales comparable to the longevity of major civilizations. Well-documented episodes of soil loss associated with agricultural activities date back to the introduction of erosive agricultural methods in regions around the world, and stratigraphic records of accelerated anthropogenic soil erosion have been recovered from lake, fluvial, and colluvial stratigraphy, as well as truncation of soil stratigraphy (such as truncated A horizons). A broad convergence in the results from studies based on various approaches employed to study ancient soil loss and rates of downstream sedimentation implies that widespread soil loss has accompanied human agricultural intensification in examples drawn from around the world. While a broad range of factors, including climate variability and society-specific social and economic contexts — such as wars or colonial relationships — all naturally influence the longevity of human societies, the ongoing loss of topsoil inferred from studies of soil erosion rates in conventional agricultural systems has obvious long-term implications for agricultural sustainability. Consequently, modern agriculture — and therefore global society — faces a fundamental question over the upcoming centuries. Can an agricultural system

  4. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2015-09-01

    Training enhancement (not treatment)  Addressing intrusive thoughts (secondary prevention of PTSD ?? decrease distress)  Mindfulness based intervention...AWARD NUMBER: W81XWH-09-1-0535 TITLE: Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts PRINCIPAL INVESTIGATOR...SUBTITLE 5a. CONTRACT NUMBER W81XWH-09-1-0535 Enhancing BATTLEMIND: Preventing PTSD by Coping With Intrusive Thoughts 5b. GRANT NUMBER 08194004

  5. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  6. Wind erosion of soils burned by wildfire

    Science.gov (United States)

    N. S. Wagenbrenner; M. J. Germino; B. K. Lamb; R. B. Foltz; P. R. Robichaud

    2011-01-01

    Wind erosion and aeolian transport processes are largely unstudied in the post-wildfire environment, but recent studies have shown that wind erosion can play a major role in burned landscapes. A wind erosion monitoring system was installed immediately following a wildfire in southeastern Idaho, USA to measure wind erosion from the burned area (Figure 1). This paper...

  7. Assessment of human intrusion and future human actions – Example from the Swedish LILW repository

    International Nuclear Information System (INIS)

    Andersson, Eva; Hjerpe, T.; Smith, G.

    2016-01-01

    Recommendations for FHA assessments: • The assumption of only considering inadvertent intrusion and using todays practice and technology is a key tool to make the assessment understandable. • Even after siting has been done, the placement of the repository, should be discussed in FHA scenarios, e.g. placement away from resources, discussion of erosion, and land uplift. • FEPs a good tool, good for constructing relevant scenarios and also for communication of the FHA assessment. • A few stylized scenarios are enough, good to include a drilling scenario as it is often used by different organizations. • Precise probabilities are hard to defend, avoid if possible and instead use the low likelihood in communication of the FHA results. • Communication of FHA scenarios is a tool to build confidence in the robustness of repository systems

  8. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  9. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  10. Estimation of crystallization pressure of granite intrusions

    Science.gov (United States)

    Yang, Xue-Ming

    2017-08-01

    A numerical method is presented to estimate the crystallization pressure of granite intrusions based on two polynomial equations obtained by an analysis of the existing haplogranite ternary phase diagram and associated dataset. The results indicate that the pressure is correlated respectively with normative quartz (Qtz) content and with normative albite (Ab) plus orthoclase (Or) contents of granitic rocks as follows. where P is pressure in MPa, and R denotes correlation coefficient. It is noted that the procedure of normalizing the sum of CIPW norm (quartz, albite, orthoclase) contents to 100% is required before using Eqs. (1) and (2). The difference in pressure calculations between these two equations is ≤ 16 MPa for the range of normative quartz contents from 15 to 40 wt%. An example of how to use these equations to estimate the crystallization pressure of a granite intrusion is also provided to show the validity and convenience of this method. The uncertainty of such pressure estimation is not well known, although it must fall into the uncertainty range of the existing experimental work on pressure constraints. The simplicity of this empirical method is appreciable, although its applicability to natural granitoids needs further test. More experimental work is required to constrain the effects of components, such as CaO, FeO, MgO, F, Cl, CO2, on the granite phase equilibria. These equations, however, can be used for estimating crystallization pressures of water-saturated and quartz-oversaturated granitic systems.

  11. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  12. Molar Intrusion in Open-bite Adults Using Zygomatic Miniplates.

    Science.gov (United States)

    Marzouk, Eiman S; Abdallah, Essam Mohamed; El-Kenany, Walid A

    2015-01-01

    The aim of this study is to evaluate the skeletal, dental and soft tissue changes that arise after intrusion of the maxillary molars using zygomatic miniplates in adult skeletal anterior open bite patients. In addition to measuring the amount and rate of molar intrusion; with special emphasis on changes in the axial inclination of the intruded molars. The study group was composed of 13 anterior open bite patients (mean age 18 years, 8 months ± 2 years, 2 months) with posterior dentoalveolar excess. Mini-plates were placed in the zygomatic buttress bilaterally. The upper arch was segmentally leveled and a double Trans-Palatal Arch (TPA) was bonded. Closed NiTi coil spring was placed bilaterally between the book of the mini-plate just mesial and distal to the first molar buccal tube applying intrusive force of 450 gper side. Lateral and posteroanterior cephalograms were taken before intrusion (T1: post upper segmental leveling) and after intrusion (T2). Comparison between means before and after the intrusion was done using Wilcoxon Signed Ranks test (WSRT). Mandibular autorotation followed the molar intrusion, SNB and SN-Pog angles significantly increased while the ANB, MP-SN angle and N-S-Gn angle significantly decreased. The mean amount of accomplished molar intrusion was 3.1mm ± 0.74mm, with a rate of 0.36mm per month ± 0.08mm per month and a bite closure of 6.55mm ± 1.83mm. There was no significant buccal tip in the right and left molars upon intrusion. Conclusion: Miniplates zygomatic anchorage can be used effectively for skeletal open bite correction through posterior dento-alveolar intrusion. Intrusion of the posterior teeth with skeletal anchorage induced counterclockwise rotation of the mandible and, as a consequence, corrected the anteroposterior intermaxillary relationship with a dramatic improvement in the facial soft tissue convexity.

  13. Assessment of Spectroscopic, Real-time Ion Thruster Grid Erosion-rate Measurements

    Science.gov (United States)

    Domonkos, Matthew T.; Stevens, Richard E.

    2000-01-01

    The success of the ion thruster on the Deep Space One mission has opened the gate to the use of primary ion propulsion. Many of the projected planetary missions require throughput and specific impulse beyond those qualified to date. Spectroscopic, real-time ion thruster grid erosion-rate measurements are currently in development at the NASA Glenn Research Center. A preliminary investigation of the emission spectra from an NSTAR derivative thruster with titanium grid was conducted. Some titanium lines were observed in the discharge chamber; however, the signals were too weak to estimate the erosion of the screen grid. Nevertheless, this technique appears to be the only non-intrusive real-time means to evaluate screen grid erosion, and improvement of the collection optics is proposed. Direct examination of the erosion species using laser-induced fluorescence (LIF) was determined to be the best method for a real-time accelerator grid erosion diagnostic. An approach for a quantitative LIF diagnostic was presented.

  14. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  15. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  16. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  17. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    Science.gov (United States)

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  18. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  19. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  20. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  1. Statistical decision making for authentication and intrusion detection

    NARCIS (Netherlands)

    Dimitrakakis, C.; Mitrokotsa, A.

    2009-01-01

    User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose alternatives based on a

  2. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    A fairly good fitness between the observed and computed values was obtained by a manual trial-and-error method. ... controlling seawater intrusion in such coastal aquifer systems. 1. Introduction. Seawater intrusion constitutes a ..... reveals that FEFLOW is an effective and robust simulation tool for studying variable-density.

  3. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The

  4. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    through honeypots, machines explicitly designated solely to learn the methods used by black-hats to probe and hack a system so that a network...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration

  5. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  6. Indicadores de contaminación biológica asociados a la erosión hídrica en una cuenca de Pampa Ondulada Argentina Indicators of biological contamination associated with water erosion in basin belonging the rolling pampa, Argentina

    Directory of Open Access Journals (Sweden)

    Celio I. Chagas

    2006-07-01

    í a nivel de la cuenca bajo estudio.Agriculture activities use 70% of the world water resources, partly for animal production and particularly cattle feeding. There is an outstanding risk of biological contamination associated with this kind of production because animal feces and urine containing pathogens can be transported to surface waterways through runoff. The present investigation was carried out in the Tala basin belonging to the Rolling Pampa region in which intense runoff and erosion processes are widespread. In this basin there are extensive cattle feeding farms which are located close to the natural waterways, in bottomlands with hydrohalomorphic soils. There is also an increasing surface devoted to feedlots and intensive swine and poultry productions. The main use of the surface waters from the river and tributaries is direct cattle drinking. The aim of the present work was to analyze through biological indicators, the potential contamination of runoff water and sediments accumulated in lowlands devoted to cattle production and to determinate their human or animal origin. The waters showed concentration of biological indicators belonging to faecal streptococci and enterococci which can be related to animal but no to human contamination processes. A close relationship was observed between total coliforms and erosion borne sediment concentration in the studied area. Thus, the capacity of these sediments for carrying bacteria potentially harmful for animal health like Salmonella spp. was confirmed. The runoff, erosion and biological contamination processes proved to be related in the studied basin.

  7. Bentonite erosion - Laboratory studies

    International Nuclear Information System (INIS)

    Jansson, Mats

    2010-01-01

    Document available in extended abstract form only. Bentonite clay is proposed as buffer material in the KBS-3 concept of storing spent nuclear fuel. Since the clay is plastic it will protect the canisters containing the spent fuel from movements in the rock. Furthermore, the clay will expand when taking up water, become very compact and hence limit the transport of solutes to and from the canister to only diffusion. The chemical stability of the bentonite barrier is of vital importance. If much material would be lost the barrier will lose its functions. As a side effect, lots of colloids will be released which may facilitate radionuclide transport in case of a breach in the canister. There are scenarios where during an ice age fresh melt water may penetrate down to repository depths with relatively high flow rates and not mix with older waters of high salinity. Under such conditions bentonite colloids will be more stable and there is a possibility that the bentonite buffer would start to disperse and bentonite colloids be carried away by the passing water. This work is a part of a larger project called Bentonite Erosion, initiated and supported by SKB. In this work several minor experiments have been performed in order to investigate the influence of for instance di-valent cations, gravity, etc. on the dispersion behaviour of bentonite and/or montmorillonite. A bigger experiment where the real situation was simulated using an artificial fracture was conducted. Two Plexiglas slabs were placed on top of each other, separated by plastic spacers. Bentonite was placed in a container in contact with a fracture. The bentonite was water saturated before deionized water was pumped through the fracture. The evolution of the bentonite profile in the fracture was followed visually. The eluate was collected in five different slots at the outlet side and analyzed for colloid concentration employing Photon Correlation Spectroscopy (PCS) and a Single Particle Counter (SPC). Some

  8. Bentonite erosion. Laboratory studies

    Energy Technology Data Exchange (ETDEWEB)

    Jansson, Mats (Div. of Nuclear Chemistry, Royal Inst. of Technology, Stockholm (Sweden), School of Chemical Science and Engineering)

    2009-11-15

    This report covers the laboratory studies that have been performed at Nuclear Chemistry, KTH in the project 'Bentonite Erosion'. Many of the experiments in this report were performed to support the work of the modelling group and were often relatively simple. One of the experiment series was performed to see the impact of gravity and concentration of mono- and di-valent cations. A clay suspension was prepared in a test tube. A net was placed in contact with the suspension, the test tube was filled with solutions of different concentrations and the system was left overnight to settle. The tube was then turned upside down and the behaviour was visually observed. Either the clay suspension fell through the net or stayed on top. By using this method surprisingly sharp determinations of the Critical Coagulation (Flocculation) Concentration (CCC/CFC) could be made. The CCC/CFC of Ca2+ was for sodium montmorillonite determined to be between 1 and 2 mM. An artificial fracture was manufactured in order to simulate the real case scenario. The set-up was two Plexiglas slabs separated by 1 mm thick spacers with a bentonite container at one side of the fracture. Water was pumped with a very low flow rate perpendicular to bentonite container and the water exiting the fracture was sampled and analyzed for colloid content. The bentonite used was treated in different ways. In the first experiment a relatively montmorillonite rich clay was used while in the second bentonite where only the readily soluble minerals had been removed was used. Since Plexiglas was used it was possible to visually observe the bentonite dispersing into the fracture. After the compacted bentonite (1,000 kg/m3) had been water saturated the clay had expanded some 12 mm out into the fracture. As the experiment progressed the clay expanded more out into the fracture and seemed to fractionate in two different phases with less material in the outmost phase. A dark rim which was later analyzed to contain

  9. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  10. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  11. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  12. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  13. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  14. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  15. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  16. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  17. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  18. Association of CD8+ T-cells with bone erosion in patients with rheumatoid arthritis.

    Science.gov (United States)

    Joo, Young Bin; Park, Youngho; Kim, Kwangwoo; Bang, So-Young; Bae, Sang-Cheol; Lee, Hye-Soon

    2018-02-01

    Bone erosion is a major problem worsening quality of rheumatoid arthritis (RA) patients' lives. However, causal factors responsible for bone erosion in RA have remained unclear. We aimed to examine genetic variants conferring bone erosion in RA using a Korean genome-wide association study (GWAS) and to search for possible biological mechanisms underlying the development of bone erosion. We obtained genome-wide single nucleotide polymorphism (SNP) data for 711 Korean RA patients using Illumina HapMap 550v3/660W arrays. Associations between SNPs and bone erosion status based on the Steinbrocker staging system were examined using multivariate logistic regression. Cell-type-specific enrichment of the epigenomic chromatin annotation H3K4me3 at the bone erosion associated variants was further investigated using National Institute of Health Roadmap Epigenomics data. As we tested the associations between 439 289 SNPs and bone erosion in 385 patients with erosive RA and 326 with non-erosive RA, none of the tested SNPs reached the genome-wide significance threshold, although many loci showed modest genetic effect on bone erosion status with suggestive association (e.g., rs2741200 [P = 3.75 × 10 -6 ] in the SLA-TG locus and rs12422918 [P = 4.13 × 10 -6 ] in SRGAP1). However, the top-ranked SNPs and their linked proxies, which were mostly located in non-coding variants, were significantly co-localized with the highly tissue-specific regulatory marker H3K4me3 in CD8 + memory T-cells (P = 0.014). Although, there was no large-effect variants associated with bone erosion in our GWAS, we have shown that CD8 + memory T-cells may have relevance with bone erosion in patients with RA through the analysis of ChiP-seq data. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  19. Emplacement of sandstone intrusions during contractional tectonics

    Science.gov (United States)

    Palladino, Giuseppe; Grippa, Antonio; Bureau, Denis; Alsop, G. Ian; Hurst, Andrew

    2016-08-01

    Sandstone injections are created by the forceful emplacement of remobilized sand in response to increases in overpressure. However, the contribution provided by horizontal compressive stress to the build-up in overpressure, and the resulting emplacement of sand injection complexes, is still to be substantiated by robust field observations. An opportunity to address this issue occurs in Central California where a large volume of sandstone intrusions record regionally-persistent supra-lithostatic pore-pressure. Detailed fieldwork allows sandstone-filled thrusts to be recognized and, for the first time, permits us to demonstrate that some sandstone intrusions are linked to contractional deformation affecting the western border of the Great Valley Basin. Fluidized sand was extensively injected along thrust surfaces, and also fills local dilatant cavities linked to thrusting. The main aims of this paper are to provide detailed descriptions of the newly recognized syn-tectonic injections, and describe detailed cross-cutting relationships with earlier sandstone injection complexes in the study area. Finally, an evolutionary model consisting of three phases of sand injection is provided. In this model, sand injection is linked to contractional tectonic episodes affecting the western side of the Great Valley Basin during the Early-Middle Cenozoic. This study demonstrates that sand injections, driven by fluid overpressure, may inject along thrusts and folds and thereby overcome stresses associated with regional contractional deformation. It is shown that different generations of sand injection can develop in the same area under the control of different stress regimes, linked to the evolving mountain chain.

  20. Soil erosion in Slovene Istria

    Directory of Open Access Journals (Sweden)

    Matjaž Mikoš

    2009-12-01

    Full Text Available From the end of nineties of the 20th century, intense hydrologic and geomorphologic research is taking place in the Slovene Istria. As a part of this research also studies on soil erosion were undertaken in the period from 2005 to 2008. The field measurements were under taken onclosed 1m2 large erosion plots under three different land uses (on bare soils in an olive grove, on an overgrown meadow, in a forest, placed south of the Marezige village in the Rokava River basin.We show weekly measurements of surface erosion (interrill erosion for the period of 13 months (the end of March 2005 – the end of April 2006, as well as monthly and seasonal averages together with selected linear statistical correlations between soil erosion and weather parameters.From May 2005 to April 2006 the interrill erosion on bare soils in an olive grove with an inclination of 5.5° amounted to 9013 g/m2 (90 t/ha that corresponds to surface lowering rate of 8.5 mm/yr; on an overgrown meadow with an inclination of 9.4° it amounted to 168 g/m2 (1,68 t/ha that corresponds to surface lowering rate of 0.16 mm//yr; and in a forest with an inclination of 7.8° it amounted to 391 g/m2 (3,91 t/ha and in a forest with an inclination of 21.4° it amounted to 415 g/m2 (4,15 t/ha, respectively, that corresponds to surface lowering rate of 0.4 mm/yr.

  1. Rainfall erosivity in Central Chile

    Science.gov (United States)

    Bonilla, Carlos A.; Vidal, Karim L.

    2011-11-01

    SummaryOne of the most widely used indicators of potential water erosion risk is the rainfall-runoff erosivity factor ( R) of the Revised Universal Soil Loss Equation (RUSLE). R is traditionally determined by calculating a long-term average of the annual sum of the product of a storm's kinetic energy ( E) and its maximum 30-min intensity ( I30), known as the EI30. The original method used to calculate EI30 requires pluviograph records for at most 30-min time intervals. Such high resolution data is difficult to obtain in many parts of the world, and processing it is laborious and time-consuming. In Chile, even though there is a well-distributed rain gauge network, there is no systematic characterization of the territory in terms of rainfall erosivity. This study presents a rainfall erosivity map for most of the cultivated land in the country. R values were calculated by the prescribed method for 16 stations with continuous graphical record rain gauges in Central Chile. The stations were distributed along 800 km (north-south), and spanned a precipitation gradient of 140-2200 mm yr -1. More than 270 years of data were used, and 5400 storms were analyzed. Additionally, 241 spatially distributed R values were generated by using an empirical procedure based on annual rainfall. Point estimates generated by both methods were interpolated by using kriging to create a map of rainfall erosivity for Central Chile. The results show that the empirical procedure used in this study predicted the annual rainfall erosivity well (model efficiency = 0.88). Also, an increment in the rainfall erosivities was found as a result of the rainfall depths, a regional feature determined by elevation and increasing with latitude from north to south. R values in the study area range from 90 MJ mm ha -1 h -1 yr -1 in the north up to 7375 MJ mm ha -1 h -1 yr -1 in the southern area, at the foothills of the Andes Mountains. Although the map and the estimates could be improved in the future by

  2. DISPERSION OF GLYPHOSATE IN SOILS UNDERGOING EROSION

    Directory of Open Access Journals (Sweden)

    Gorana Todorovic Rampazzo

    2010-08-01

    Full Text Available Different physical, chemical and biological processes influence the behaviour of organic contaminants in soils. A better understanding of the organic pollutant behaviour in soils would improve the environmental protection. One possible way for better attenuation of the risk of pollution in agriculture can be achieved through ta better-specified pesticide management based on the adaptation of the pesticide type and application rates to the specific environmental characteristics of the area of application. Nowadays, one of the actually most applied herbicide world wide is glyphosate. Glyphosate is highly water soluble and traces have been found in surface and groundwater systems. For a better understanding of the natural influence of erosion processes on glyphosate behaviour and dispersion under heavy rain conditions after application in the field, two erosion simulation experiments were conducted on two different locations in Austria with completely different soil types in September 2008. The results of the experiments showed that under normal practical conditions (e.g. no rainfall is expected immediatly after application, the potential adsorption capacity of the Kirchberg soil (Stagnic Cambisol, with about 16.000 ppm Fe-oxides is confirmed compared to the low adsorption Chernosem soil (about 8.000 ppm pedogenic Fe-oxides.  Considering the enormous difference in the run-off amounts between the two sites Pixendorf and Kirchberg soils it can be concluded how important the soil structural conditions and vegetation type and cover are for the risks of erosion and, as a consequence, pollution of neighbouring waters. In the rainfall experiments under comparable simulation conditions, the amount of run-off was about 10 times higher at Kirchberg, owing to its better infiltration rate, than at the Pixendorf site. Moreover, the total loss of glyphosate (NT+CT through run-off at the Kirchberg site was more than double that at Pixendorf, which confirms the

  3. Tree species and functional traits but not species richness affect interrill erosion processes in young subtropical forests

    Science.gov (United States)

    Seitz, S.; Goebes, P.; Song, Z.; Bruelheide, H.; Härdtle, W.; Kühn, P.; Li, Y.; Scholten, T.

    2016-01-01

    Soil erosion is seriously threatening ecosystem functioning in many parts of the world. In this context, it is assumed that tree species richness and functional diversity of tree communities can play a critical role in improving ecosystem services such as erosion control. An experiment with 170 micro-scale run-off plots was conducted to investigate the influence of tree species and tree species richness as well as functional traits on interrill erosion in a young forest ecosystem. An interrill erosion rate of 47.5 Mg ha-1 a-1 was calculated. This study provided evidence that different tree species affect interrill erosion differently, while tree species richness did not affect interrill erosion in young forest stands. Thus, different tree morphologies have to be considered, when assessing soil erosion under forest. High crown cover and leaf area index reduced interrill erosion in initial forest ecosystems, whereas rising tree height increased it. Even if a leaf litter cover was not present, the remaining soil surface cover by stones and biological soil crusts was the most important driver for soil erosion control. Furthermore, soil organic matter had a decreasing influence on interrill erosion. Long-term monitoring of soil erosion under closing tree canopies is necessary, and a wide range of functional tree traits should be considered in future research.

  4. Soil erosion in mountainous areas: how far can we go?

    Science.gov (United States)

    Egli, Markus

    2017-04-01

    Erosion is the counter part of soil formation, is a natural process and cannot be completely impeded. With respect to soil protection, the term of tolerable soil erosion, having several definitions, has been created. Tolerable erosion is often equalled to soil formation or production. It is therefore crucial that we know the rates of soil formation when discussing sustainability of soil use and management. Natural rates of soil formation or production are determined by mineral weathering or transformation of parent material into soil, dust deposition and organic matter incorporation. In mountain areas where soil depth is a main limiting factor for soil productivity, the use and management of soils must consider how to preserve them from excessive depth loss and consequent degradation of their physical, chemical and biological properties. Even under natural conditions, landscape surfaces and soils are known to evolve in complex, non-linear ways over time. As a result, soil production and erosion change substantially with time. The fact that soil erosion and soil production processes are discontinuous over time is an aspect that is in most cases completely neglected. To conserve a given situation, tolerable values should take these dynamics into account. Measurements of long and short-term physical erosion rates, total denudation, weathering rates and soil production have recently become much more widely available through cosmogenic and fallout nuclide techniques. In addition to this, soil chronosequences deliver a precious insight into the temporal aspect of soil formation and production. Examples from mountainous and alpine areas demonstrate that soil production rates strongly vary as a function of time (with young soils and eroded surfaces having distinctly higher rates than old soils). Extensive erosion promotes rejuvenation of the surface and, therefore, accelerates chemical weathering and soil production - the resulting soil thickness will however be shallow

  5. Mushy magma processes in the Tuolumne intrusive complex, Sierra Nevada, California

    Science.gov (United States)

    Memeti, V.; Paterson, S. R.

    2012-12-01

    Debates continue on the nature of volcanic-plutonic connections and the mechanisms of derivation of large volcanic eruptions, which require large volumes of magma to be readily available within a short period of time. Our focus to understand these magma plumbing systems has been to study the nature of their mid-to upper crustal sections, such as the 1,000 km2, 95-85 Ma old Tuolumne intrusive complex in the Sierra Nevada, California, USA. The Tuolumne intrusive complex is a great example where the magma mush model nicely explains observations derived from several datasets. These data suggest that a magma mush body was present and may have been quite extensive especially at times when the Tuolumne intrusive complex was undergoing waxing periods of magmatism (increased magma input), which alternated with waning periods of magmatism (decreased magma addition) and thus a smaller mush body, essentially mimicking in style periodic flare-ups and lulls at the arc scale. During waxing stages, magma erosion and mixing were the dominant processes, whereas waning stages allowed mush domains to continue to undergo fractional crystallization creating additional compositional variations. Over time, the imprint left behind by previous waxing and waning stages was partly overprinted, but individual crystals successfully recorded the compositions of these earlier magmas. Waxing periods in the Tuolumne intrusive complex during which large magma mush bodies formed are supported by the following evidence: 1) Hybrid units and gradational contacts are commonly present between major Tuolumne units. 2) CA-TIMS U/Pb zircon geochronology data demonstrate that antecrystic zircon recycling took place unidirectional from the oldest, marginal unit toward the younger, interior parts of the intrusion, where increasing zircon age spread encompasses the entire age range of the Tuolumne. 3) The younger, interior units also show an increasing scatter and complexity in geochemical element and isotope

  6. Erosion and lateral surface processes

    Science.gov (United States)

    : Erosion can cause serious agricultural and environmental hazards. It can generate severe damage to the landscape, lead to significant loss of agricultural land and consequently to reduction in agricultural productivity, induce surface water pollution due to the transport of sediments and suspende...

  7. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  8. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  9. The Experience of Intrusions Scale: a preliminary examination.

    Science.gov (United States)

    Salters-Pedneault, Kristalyn; Vine, Vera; Mills, Mary Alice; Park, Crystal; Litz, Brett T

    2009-01-01

    Intrusive thoughts (i.e., unwelcome, distressing, involuntary thoughts) are prevalent in a variety of clinical conditions and are increasingly a focus of translational research. The goal of this study was to develop and preliminarily examine a brief self-report measure designed to assess clinically relevant aspects of the experience of intrusive thoughts related to a particular target. The Experience of Intrusions Scale (EIS) is a five-item measure that assesses the frequency, unpredictability, and unwantedness of intrusive thoughts, as well as the interference and distress caused by the intrusions, each on a five-point Likert-type scale. Five times over a four-] period, female undergraduates (N=160) completed the EIS in response to intrusive thoughts regarding a film clip depicting a sexual assault. On the first and last days, participants completed the EIS five minutes after watching the clip. In between film clip viewings, participants completed the EIS once per day. The EIS demonstrated good internal consistency, good to excellent test-retest reliability using both immediate post-stimulus and 24-hour time intervals, and convergent validity with two existing measures of intrusive phenomena: the White Bear Suppression Inventory (Wegner & Zanakos, 1994) and the Post-traumatic Stress Disorder Checklist-Civilian Version (Weathers, Litz, Herman, Huska, & Keane, 1993).

  10. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Elevated temperature erosive wear of metallic materials

    International Nuclear Information System (INIS)

    Roy, Manish

    2006-01-01

    Solid particle erosion of metals and alloys at elevated temperature is governed by the nature of the interaction between erosion and oxidation, which, in turn, is determined by the thickness, pliability, morphology, adhesion characteristics and toughness of the oxide scale. The main objective of this paper is to critically review the present state of understanding of the elevated temperature erosion behaviour of metals and alloys. First of all, the erosion testing at elevated temperature is reviewed. This is followed by discussion of the essential features of elevated temperature erosion with special emphasis on microscopic observation, giving details of the erosion-oxidation (E-O) interaction mechanisms. The E-O interaction has been elaborated in the subsequent section. The E-O interaction includes E-O maps, analysis of transition criteria from one erosion mechanism to another mechanism and quantification of enhanced oxidation kinetics during erosion. Finally, the relevant areas for future studies are indicated. (topical review)

  12. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  13. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  14. Uplift and subduction erosion in southwestern Mexico since the Oligocene: pluton geobarometry constraints

    Science.gov (United States)

    Morán-Zenteno, Dante J.; Corona-Chavez, Pedro; Tolson, Gustavo

    1996-06-01

    Details of the late Oligocene to Middle Miocene uplift and tectonic erosion episodes of the southwestern continental margin of Mexico can be inferred using Al tot geobarometry of igneous hornblendes, geochronology, and field relations. On the basis of such analyses carried out between Acapulco and Huatulco we find the following: (1) Calc-alkaline batholiths exposed along the coast from Acapulco to Huatulco, mostly in the 35-25 Ma age range, were emplaced at depths between 13 and 20 km. (2) The contact relationships between these plutons and their host rocks, and the exposure of volcanic counterparts, 70 km from the coastline, indicate a landward decrease in the amount of uplift. (3) A comparison of the time differences between intrusion and cooling ages of batholiths along the coast suggest that cooling rates were, in general, higher between Acapulco and Huatulco than those along the margin between Puerto Vallarta and Manzanillo, 700 km northwest of Acapulco. (4) The uplift of this coastal belt occurred during the late stages of magmatism and after its cessation, triggering intensive subaerial erosion of supracrustal rocks and the exposure of midcrustal rocks such as granitic batholiths and amphibolite facies metamorphic assemblages of the Xolapa Complex. These findings, in conjunction with the geometry of the present continental margin, as well as the offshore tectonic and stratigraphic features, support previous interpretations of very active late Oligocene to Middle Miocene subduction erosion after the onset of strike-slip tectonics related to the detachment and subsequent eastward displacement of the Chortis block. Subduction erosion involved both trench sediments and crystalline (continental framework) rocks. Different rates of continental framework erosion are assessed on the basis of the bathymetric fluctuations of the upper slope trench sediments and the age of the accretionary prism. Subsidence of the offshore continental basement suggests intense episodes

  15. Modeling erosion from forest roads with WEPP

    Science.gov (United States)

    J. McFero Grace

    2007-01-01

    Forest roads can be major sources of soil erosion from forest watersheds. Sediments from forest roads are a concern due to their potential delivery to stream systems resulting in degradation of water quality. The Water Erosion Prediction Project (WEPP) was used to predict erosion from forest road components under different management practices. WEPP estimates are...

  16. Soil Erosion. LC Science Tracer Bullet.

    Science.gov (United States)

    Buydos, John F., Comp.

    Soil erosion is the detachment and movement of topsoil or soil material from the upper part of the soil profile. It may occur in the form of rill, gully, sheet, or wind erosion. Agents of erosion may be water, wind, glacial ice, agricultural implements, machinery, and animals. Soil conservation measures require a thorough understanding of the…

  17. Natural and anthropogenic rates of soil erosion

    Science.gov (United States)

    Regions of land that are brought into crop production from native vegetation typically undergo a period of soil erosion instability, and long term erosion rates are greater than for natural lands as long as the land continues being used for crop production. Average rates of soil erosion under natur...

  18. Soil erosion in humid regions: a review

    Science.gov (United States)

    Daniel J. Holz; Karl W.J. Williard; Pamela J. Edwards; Jon E. Schoonover

    2015-01-01

    Soil erosion has significant implications for land productivity and surface water quality, as sediment is the leading water pollutant worldwide. Here, erosion processes are defined. The dominant factors influencing soil erosion in humid areas are reviewed, with an emphasis on the roles of precipitation, soil moisture, soil porosity, slope steepness and length,...

  19. Intrusion signature creation via clustering anomalies

    Science.gov (United States)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  20. A Review of Vapor Intrusion Models

    Science.gov (United States)

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulation, and can increase the difficulty of obtaining a solution, especially when explicitly considering coupled oxygen transport and consumption. The models of contaminant building entry pathway are often coupled to calculations of indoor air contaminant concentration, and both are influenced by building construction and operational features. The description of entry pathway involves consideration of building foundation characteristics, while calculation of indoor air contaminant levels requires characterization of building enclosed space and air exchange within this. This review summarizes existing VI models, and discusses the limits of current screening tools commonly used in this field. PMID:23360069

  1. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  2. The Arctic Coastal Erosion Problem

    Energy Technology Data Exchange (ETDEWEB)

    Frederick, Jennifer M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thomas, Matthew Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bull, Diana L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Craig A. [Integral Consulting Inc., San Francisco, CA (United States); Roberts, Jesse D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    Permafrost-dominated coastlines in the Arctic are rapidly disappearing. Arctic coastal erosion rates in the United States have doubled since the middle of the twentieth century and appear to be accelerating. Positive erosion trends have been observed for highly-variable geomorphic conditions across the entire Arctic, suggesting a major (human-timescale) shift in coastal landscape evolution. Unfortunately, irreversible coastal land loss in this region poses a threat to native, industrial, scientific, and military communities. The Arctic coastline is vast, spanning more than 100,000 km across eight nations, ten percent of which is overseen by the United States. Much of area is inaccessible by all-season roads. People and infrastructure, therefore, are commonly located near the coast. The impact of the Arctic coastal erosion problem is widespread. Homes are being lost. Residents are being dispersed and their villages relocated. Shoreline fuel storage and delivery systems are at greater risk. The U.S. Department of Energy (DOE) and Sandia National Laboratories (SNL) operate research facilities along some of the most rapidly eroding sections of coast in the world. The U.S. Department of Defense (DOD) is struggling to fortify coastal radar sites, operated to ensure national sovereignty in the air, against the erosion problem. Rapid alterations to the Arctic coastline are facilitated by oceanographic and geomorphic perturbations associated with climate change. Sea ice extent is declining, sea level is rising, sea water temperature is increasing, and permafrost state is changing. The polar orientation of the Arctic exacerbates the magnitude and rate of the environmental forcings that facilitate coastal land area loss. The fundamental mechanics of these processes are understood; their non-linear combination poses an extreme hazard. Tools to accurately predict Arctic coastal erosion do not exist. To obtain an accurate predictive model, a coupling of the influences of

  3. Simulating the influence of groundwater table fluctuation on vapor intrusion

    Science.gov (United States)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  4. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  5. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  6. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  7. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  8. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  9. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  10. Slick: An Intrusion Detection System for Virtualized Storage Devices

    NARCIS (Netherlands)

    Bacs, A.; Giuffrida, C.; Grill, B.; Bos, H.J.; Ossowski, Sascha

    2016-01-01

    Cloud computing is rapidly reshaping the server administration landscape. The widespread use of virtualization and the increasingly high server consolidation ratios, in particular, have introduced unprecedented security challenges for users, increasing the exposure to intrusions and opening up new

  11. Information Assurance Intrusion Detection Sensor Database Design: Lessons Learned

    National Research Council Canada - National Science Library

    Spink, Brian

    2001-01-01

    Current architectural trends in information assurance for the DOD focuses on the fusion and correlation of large volumes of data collected across several intrusion detection systems and boundary devices...

  12. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  13. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  14. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  15. Preventing erosion at pipeline crossings of watercourses

    International Nuclear Information System (INIS)

    Sawatsky, L.; Arnold, G.

    1997-01-01

    Watercourses are naturally vulnerable to erosion but the risk is particularly acute after sub-soil and armour materials have been disturbed by trenching and backfilling during construction. Various types of erosion (river scour, river bed, river channel bed and river bank ) and the progressive removal of pipeline cover resulting from erosion were discussed. Methods of estimating the risk of progressive erosion, river avulsions and beaver dam scour, and methods of mitigating erosion at pipeline crossings such as deep burial, proper siting, conventional armouring, and a combination of bank toe protection, and upper bank vegetation cover, were described

  16. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  17. Classification of Intrusion Detection Dataset using machine learning Approaches

    OpenAIRE

    Neethu B

    2012-01-01

    The paper describes about a method of intrusion detection that uses machine learning algorithms. Here we discuss about the combinational use of two machine learning algorithms called Principal Component Analysis and Naive Bayes classifier. The dimensionality of the dataset is reduced by using the principal component analysis and the classification of the dataset in to normal and attack classes is done by using Naïve Bayes Classifier. The experiments were conducted on the intrusion detection d...

  18. Splash erosion. A bibliometric Review

    Science.gov (United States)

    Fernández Raga, M. B.

    2012-04-01

    Ellison (1944) developed the splash board as a system for measuring splash erosion that was both cheap and reliable. Bollinne (1975), Morgan (1978, 1981). Mutchler (1967) described another different type of splash detectors according to whether they were passive or could register data. In the study mentioned above these authors included bottles, funnels, glasses, photography, markers. After that several devices has been made up like the splash sampler (Leguedois et al., 2005), soil tray (Van Dijk et al., 2002), splash funnel (Terry, 1989) and several rain cups (Fernandez-Raga et al., 2010; Molina and Llinares, 1996; Torri et al., 1987). Splash erosion research has materialized in the form of a number of papers published in international journals. The database of bibliographic references employed has been one of the most prestigious ones: theWeb of Science (ISI). The search was carried out on January 27th 2012. Among the 3x10^8 scholarly documents included in the Science Citation Index Expanded (SCI-EXPANDED) 1899 to present , the searching engine located 439 containing the word "splash erosion*", where the asterisk acts as a wildcard for any letter or group of letters. Of these, 383 were classified as articles, 87 as proceeding papers, 5 as editorial material, 2 as notes and 1 as correction. These documents have been published in 163 different journals, although four are particularly recurrent: Earth surface processes and Landforms, Catena, Soil Science Society of America Journal and Hydrological processes, with 41, 35, 35 and 26 published documents respectively. A geographic analysis of these articles has been carried out in an attempt to determine in what parts of the world research projects were making use of splash erosion. The results are that anglo-saxon countries, as USA, England and Australia dominate, particularly USA, with 130 articles. China and Japan are large communities of researches too, and some Central European countries as Belgium, France Germany

  19. Soil Erosion Threatens Food Production

    Directory of Open Access Journals (Sweden)

    Michael Burgess

    2013-08-01

    Full Text Available Since humans worldwide obtain more than 99.7% of their food (calories from the land and less than 0.3% from the oceans and aquatic ecosystems, preserving cropland and maintaining soil fertility should be of the highest importance to human welfare. Soil erosion is one of the most serious threats facing world food production. Each year about 10 million ha of cropland are lost due to soil erosion, thus reducing the cropland available for world food production. The loss of cropland is a serious problem because the World Health Organization and the Food and Agricultural Organization report that two-thirds of the world population is malnourished. Overall, soil is being lost from agricultural areas 10 to 40 times faster than the rate of soil formation imperiling humanity’s food security.

  20. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  1. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  2. On inhibition of dental erosion.

    Science.gov (United States)

    Rölla, Gunnar; Jonski, Grazyna; Saxegaard, Erik

    2013-11-01

    To examine the erosion-inhibiting effect of different concentrations of hydrofluoric acid. Thirty-six human molars were individually treated with 10 ml of 0.1 M citric acid for 30 min (Etch 1), acid was collected and stored until analysis. The teeth were randomly divided into six groups and then individually treated with 10 ml of one of six dilutions (from 0.1-1%) of hydrofluoric acid. The teeth were then again treated with citric acid (Etch 2). The individual acid samples from Etch 1 and 2 were analyzed for calcium by flame atomic absorption spectroscopy and difference in calcium loss was calculated. The highest erosion inhibiting effect was obtained in groups with the highest concentrations of hydrofluoric acid, where the pH was lowest, below pKa of 3.17, thus the hydrofluoric acids being mainly in an undissociated state. Diluted hydrofluoric acid is present in aqueous solution of SnF2 and TiF4 (which are known to inhibit dental erosion): SnF2 + 3H2O = Sn(OH)2 + 2HF + H2O and TiF4 + 5H2O = Ti(OH)4 + 4HF + H2O. It is also known that pure, diluted hydrofluoric acid can inhibit dental erosion. Teeth treated with hydrofluoric acid are covered by a layer of CaF2-like mineral. This mineral is acid resistant at pH acid resistant mineral, initiated by tooth enamel treatment with hydrofluoric acid. Hydrofluoric acid is different in having fluoride as a conjugated base, which provides this acid with unique properties.

  3. Sports drinks and dental erosion.

    Science.gov (United States)

    Noble, Warden H; Donovan, Terence E; Geissberger, Marc

    2011-04-01

    Sports drinks were originally developed to improve hydration and performance in athletes taking part in intense or endurance sporting events. These drinks contain relatively high amounts of carbohydrates (sugars), salt, and citric acid. These ingredients create the potential for dental ramifications and overall public health consequences such as obesity and diabetes. High intake of sports drinks during exercise, coupled with xerostomia from dehydration, may lead to the possibility of erosive damage to teeth.

  4. Erosive forms in rivers systems

    International Nuclear Information System (INIS)

    Una Alvarez, E. de; Vidal Romani, J. R.; Rodriguez Martinez-Conde, R.

    2009-01-01

    The purpose of this work is to analyze the geomorphological meaning of the concepts of stability/change and to study its influence on a fluvial erosion system. Different cases of fluvial potholes in Galicia (NW of the Iberian Peninsula) are considered. The work conclusions refer to the nature of the process and its morphological evolution in order to advance towards later contributions with respect of this type of systems. (Author) 14 refs.

  5. Erosion behavior of EEDS cermet coatings

    International Nuclear Information System (INIS)

    Jin Guo; Xu Binshi; Wang Haidou; Yin Liang; Li Qingfen; Wei Shicheng; Cui Xiufang

    2008-01-01

    This paper investigates the erosion performance of electro-thermal explosion directional spraying (EEDS) cermet WC/Co coatings using an air solid particle erosion rig. The influences of the different parameters such as impact angle, impingement velocity, environment temperature, particle diameter, on the erosion property of the coatings were studied. The eroded surfaces were examined by scanning electron microscopy (SEM) equipped with energy dispersive spectrometry (EDS) and the erosion mechanisms were discussed. The structure and bond characters of the coatings were also determined by transmission electron microscopy (TEM), X-ray diffraction (XRD) and SEM. The results indicate that the EEDS WC/Co coatings are characterized by fine grain structure, good metallurgical bond and brittle erosion character. The erosion rates of the coatings decrease with temperature increasing and increase with impact angle and impingement velocity increasing. At elevated temperature, the oxidation happens on the coatings surface, which affects the erosion behavior

  6. Soil cover and wind erosion

    Energy Technology Data Exchange (ETDEWEB)

    Fryrear, D.W.

    Wind erosion on agricultural lands can be reduced if the soil surface is protected with crop residues. In evaluating the influence of residues on wind erosion, previous research has expressed residues of various crops as an equivalent of flat, small grain. This becomes difficult as the density of the residue changes with weathering, or as crops other than the major cultivated crops are grown. Soil losses due to wind erosion were determined by covering various percentages of the soil surface with simulated flat residues (wood dowels 3.1 to 25.4 mm in diameter). Covering 20% of the soil surface reduced soil losses 57%, and a 50% cover reduced soil losses 95%. The expression SLR = 1.81 e/sup x/ where x = /sup -0.072% SC/ describes the relationship between soil loss ratio (SLR) and percent soil cover (% SC) with a correlation coefficient of -0.94 (soil cover limits 8 to 80%). The cover can be any nonerodible material such as large clods, gravel, cotton gin trash, or any diameter stick between 3.1 and 25.4 mm. Percent soil cover is easily measured in the field or can be estimated with a minimum of training and experience.

  7. MR imaging of erosions in interphalangeal joint osteoarthritis: is all osteoarthritis erosive?

    International Nuclear Information System (INIS)

    Grainger, A.J.; Farrant, J.M.; O'Connor, P.J.; Tan, A.L.; Emery, P.; Tanner, S.; McGonagle, D.

    2007-01-01

    Erosive osteoarthritis is usually considered as an inflammatory subset of osteoarthritis (OA). However, an inflammatory component is now recognised in all subsets of OA, so this subgroup of erosive or inflammatory OA is more difficult to conceptualise. The aim of this study was to compare routine CR and MRI to investigate erosion numbers and morphology to determine whether hand OA in general is a more erosive disease than previously recognised. Fifteen patients with clinical (OA) of the small joints of the hand underwent MRI of one of the affected proximal interphalangeal (PIP) or distal interphalangeal (DIP) joints. Conventional radiographs (CR) of the hand were also obtained. The MR images were reviewed by two observers for the presence of central and marginal erosions. The site and morphology of any erosions was recorded. CR images of the same hand joint were scored independently for central and marginal erosions by the same observers. There was 100% agreement between the observers for scoring erosions on CR. Agreement for the MRI scores was also excellent (kappa = 0.84). MRI detected 37 erosions, of which only 9 were seen on CR. The increase in sensitivity using MRI was much greater for marginal erosions (1 detected on CR, 19 on MRI) than for central erosions (8 on CR, 18 on MRI). Using MRI 80% of joints examined showed 1 or more erosions compared with 40% using CR. If only marginal erosions were considered 80% of joints were still considered erosive by MRI criteria, but only 1 showed evidence of erosion on CR. Morphologically central erosions appeared to represent areas of subchondral collapse and pressure atrophy. In contrast, marginal erosions resembled those seen in inflammatory arthritides. Erosions, and particularly marginal erosions typical of those seen in inflammatory arthritis, are a more common feature of small joint OA than conventional radiographs have previously indicated. (orig.)

  8. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  9. Water intrusions and particle signatures in the Black Sea: a Biogeochemical-Argo float investigation

    Science.gov (United States)

    Stanev, Emil Vassilev; Grayek, Sebastian; Claustre, Hervé; Schmechtig, Chaterine; Poteau, Antoine

    2017-09-01

    Continuous observations during 3 years with a vertical resolution of 1 dbar from two Bio-Argo floats in the Black Sea that were equipped with oxygen optodes, chlorophyll fluorometers, and backscattering sensors are analyzed. The particle backscattering coefficient, b bp provides a proxy for the concentration of suspended particles. The observations clearly identify thermal and b bp intrusions down to 700-800 m in the Bosporus inflow area. In this area, b bp is more than five times larger than elsewhere, which could indicate bacterial abundance and possible biological involvement in the precipitation of Mn-containing particles. The b bp anomalies become much shallower than the temperature anomalies with increasing distance to the east of the strait. Their maxima are located between the onset of the suboxic zone and the upper part of the anoxic layer. Unlike well-known intrusions that are caused by inflow, open ocean intrusions are shallower and often characterized by multiple layers of backscatter maxima with thicknesses of only 15-20 m. The ratio between backscattering coefficients measured at two wavelengths, which gives a proxy for particle size, shows that the relative amount of larger size particles in the anoxic layer increases with depth. The particle concentrations and their size distribution display different vertical variability, which indicates the complex transformation of biological matter. The lower concentration of particles and lower chlorophyll-a during the extremely warm 2016 reveals an overall positive correlation between the two properties. The trends in the particle backscattering coefficient in the suboxic zone during 2013-2016 could indirectly reveal a biogeochemical response to temperature changes.

  10. FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    OpenAIRE

    Borgohain, Rajdeep

    2012-01-01

    With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion dete...

  11. Comparison of erosion and erosion control works in Macedonia, Serbia and Bulgaria

    Directory of Open Access Journals (Sweden)

    Ivan Blinkov

    2013-12-01

    Natural conditions in the Balkan countries contribute to the appearance of various erosion forms and the intensity of the erosion processes. Over the history of these countries, people who settled this region used the available natural resources to fill their needs (tree cutting, incorrect plugging, overgrazing, which contributed to soil erosion. Organized erosion control works in the Balkans started in the beginning of the 20th century (1905 in Bulgaria. The highest intensity of erosion control works were carried out during the period 1945 – 1990. Various erosion control works were launched. Bulgaria had a large anti-erosion afforestation, almost 1 million ha. Bulgaria's ecological river restoration approach has been in use for almost 50 years. Serbia contributed significant erosion and torrent control works on hilly agricultural areas. Specific screen barrages and afforestation on extremely dry areas are characteristic in Macedonia. A common characteristic for all countries is a high decrease in erosion control works in the last 20 years.

  12. Mapping monthly rainfall erosivity in Europe

    DEFF Research Database (Denmark)

    Ballabio, C; Meusburger, K; Klik, A

    2017-01-01

    Rainfall erosivity as a dynamic factor of soil loss by water erosion is modelled intra-annually for the first time at European scale. The development of Rainfall Erosivity Database at European Scale (REDES) and its 2015 update with the extension to monthly component allowed to develop monthly and...... events. Consequently, spatio-temporal mapping of rainfall erosivity permits to identify the months and the areas with highest risk of soil loss where conservation measures should be applied in different seasons of the year....... and seasonal R-factor maps and assess rainfall erosivity both spatially and temporally. During winter months, significant rainfall erosivity is present only in part of the Mediterranean countries. A sudden increase of erosivity occurs in major part of European Union (except Mediterranean basin, western part...... to Eastern Europe. The maps also show a clear delineation of areas with different erosivity seasonal patterns, whose spatial outline was evidenced by cluster analysis. The monthly erosivity maps can be used to develop composite indicators that map both intra-annual variability and concentration of erosive...

  13. Validating and improving interrill erosion equations.

    Science.gov (United States)

    Zhang, Feng-Bao; Wang, Zhan-Li; Yang, Ming-Yi

    2014-01-01

    Existing interrill erosion equations based on mini-plot experiments have largely ignored the effects of slope length and plot size on interrill erosion rate. This paper describes a series of simulated rainfall experiments which were conducted according to a randomized factorial design for five slope lengths (0.4, 0.8, 1.2, 1.6, and 2 m) at a width of 0.4 m, five slope gradients (17%, 27%, 36%, 47%, and 58%), and five rainfall intensities (48, 62.4, 102, 149, and 170 mm h(-1)) to perform a systematic validation of existing interrill erosion equations based on mini-plots. The results indicated that the existing interrill erosion equations do not adequately describe the relationships between interrill erosion rate and its influencing factors with increasing slope length and rainfall intensity. Univariate analysis of variance showed that runoff rate, rainfall intensity, slope gradient, and slope length had significant effects on interrill erosion rate and that their interactions were significant at p = 0.01. An improved interrill erosion equation was constructed by analyzing the relationships of sediment concentration with rainfall intensity, slope length, and slope gradient. In the improved interrill erosion equation, the runoff rate and slope factor are the same as in the interrill erosion equation in the Water Erosion Prediction Project (WEPP), with the weight of rainfall intensity adjusted by an exponent of 0.22 and a slope length term added with an exponent of -0.25. Using experimental data from WEPP cropland soil field interrill erodibility experiments, it has been shown that the improved interrill erosion equation describes the relationship between interrill erosion rate and runoff rate, rainfall intensity, slope gradient, and slope length reasonably well and better than existing interrill erosion equations.

  14. Validating and Improving Interrill Erosion Equations

    Science.gov (United States)

    Zhang, Feng-Bao; Wang, Zhan-Li; Yang, Ming-Yi

    2014-01-01

    Existing interrill erosion equations based on mini-plot experiments have largely ignored the effects of slope length and plot size on interrill erosion rate. This paper describes a series of simulated rainfall experiments which were conducted according to a randomized factorial design for five slope lengths (0.4, 0.8, 1.2, 1.6, and 2 m) at a width of 0.4 m, five slope gradients (17%, 27%, 36%, 47%, and 58%), and five rainfall intensities (48, 62.4, 102, 149, and 170 mm h−1) to perform a systematic validation of existing interrill erosion equations based on mini-plots. The results indicated that the existing interrill erosion equations do not adequately describe the relationships between interrill erosion rate and its influencing factors with increasing slope length and rainfall intensity. Univariate analysis of variance showed that runoff rate, rainfall intensity, slope gradient, and slope length had significant effects on interrill erosion rate and that their interactions were significant at p = 0.01. An improved interrill erosion equation was constructed by analyzing the relationships of sediment concentration with rainfall intensity, slope length, and slope gradient. In the improved interrill erosion equation, the runoff rate and slope factor are the same as in the interrill erosion equation in the Water Erosion Prediction Project (WEPP), with the weight of rainfall intensity adjusted by an exponent of 0.22 and a slope length term added with an exponent of −0.25. Using experimental data from WEPP cropland soil field interrill erodibility experiments, it has been shown that the improved interrill erosion equation describes the relationship between interrill erosion rate and runoff rate, rainfall intensity, slope gradient, and slope length reasonably well and better than existing interrill erosion equations. PMID:24516624

  15. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  16. The success of headwater rehabilitation towards gully erosion control

    Science.gov (United States)

    Frankl, Amaury; Poesen, Jean; Nyssen, Jan

    2017-04-01

    The ill-management of headwaters has frequently shown to have adverse effects on both humans and the environment. Historical examples often refer to altered hydrological conditions and stream incision resulting from deforestation. Agricultural expansion and intensification - often accompanied with land reforms in the 20th century - also showed to severely impact the fluvial environment, with stream incision and gully erosion hazards increasingly affecting many headwater areas around the world. To counter this, many regions have adopted improved management schemes aiming at restoring the physical, biological and hydrological integrity of the soil- and landscape. In terms of hydrogeomorpology, the objective was to minimize dynamics to a lower level so that runoff, sediment and pollutant transfers do not cause danger to human life, environmental/natural resources deterioration or economic stress. Therefore, much attention was given to the rehabilitation and re-naturalization of headwater streams and gullies, which are the conduits of these transfers. This is done in both indirect and direct ways, i.e. reducing the delivery of runoff and sediment to the gullies and interventions in the incised channels. Although much has been published on gully erosion development and control, few studies assess the success of gully rehabilitation on the mid- to long term or confront results against the gully life-cycle. The latter refers to the rate law in fluvial geomorphology, whereby gully morphological changes (increases in length, area, volume) are initially rapid, followed by a much slower development towards a new equilibrium state. Here, we present a review of headwater rehabilitation measures and their success towards gully erosion control. By confronting this to the life-cycle of a gully, we also want to shed light on our understanding of when and where gully erosion control needs to be applied; making land management more efficient and effective. Keywords: land

  17. Erosion of Brassica incana Genetic Resources: Causes and Effects

    Science.gov (United States)

    Muscolo, A.; Settineri, G.; Mallamaci, C.; Papalia, T.; Sidari, M.

    2017-07-01

    Brassica incana Ten., possessing a number of useful agronomic traits, represents a precious genetic resource to be used in plant breeding programs to broaden the genetic base in most Brassica crop species. B. incana that grows on limestone cliffs is at risk of genetic erosion for environmental constraints and human activities. We studied the pedological conditions of a Calabrian site where the B. incana grows, and we correlated the soil properties to the physiological and biochemical aspects of B. incana to identify the causes and effects of the genetic erosion of this species. Our results evidenced that physical soil conditions did not affect B. incana growth and nutraceutical properties; conversely, biological soil properties modified its properties. We identified leaf pigments and secondary metabolites that can be used routinely as early warning indicators of plant threat, to evaluate in a short term the dynamic behavior of plants leading to species extinction.

  18. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Directory of Open Access Journals (Sweden)

    K. Iyer

    2018-01-01

    Full Text Available Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene–Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary

  19. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Science.gov (United States)

    Iyer, Karthik; Svensen, Henrik; Schmid, Daniel W.

    2018-01-01

    Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene-Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM)-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC) content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary column through time and

  20. Surface decontamination by cavitation erosion

    International Nuclear Information System (INIS)

    Verry, P.; Lecoffre, Y.

    1984-01-01

    The aim of the study is to show the interest of using erosion by cavitation to remove a thin layer of matter from an irradiated surface during nuclear power plant dismantling. Several cavitation devices are tested on different surfaces to erode: aluminum, stainless steel, plexiglas, paints... The process is efficient enough to measure mass loss on materials as hard as stainless steels for a pressure of only 60 bars. Qualification tests using a nozzle feed under a 300 to 600 bar pressure are envisaged

  1. DENTAL EROSION IN PRIMARY DENTITION- A REVIEW

    Directory of Open Access Journals (Sweden)

    Rafi Shaik

    2017-06-01

    Full Text Available BACKGROUND The pattern of oral diseases has been influenced by ever changing human lifestyle. Tooth wear especially dental erosion has drawn increasing attention as risk factor for tooth damage or loss in recent years. It is a common condition in primary dentition compared to permanent dentition due to thinner and less mineralised enamel. However, it is more worrying, when this condition is being found in an alarming proportion among children. The presence of dental erosion in children is likely to be associated with a number of general health and dietary factors, but it is also aggravated by the relatively more rapid progression of erosion in the deciduous teeth. An understanding of the aetiologies and risk factors for erosion is important for early recognition of dental erosion to prevent serious irreversible damage to the dentition. This paper discusses the erosion in children with regard to its epidemiology, prevalence, clinical features, measurement and prevention.

  2. Physics of soil erosion at the microscale

    Directory of Open Access Journals (Sweden)

    Philippe Pierre

    2017-01-01

    Full Text Available We focus here on the major and always topical issue of soil erosion by fluid flows, and more specifically on the determination of both a critical threshold for erosion occurrence and a kinetics that specifies the rate of eroded matter entrainment. A synthetic state-of-the-art is first proposed with a critical view on the most commonly used methods and erosion models. It is then discussed an alternative strategy, promoting the use of model materials that allow systematic parametric investigations with the purpose of first identifying more precisely the local mechanisms responsible for soil particle erosion and second ultimately quantifying both critical onsets and kinetics, possibly through existing or novel empirical erosion laws. Finally, we present and discuss several examples following this methodology, implemented either by means of experiments or numerical simulations, and coupling erosion tests in several particular hydrodynamical configurations with wisely selected mechanical tests.

  3. Varioliform erosions in the stomach and duodenum

    International Nuclear Information System (INIS)

    Lotz, W.; Schulz, D.; Munkel, G.

    1984-01-01

    One thousand five hundred and eighty-three patients who were x-rayed for dyspepsia showed varioliform erosions in 15.3%. Men had an incidence of 9.8%, almost twice as common as in women (5.5%). Mucosal polyps, usually of the hyperplastic type, occurred in 2.4%. 15% of patients with gastric ulcers and 16% of patients with duodenal ulcers had varioliform erosions. On the other hand, amongst patients with erosions, 11% had gastric ulcers and 8.3% duodenal ulcers. The definitions of erosion which have been given in the literature are partly contradictory, and are discussed. Varioliform erosions, also known as complete erosions, may be acute or chronic. They are the third most common cause of bleeding from the upper gastrointestinal tract. With modern radiological methods of examining the stomach, they are no longer a rare finding. (orig.) [de

  4. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  5. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  6. Seismic signature of active intrusions in mountain chains.

    Science.gov (United States)

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  7. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  8. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  9. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  10. Recovery of freshwater marsh vegetation after a saltwater intrusion event.

    Science.gov (United States)

    Flynn, K M; McKee, K L; Mendelssohn, I A

    1995-07-01

    Greenhouse mesocosms of freshwater marsh vegetation were exposed to a simulated saltwater intrusion event followed by a recovery period during which water levels and interstitial water salinity were adjusted over a range of conditions. Virtually all above-ground vegetation, including the three dominant species, Sagittaria lancifolia L., Leersia oryzoides (L.) Swartz, and Panicum hemitomon Schultes, was killed by the initial saltwater intrusion event. P. hemitomon did not recover, but S. lancifolia and L. oryzoides, as well as many of the other species initially present, exhibited some ability to recover depending on post-saltwater intrusion conditions. Increasingly harsh recovery conditions (for freshwater marsh vegetation), including more reduced soil conditions, higher interstitial salinities, and higher interstitial sulfide concentrations were associated with decreased live above-ground biomass and species richness. The effect of elevated salinity on vegetative recovery became more pronounced under flooded conditions. This experiment illustrates that the response of a freshwater marsh community to the long-term disturbance effect of a transient saltwater intrusion event will be strongly influenced by post-intrusion salinity and water levels.

  11. Distress and Recurrence of Intrusive Thoughts in Younger and Older Adults

    Science.gov (United States)

    Magee, Joshua C.; Teachman, Bethany A.

    2011-01-01

    The current study incorporated a lifespan perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults, despite not differing in the actual recurrence of the intrusive thought. With regard to distress, ooHAcrosslder adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts. PMID:21707184

  12. Distress and recurrence of intrusive thoughts in younger and older adults.

    Science.gov (United States)

    Magee, Joshua C; Teachman, Bethany A

    2012-03-01

    The current study incorporated a life span perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and they also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults despite the fact that they did not differ in the actual recurrence of the intrusive thought. With regard to distress, older adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but they were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts.

  13. Reduction of surface erosion in fusion reactors

    International Nuclear Information System (INIS)

    Rossing, T.D.; Das, S.K.; Kaminsky, M.

    1976-01-01

    Some of the major processes leading to surface erosion in fusion reactors are reviewed briefly, including blistering by implanted gas, sputtering by ions, atoms, and neutrons, and vaporization by local heating. Surface erosion affects the structural integrity and limits the lifetime of reactor components exposed to plasma radiation. In addition, some of the processes leading to surface erosion also cause the release of plasma contaminants. Methods proposed to reduce surface erosion have included control of surface temperature, selection of materials with a favorable microstructure, chemical and mechanical treatment of surfaces, and employment of protective surface coatings, wall liners, and divertors. The advantages and disadvantages of some of these methods are discussed

  14. Erosive lichen planus: a therapeutic challenge.

    Science.gov (United States)

    Romero, Williams; Giesen, Laura; Navajas-Galimany, Lucas; Gonzalez, Sergio

    2016-01-01

    Erosive lichen planus is an uncommon variant of lichen planus. Chronic erosions of the soles, accompanied by intense and disabling pain, are some of its most characteristic manifestations. We present the case of a woman who developed oral and plantar erosive lichen planus associated with lichen planus pigmentosus and ungueal lichen planus that were diagnosed after several years. The patient failed to respond to multiple therapies requiring longstanding medication but remained refractory. Knowledge of the treatment options for erosive lichen planus is insufficient. Further research is required to clarify their effectiveness, ideally adopting an evidence-based methodology.

  15. Erosion products in disruption simulation experiments

    Energy Technology Data Exchange (ETDEWEB)

    Safronov, V.; Arkhipov, N.; Bakhtin, V.; Barsuk, V.; Kurkin, S.; Mironova, E.; Toporkov, D.; Vasenin, S.; Zhitlukhin, A. [Troitsk Inst. for Innovation and Fusion Research, Troisk, Moscow region (Russian Federation); Arkhipov, I. [Inst. of Physical Chemistry, Russian Academy of Science, Moscow (Russian Federation); Werle, H.; Wuerz, H. [Forschungszentrum Karlsruhe (Germany)

    1998-07-01

    Erosion of divertor materials under tokamak disruption event presents a serious problem of ITER technology. Erosion restricts the divertor lifetime and leads to production of redeposited layers of the material retaining large amount of tritium, which is a major safety issue for future fusion reactor. Since ITER disruptive heatloads are not achievable in existing tokamaks, material erosion is studied in special simulation experiments. Till now the simulation experiments have focused mainly on investigation of shielding effect and measurement of erosion rate. In the present work the properties of eroded and redeposited graphite are studied under condition typical for hard ITER disruption. (author)

  16. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  17. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  18. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been...... developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...

  19. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  20. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  2. Intrusive upwelling in the Central Great Barrier Reef

    Science.gov (United States)

    Benthuysen, Jessica A.; Tonin, Hemerson; Brinkman, Richard; Herzfeld, Michael; Steinberg, Craig

    2016-11-01

    In the Central Great Barrier Reef, the outer continental shelf has an open reef matrix that facilitates the exchange of waters with the Coral Sea. During austral summer, cool water intrudes onto the shelf along the seafloor. Temperature observations reveal cool, bottom intrusions during a 6 year period from the Queensland Integrated Marine Observing System's Palm Passage mooring. A metric is used to identify 64 intrusion events. These intrusions predominantly occur from October to March including the wet season. During an event, the outer-shelf's near-bottom temperature decreases by 1-3°C typically over 1 week. The near-bottom salinity tends to increase, while near-surface changes do not reflect these tendencies. Intrusion events occur predominantly with either weakening equatorward winds or poleward wind bursts. A regional hydrodynamic model for the Great Barrier Reef captures the timing and amplitude of these intrusions. During intrusion events, isotherms tend to uplift over the continental slope and onto the shelf and the East Australian Current intensifies poleward. Over the shelf, a bottom-intensified onshore current coincides with bottom cooling. For numerous events, the model diagnostics reveal that the cross-shelf flow is dominated by the geostrophic contribution. A vertical circulation tilts the isopycnals upward on the southern side of the passage, causing an along-shelf density gradient and geostrophic onshore flow with depth. While wind fluctuations play a major role in controlling the along-shelf currents, model results indicate that a concurrent topographically induced circulation can assist the onshore spread of cool water.

  3. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. Erosion rates of wood during natural weathering. Part II, Earlywood and latewood erosion rates

    Science.gov (United States)

    R. Sam Williams; Mark T. Knaebe; William C. Feist

    2001-01-01

    This is the second in a series of reports on the erosion rates of wood exposed outdoors near Madison, Wisconsin. In the work reported here, the erosion rates of earlywood and latewood were determined for smooth-planed vertical-grained lumber for an exposure period of 14 years. The specimens were oriented vertically, facing south; erosion was measured annually for the...

  5. Erosion rates of wood during natural weathering. Part III, Effect of exposure angle on erosion rate

    Science.gov (United States)

    R. Sam Williams; Mark T. Knaebe; James W. Evans; William C. Feist

    2001-01-01

    This is the third in a series of reports on the erosion rates of wood exposed outdoors near Madison, Wisconsin. The specimens were exposed at an orientation of 90* or 45* facing south or horizontally (0*) for 10 years. Erosion was measured annually for the first 8 years and after 10 years. The erosion rates of earlywood (springwood) and latewood (summerwood) were...

  6. Graffiti for science - erosion painting reveals spatially variable erosivity of sediment-laden flows

    Science.gov (United States)

    Beer, Alexander R.; Kirchner, James W.; Turowski, Jens M.

    2016-12-01

    Spatially distributed detection of bedrock erosion is a long-standing challenge. Here we show how the spatial distribution of surface erosion can be visualized and analysed by observing the erosion of paint from natural bedrock surfaces. If the paint is evenly applied, it creates a surface with relatively uniform erodibility, such that spatial variability in the erosion of the paint reflects variations in the erosivity of the flow and its entrained sediment. In a proof-of-concept study, this approach provided direct visual verification that sediment impacts were focused on upstream-facing surfaces in a natural bedrock gorge. Further, erosion painting demonstrated strong cross-stream variations in bedrock erosion, even in the relatively narrow (5 m wide) gorge that we studied. The left side of the gorge experienced high sediment throughput with abundant lateral erosion on the painted wall up to 80 cm above the bed, but the right side of the gorge only showed a narrow erosion band 15-40 cm above the bed, likely due to deposited sediment shielding the lower part of the wall. This erosion pattern therefore reveals spatial stream bed aggradation that occurs during flood events in this channel. The erosion painting method provides a simple technique for mapping sediment impact intensities and qualitatively observing spatially distributed erosion in bedrock stream reaches. It can potentially find wide application in both laboratory and field studies.

  7. Graffiti for science – erosion painting reveals spatially variable erosivity of sediment-laden flows

    Directory of Open Access Journals (Sweden)

    A. R. Beer

    2016-12-01

    Full Text Available Spatially distributed detection of bedrock erosion is a long-standing challenge. Here we show how the spatial distribution of surface erosion can be visualized and analysed by observing the erosion of paint from natural bedrock surfaces. If the paint is evenly applied, it creates a surface with relatively uniform erodibility, such that spatial variability in the erosion of the paint reflects variations in the erosivity of the flow and its entrained sediment. In a proof-of-concept study, this approach provided direct visual verification that sediment impacts were focused on upstream-facing surfaces in a natural bedrock gorge. Further, erosion painting demonstrated strong cross-stream variations in bedrock erosion, even in the relatively narrow (5 m wide gorge that we studied. The left side of the gorge experienced high sediment throughput with abundant lateral erosion on the painted wall up to 80 cm above the bed, but the right side of the gorge only showed a narrow erosion band 15–40 cm above the bed, likely due to deposited sediment shielding the lower part of the wall. This erosion pattern therefore reveals spatial stream bed aggradation that occurs during flood events in this channel. The erosion painting method provides a simple technique for mapping sediment impact intensities and qualitatively observing spatially distributed erosion in bedrock stream reaches. It can potentially find wide application in both laboratory and field studies.

  8. Farmers' identification of erosion indicators and related erosion damage in the Central Highlands of Kenya

    NARCIS (Netherlands)

    Sterk, G.; Okoba, B.O.

    2006-01-01

    Most soil and water conservation planning approaches rely on empirical assessment methods and hardly consider farmers' knowledge of soil erosion processes. Farmers' knowledge of on-site erosion indicators could be useful in assessing the site-specific erosion risk before planning any conservation

  9. Effects of Teriparatide on Joint Erosions in Rheumatoid Arthritis: A Randomized Controlled Trial.

    Science.gov (United States)

    Solomon, D H; Kay, J; Duryea, J; Lu, B; Bolster, M B; Yood, R A; Han, R; Ball, S; Coleman, C; Lo, E; Wohlfahrt, A; Sury, M; Yin, M; Yu, Z; Zak, A; Gravallese, E M

    2017-09-01

    Articular erosions correlate with disability in rheumatoid arthritis (RA). Biologic agents reduce erosion progression in RA, but erosion healing occurs infrequently. This study was undertaken to assess the effects of the anabolic agent teriparatide on joint erosion volume in RA patients treated with a tumor necrosis factor inhibitor (TNFi). We conducted a randomized controlled trial in 24 patients with erosive RA, osteopenia, and disease activity controlled by TNFi treatment for at least 3 months. Half were randomized to receive teriparatide for 1 year and the others constituted a wait-list control group. Subjects and primary rheumatologists were not blinded with regard to treatment assignment, but all outcomes were assessed in a blinded manner. The primary outcome measure was change in erosion volume determined by computed tomography at 6 anatomic sites. Significance within each hand and anatomic site was based on a 2-tailed test, with P values less than 0.05 considered significant. Baseline characteristics of the treatment groups were well balanced. After 52 weeks, the median change in erosion volume in the teriparatide group was -0.4 mm 3 (interquartile range [IQR] -34.5, 29.6) and did not differ significantly from that in controls (median change +9.1 mm 3 [IQR -29.6, 26.4]) (P = 0.28). No significant difference in change in erosion volume was noted at the radius, ulna, or metacarpophalangeal joints. Bone mineral density improved at the femoral neck and lumbar spine in the teriparatide group. Our findings indicate that teriparatide treatment for 1 year does not significantly reduce erosion volume in the hands or wrists of patients with established RA with disease activity controlled by TNFi treatment. © 2017, American College of Rheumatology.

  10. Understanding soil erosion impacts in temperate agroecosystems: bridging the gap between geomorphology and soil ecology

    Science.gov (United States)

    Baxter, C.; Rowan, J. S.; McKenzie, B. M.; Neilson, R.

    2013-04-01

    Soil is a key asset of natural capital, providing a myriad of goods and ecosystem services that sustain life through regulating, supporting and provisioning roles, delivered by chemical, physical and biological processes. One of the greatest threats to soil is accelerated erosion, which raises a natural process to unsustainable levels, and has downstream consequences (e.g. economic, environmental and social). Global intensification of agroecosystems is a major cause of soil erosion which, in light of predicted population growth and increased demand for food security, will continue or increase. Elevated erosion and transport is common in agroecosystems and presents a multi-disciplinary problem with direct physical impacts (e.g. soil loss), other less tangible impacts (e.g. loss of ecosystem productivity), and indirect downstream effects that necessitate an integrated approach to effectively address the problem. Climate is also likely to increase susceptibility of soil to erosion. Beyond physical response, the consequences of erosion on soil biota have hitherto been ignored, yet biota play a fundamental role in ecosystem service provision. To our knowledge few studies have addressed the gap between erosion and consequent impacts on soil biota. Transport and redistribution of soil biota by erosion is poorly understood, as is the concomitant impact on biodiversity and ability of soil to deliver the necessary range of ecosystem services to maintain function. To investigate impacts of erosion on soil biota a two-fold research approach is suggested. Physical processes involved in redistribution should be characterised and rates of transport and redistribution quantified. Similarly, cumulative and long-term impacts of biota erosion should be considered. Understanding these fundamental aspects will provide a basis upon which mitigation strategies can be considered.

  11. Quantifying the erosion effect on current carbon budget of European agricultural soils at high spatial resolution.

    Science.gov (United States)

    Lugato, Emanuele; Paustian, Keith; Panagos, Panos; Jones, Arwyn; Borrelli, Pasquale

    2016-05-01

    The idea of offsetting anthropogenic CO2 emissions by increasing global soil organic carbon (SOC), as recently proposed by French authorities ahead of COP21 in the 'four per mil' initiative, is notable. However, a high uncertainty still exits on land C balance components. In particular, the role of erosion in the global C cycle is not totally disentangled, leading to disagreement whether this process induces lands to be a source or sink of CO2. To investigate this issue, we coupled soil erosion into a biogeochemistry model, running at 1 km(2) resolution across the agricultural soils of the European Union (EU). Based on data-driven assumptions, the simulation took into account also soil deposition within grid cells and the potential C export to riverine systems, in a way to be conservative in a mass balance. We estimated that 143 of 187 Mha have C erosion rates 0.45 Mg C ha(-1) yr(-1). In comparison with a baseline without erosion, the model suggested an erosion-induced sink of atmospheric C consistent with previous empirical-based studies. Integrating all C fluxes for the EU agricultural soils, we estimated a net C loss or gain of -2.28 and +0.79 Tg yr(-1) of CO2 eq, respectively, depending on the value for the short-term enhancement of soil C mineralization due to soil disruption and displacement/transport with erosion. We concluded that erosion fluxes were in the same order of current carbon gains from improved management. Even if erosion could potentially induce a sink for atmospheric CO2, strong agricultural policies are needed to prevent or reduce soil erosion, in order to maintain soil health and productivity. © 2015 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  12. An Approach for Cross-Domain Intrusion Detection

    Science.gov (United States)

    2012-01-01

    supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view and manipulate network trace data...multilevel (trusted) components, supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view...component is implemented by the open source object-relational database system PostgreSQL 0). 4.4.3 Intrusion analysis engine The intrusion analysis

  13. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  14. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  15. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  16. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  17. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  18. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  19. Hydrogeological And Geotechnical Investigations Of Gully Erosion ...

    African Journals Online (AJOL)

    For many years, gully erosion and landslides are posing a serious threat to human existence, agricultural land, infrastructure and socio-economic activities in Calabar and its environs. Consequently, hydrogeological and geotechnical studies of gully erosion sites were carried out in order to provide information on the ...

  20. Backward erosion piping : Initiation and progression

    NARCIS (Netherlands)

    Van Beek, V.M.

    2015-01-01

    Backward erosion piping is an internal erosion mechanism during which shallow pipes are formed in the direction opposite to the flow underneath water-retaining structures as a result of the gradual removal of sandy material by the action of water. It is an important failure mechanism in both dikes

  1. Interrill soil erosion processes on steep slopes

    Science.gov (United States)

    To date interrill erosion processes and regimes are not fully understood. The objectives are to 1) identify the erosion regimes and limiting processes between detachment and transport on steep slopes, 2) characterize the interactive effects between rainfall intensity and flow depth on sediment trans...

  2. The erosive potential of candy sprays

    NARCIS (Netherlands)

    Gambon, D.L.; Brand, H.S.; Nieuw Amerongen, A.V.

    2009-01-01

    Objective To determine the erosive potential of seven different commercially available candy sprays in vitro and in vivo. Material and methods The erosive potential was determined in vitro by measuring the pH and neutralisable acidity. The salivary pH and flow rate were measured in healthy

  3. EVALUATION OF RAINFALL EROSIVIT OF RAINFALL EROSIVITY ...

    African Journals Online (AJOL)

    eobe

    The coefficient of Determination R ficient of Determination R2 was 0.5011. was 0.5011. During this per .... reducing its energy and preventing splash erosion. It also slows runoff, reduces sheet erosion, and anchors ... surface roughness, infiltration, interception, lower the density of the soil, and improve the structure of.

  4. Rethinking erosion on Java: a reaction

    NARCIS (Netherlands)

    Graaff, de J.; Wiersum, K.F.

    1992-01-01

    In a recent article (Diemont et al., 1991) about erosion on Java, it has been postulated that low inputs, not surface erosion, is the main cause of low productivity of upland food crops on this island. In this article it is argued that this hypothesis is too simple. An analysis of empirical field

  5. Reduction of soil erosion on forest roads

    Science.gov (United States)

    Edward R. Burroughs; John G. King

    1989-01-01

    Presents the expected reduction in surface erosion from selected treatments applied to forest road traveledways, cutslopes, fillslopes, and ditches. Estimated erosion reduction is expressed as functions of ground cover, slope gradient, and soil properties whenever possible. A procedure is provided to select rock riprap size for protection of the road ditch.

  6. Erosion-Resistant Water-Blast Nozzle

    Science.gov (United States)

    Roberts, Marion L.; Rice, R. M.; Cosby, S. A.

    1988-01-01

    Design of nozzle reduces erosion of orifice by turbulent high-pressure water flowing through it. Improved performance and resistance to erosion achieved by giving interior nozzle surface long, gradual convergence before exit orifice abrupt divergence after orifice and by machining surface to smooth finish.

  7. Wind erosion modelling in a Sahelian environment

    NARCIS (Netherlands)

    Faye-Visser, S.M.; Sterk, G.; Karssenberg, D.

    2005-01-01

    In the Sahel field observations of wind-blown mass transport often show considerable spatial variation related to the spatial variation of the wind erosion controlling parameters, e.g. soil crust and vegetation cover. A model, used to predict spatial variation in wind erosion and deposition is a

  8. Rainfall erosivity in Brazil: A Review

    Science.gov (United States)

    In this paper, we review the erosivity studies conducted in Brazil to verify the quality and representativeness of the results generated and to provide a greater understanding of the rainfall erosivity (R-factor) in Brazil. We searched the ISI Web of Science, Scopus, SciELO, and Google Scholar datab...

  9. Soil erosion dynamics response to landscape pattern

    NARCIS (Netherlands)

    Ouyang, W.; Skidmore, A.K.; Hao, F.; Wang, T.

    2010-01-01

    Simulating soil erosion variation with a temporal land use database reveals long-term fluctuations in landscape patterns, as well as priority needs for soil erosion conservation. The application of a multi-year land use database in support of a Soil Water Assessment Tool (SWAT) led to an accurate

  10. EPro Non-contact erosion profiling

    DEFF Research Database (Denmark)

    Meinert, Palle

    EPro is a profiler controlled by software, which is constructed to measure the same surface or work piece multiple times and track changes due to erosion.......EPro is a profiler controlled by software, which is constructed to measure the same surface or work piece multiple times and track changes due to erosion....

  11. Geoelectrical Surveys for Characterization of the Coastal Saltwater Intrusion in Metapontum Forest Reserve (Southern Italy

    Directory of Open Access Journals (Sweden)

    Antonio Satriani

    2012-01-01

    Full Text Available A geoelectrical survey was carried out in the Metapontum Forest Reserve located along the Ionian coast of the Basilicata region (Southern Italy. In this work we used the method of two-dimensional electrical resistivity tomography for obtaining high-resolution electrical images in the investigated site. In particular, three electrical resistivity tomography, all orthogonal to the coastline, in the investigated area were carried out. To complete and integrate the geophysical data, soil and groundwater samplings, seventeen and five, respectively, were analyzed using chemical physical techniques. Geoelectrical survey, supported by laboratory analysis of soil and water samples have revealed the presence of a process of saltwater in coastal Forest Reserve of Metapontum, which have caused the decline of the existing pine forest with the consequent erosion and desertification problems. The results have disclosed the way to identify and discriminate large areas affected by intensive soil salinization and high resolution electrical images of the subsurface electrical resistivity plays a key role in delineating the saltwater intrusion front in coastal areas. Furthermore, our integrated study represents a contribution to the future programs for the protection, planning, and management of the terrestrial and marine resources in this coastal area.

  12. Soil erosion processes on sloping land using REE tracer

    International Nuclear Information System (INIS)

    Shen Zhenzhou; Liu Puling; Yang Mingyi; Lian Zhenlong; Ju Tongjun; Yao Wenyi; Li Mian

    2007-01-01

    Sheet erosion is the main performance in the slope soil erosion process at the primary stage of natural rainfall. For three times of rainfall during experiment, the ratios of sheet erosion to total erosion account for 71%, 48% and 49% respectively, which showed that the sloping erosion was still at the primary stage from sheet erosion to rill erosion. With the rainfall going, the rill erosion amount increase. It showed that soil erosion was changing from sheet erosion to rill erosion. The sources of sediment from different sections of the plot were analyzed, and the results indicated that whatever the sheet erosion changed, the ratio erosion of upper part of surface soil was always lower than 10%. Sheet erosion came mainly from the lower section of surface soil. With the ratios to the amount of total rill erosion changes, the rill erosion amount of each section regularly changes too. The general conclusion is that when the rainfall ends, relative erosion of different slope element to the foot of slope is: 1 meter away accounts for 16%, 2-4 meters away is 6% and 5-9 meters away is 3%. The ratio of rill erosion amount of these three slope element is 5:2:1, which shows the rill erosion amount are mainly from the slope element of 4 meters from the foot of slope. (authors)

  13. Erosion testing of hard materials and coatings

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Jeffrey A.

    2005-04-29

    Erosion is the process by which unconstrained particles, usually hard, impact a surface, creating damage that leads to material removal and component failure. These particles are usually very small and entrained in fluid of some type, typically air. The damage that occurs as a result of erosion depends on the size of the particles, their physical characteristics, the velocity of the particle/fluid stream, and their angle of impact on the surface of interest. This talk will discuss the basics of jet erosion testing of hard materials, composites and coatings. The standard test methods will be discussed as well as alternative approaches to determining the erosion rate of materials. The damage that occurs will be characterized in genera1 terms, and examples will be presented for the erosion behavior of hard materials and coatings (both thick and thin).

  14. Erosion Pressure on the Danish Coasts

    DEFF Research Database (Denmark)

    Sørensen, Carlo Sass; Sørensen, Per; Kroon, Aart

    Coastlines around the world are receding due to coastal erosion.With rising sea levels and a potential climatic deterioration due to climate change, erosion rates are likely to increase at many locations in the future.Together with the current preference of people to settle near or directly...... by the ocean, coastal erosion issues become increasingly more important to the human values at risk. Along many Danish coastlines, hard structures already act as coastal protection in the form of groins, breakwaters, revetments etc. These eroding coasts however still lack sand and where the public, in general......, neglects the need for sand replenishment i.e. in the form of repeated sand nourishments. Here we present a conceptual model and method for dividing coastal erosion into acute and chronic erosion pressure, respectively. We focus on the model use for management and climate change adaptation purposes...

  15. Dietary assessment and counseling for dental erosion.

    Science.gov (United States)

    Marshall, Teresa A

    2018-02-01

    Dental erosion occurs after exposure to intrinsic or extrinsic acids. Exposure to intrinsic gastrointestinal acids is associated with anorexia nervosa, bulimia nervosa, rumination syndrome, or gastroesophageal reflux. Extrinsic dietary acids from foods or beverages also can cause erosion, particularly when exposure is prolonged by holding or swishing behaviors. Clinicians should screen patients exhibiting dental erosion for anorexia nervosa, bulimia nervosa, rumination syndrome, and gastroesophageal reflux disease. Clinicians should screen patients without a medical explanation for their erosion for exposure to acidic foods and beverages, particularly for habits that prolong exposure. Identification of intrinsic and extrinsic acid exposures and recommendations to minimize exposures are important to prevent erosion and maintain oral health. Copyright © 2018 American Dental Association. Published by Elsevier Inc. All rights reserved.

  16. Isoerosivity and erosion risk maps in studying water erosion in Sicily

    International Nuclear Information System (INIS)

    Ferro, V.; Giordano, G.; Iovino, M.; Palermo Univ.

    1991-01-01

    In this paper, the authors review simplified methods for evaluating the rainfall erosivity index and propose two relationships for estimating the annual value of Wischmeier's rainfall erosivity index at sites equipped with recording and non-recording rain-gauges. For the Sicilian region of Italy the FAO index is also found to represent the erosion risk. A regional relationship to estimate the standard deviation of the annual erosivity index is proposed. The isoerosivity map is plotted by using 41 values of the rainfall erosivity index, calculated by the Wischmeier procedure, and 128 values estimated according to a relationship proposed by the authors. Finally, for each of the 169 sites, an erosion risk is calculated and an erosion risk map plotted too

  17. Dynamic Analysis of Soil Erosion in Songhua River Watershed

    Science.gov (United States)

    Zhang, Yujuan; Li, Xiuhai; Wang, Qiang; Liu, Jiang; Liang, Xin; Li, Dan; Ni, Chundi; Liu, Yan

    2018-01-01

    In this paper, based on RS and GIS technology and Revised Universal Soil Loss Equation (RUSLE), the soil erosion dynamic changes during the two periods of 1990 and 2010 in Bin County was analyzed by using the Landsat TM data of the two periods, so as to reveal the soil erosion spatial distribution pattern and spatial and temporal dynamic evolution rule in the region. The results showed that: the overall patterns of soil erosion were basically the same in both periods, mainly featuring slight erosion and mild erosion, with the area proportions of 80.68% and 74.71% respectively. The slight and extremely intensive erosion changing rates showed a narrowing trend; mild, moderate and intensive erosion was increasing, with a trend of increased soil erosion; mild and intensive erosion were developing towards moderate erosion and moderate and extremely intensive erosion were progressing towards intensive erosion.

  18. Erosion resistance comparison of alternative surface treatments

    Science.gov (United States)

    Česánek, Z.; Schubert, J.; Houdková, Š.

    2017-05-01

    Erosion is a process characterized by the particle separation and the damage of component functional surfaces. Thermal spraying technology HP/HVOF (High Pressure / High Velocity Oxygen Fuel) is commonly used for protection of component surfaces against erosive wear. Alloy as well as cermet based coatings meet the requirements for high erosion resistance. Wear resistance is in many cases the determining property of required component functioning. The application suitability of coating materials is particularly influenced by different hardness. This paper therefore presents an erosion resistance comparison of alloy and cermet based coatings. The coatings were applied on steel substrates and were subjected to the erosive test using the device for evaluation of material erosion resistance working on the principle of centrifugal erodent flow. Abrasive sand Al2O3 with grain size 212-250 μm was selected as an erosive material. For this purpose, the specimens were prepared by thermal spraying technology HP/HVOF using commercially available powders Stellite 6, NiCrBSi, Cr3C2-25%NiCr, Cr3C2-25%CoNiCrAlY, Hastelloy C-276 and experimental coating TiMoCN-29% Ni. Erosion resistance of evaluated coatings was compared with erosive resistance of 1.4923 high alloyed steel without nitridation and in nitrided state and further with surface treatment using technology PVD. According to the evaluation, the resulting erosive resistance depends not only on the selected erodent and surface protection, but also on the erodent impact angle.

  19. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis

    2017-01-09

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  20. Geophysical study of saline water intrusion in Lagos municipality

    African Journals Online (AJOL)

    aghomotsegin

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  1. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  2. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    1. Introduction. Seawater intrusion constitutes a prominent hydro- logical problem in many coastal areas of the world. It is generally defined as the encroachment of saline water into fresh groundwater domains in coastal aquifer settings (Werner and Simmons 2008). This phenomenon will occur when the natural equilib-.

  3. Intrusive Thoughts: A Primary Variable in Breakup Distress

    Science.gov (United States)

    Field, Tiffany; Diego, Miguel; Pelaez, Martha; Deeds, Osvelia; Delgado, Jeannette

    2013-01-01

    University students who were high versus low on breakup distress scores were given self-report measures to assess their intrusive thoughts about the romantic breakup and their somatic symptoms that followed the breakup as well as their extracurricular activities and social support that might alleviate their breakup distress. In a regression…

  4. Depressed mood mediates the relationship between rumination and intrusions

    NARCIS (Netherlands)

    Smets, Jorien; Luyckx, Koen; Wessel, Ineke; Raes, Filip

    2012-01-01

    Research suggests that rumination is a causal factor for intrusive memories. These are disturbing autobiographical memories that pop into one's mind involuntarily, spontaneously, and repetitively. A three-wave longitudinal study was conducted to replicate this finding and to test whether one route

  5. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the

  6. Fast Content-Based Packet Handling for Intrusion Detection

    National Research Council Canada - National Science Library

    Fisk, Mike

    2001-01-01

    ... use of Royer-Moore currently used in the popular intrusion detection platform Snort. We then measure the actual performance of several search algorithms on actual packet traces and rulesets. Our results provide lessons on the structuring of content-based handlers.

  7. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  8. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... A multisensor-based IDS enables identification of the intrusion patterns semantically by correlating the events and context information provided by multiple sensors. ... R Bhargavi1 V Vaidehi1. Department of Information Technology, Madras Institute of Technology, Anna University, Chennai 600 044, India ...

  9. A bagging approach to network intrusion detection | Adetunmbi ...

    African Journals Online (AJOL)

    The presences of these flaws make a secured system a mirage for now, hence the need for intrusion detection system. In this paper, an ensemble approach – Bagging was used on five different machine learning techniques to improve accuracy of classifiers. Machine learning seeks for methods of extracting hidden pattern ...

  10. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    user

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and. February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  11. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  12. Attenuating fearful memories: effect of cued extinction on intrusions.

    Science.gov (United States)

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  13. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  14. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  15. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  16. Saltwater Intrusion Simulation in Heterogeneous Aquifer Using Lattice Boltzmann Method

    Science.gov (United States)

    Servan-Camas, B.; Tsai, F. T.

    2006-12-01

    This study develops a saltwater intrusion simulation model using a lattice Boltzmann method (LBM) in a two- dimensional coastal confined aquifer. The saltwater intrusion phenomenon is described by density-varied groundwater flow and mass transport equations, where a freshwater-saltwater mixing zone is considered. Although primarily developed using the mesoscopic approach to solve macroscopic fluid dynamic problems (e.g. Navier-Stoke equation), LBM is able to be adopted to solve physical-based diffusion-type governing equations as for the groundwater flow and mass transport equations. The challenge of using LBM in saltwater intrusion modeling is to recover hydraulic conductivity heterogeneity. In this study, the Darcy equation and the advection-dispersion equation (ADE) are recovered in the lattice Boltzmann modeling. Specifically, the hydraulic conductivity heterogeneity is represented by the speed of sound in LBM. Under the consideration on the steady-state groundwater flow due to low storativity, in each time step the flow problem is modified to be a Poisson equation and solved by LBM. Nevertheless, the groundwater flow is still a time-marching problem with spatial-temporal variation in salinity concentration as well as density. The Henry problem is used to compare the LBM results against the Henry analytic solution and SUTRA result. Also, we show that LBM is capable of handling the Dirichlet, Neumann, and Cauchy concentration boundary conditions at the sea side. Finally, we compare the saltwater intrusion results using LBM in the Henry problem when heterogeneous hydraulic conductivity is considered.

  17. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  18. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    The abandonment of shallow boreholes is presumed to have been caused by saltwater intrusion from the ocean. ... The evidence revealed by the 2D electrical resistivity tomography investigation combined with geochemistry of groundwater from literature suggested that abandonment of shallow boreholes are probably not ...

  19. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal aquifers is generally three dimensional. (3-D) in nature. In the literature, there is a general lack ...

  20. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  1. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  2. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  3. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, R.; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  4. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  5. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  6. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    1Department of Civil Engineering, Regional Engineering College, Durgapur. 713 209, India. 2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal ...

  7. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  8. Intrusion detection for the solution of security problems

    International Nuclear Information System (INIS)

    Buchmueller, R.

    1982-01-01

    Constantly growing security problems in public as well as private sectors can no longer be solved without the use of modern intrusion detection systems. BBC, as general contractor, offers the system solutions to fully meet these problems. These solutions include analysis of the site to be protected, installation, commissioning and maintenance of the security system. (orig.) [de

  9. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 120; Issue 2. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh ... Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing.

  10. Groundwater quality degradation due to salt water intrusion in ...

    African Journals Online (AJOL)

    Saltwater intrusion problems are widespread where there are over pumping of groundwater from coastal aquifers. Water samples were collected from production boreholes in Zanzibar municipality and analyzed for salinity indication parameters comprising of chloride, electrical conductivity, total dissolved salts and ...

  11. Brief exercise enhances intrusive memories of traumatic stimuli.

    Science.gov (United States)

    Keyan, Dharani; Bryant, Richard A

    2017-05-01

    Brief physical exercise enhances memories for neutral events, and recently has been shown to modulate fear learning in animals. To date there is no evidence pertaining to the impact of exercise on emotional memories in humans. Accordingly, this study investigated the role of brief exercise in the development of emotional intrusive memories. Forty-nine university students (18-29year olds) viewed a car accident film depicting accident and injury, and were then randomly assigned to engage in either 10min of intense exercise or easy walking. Two days following the experiment participants were assessed for both intrusive memories of the film and intentional recall of film details. Results indicated that participants in the exercise relative to the walking condition reported more intrusive memories, but not voluntarily recalled memories, of the car accident film two days later. These findings are consistent with recent evidence of exercise-induced emotional learning in animals, and point to the potential for physical activity to contribute to the development of intrusions in the context of encoding emotionally-laden information. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  13. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  14. Geophysical study of saline water intrusion in Lagos municipality ...

    African Journals Online (AJOL)

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  15. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from ...

  16. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Science.gov (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  17. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    (Chattopadhyay and Hashmi 1984; Maitra 1992;. Srivastava et al 2005; Srivastava ... Keywords. Melanite garnet; nepheline syenite minor intrusion; Mesozoic magmatism; Mawpyut complex; Meghalaya plateau. J. Earth Syst. Sci. 120, No. 6, December 2011, pp. ... dated 110–120 Ma (Coffin et al 2002; Srivastava et al 2005).

  18. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  19. Microstructure in hardened cement pastes measured by mercury intrusion porosimetry and low temperature microcalorimetry

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Baroghel, V.B.; Künzel, H.M.

    1996-01-01

    , image analysis, mercury intrusion porosimetry and low temperature microcalorimetry.The present paper is dealing with cumulated pore size distributions measured by mercury intrusion porosimetry (MIP) from two laboratories (LCPC, IBP) and low temperature microcalorimetry (CAL) from one laboratory (BKM...

  20. Why do close partners snoop? Predictors of intrusive behavior in newlywed couples

    NARCIS (Netherlands)

    Vinkers, C. D. W.; Finkenauer, C.; Hawk, S. T.

    2011-01-01

    Existing research shows that intrusive behavior has detrimental consequences for relationships. Surprisingly, little is known about why close relationship partners snoop. This study examined why romantic partners engage in intrusive behavior among newlywed couples in the Netherlands. As predicted,

  1. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  2. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    Science.gov (United States)

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  3. Mapping monthly rainfall erosivity in Europe.

    Science.gov (United States)

    Ballabio, Cristiano; Borrelli, Pasquale; Spinoni, Jonathan; Meusburger, Katrin; Michaelides, Silas; Beguería, Santiago; Klik, Andreas; Petan, Sašo; Janeček, Miloslav; Olsen, Preben; Aalto, Juha; Lakatos, Mónika; Rymszewicz, Anna; Dumitrescu, Alexandru; Tadić, Melita Perčec; Diodato, Nazzareno; Kostalova, Julia; Rousseva, Svetla; Banasik, Kazimierz; Alewell, Christine; Panagos, Panos

    2017-02-01

    Rainfall erosivity as a dynamic factor of soil loss by water erosion is modelled intra-annually for the first time at European scale. The development of Rainfall Erosivity Database at European Scale (REDES) and its 2015 update with the extension to monthly component allowed to develop monthly and seasonal R-factor maps and assess rainfall erosivity both spatially and temporally. During winter months, significant rainfall erosivity is present only in part of the Mediterranean countries. A sudden increase of erosivity occurs in major part of European Union (except Mediterranean basin, western part of Britain and Ireland) in May and the highest values are registered during summer months. Starting from September, R-factor has a decreasing trend. The mean rainfall erosivity in summer is almost 4 times higher (315MJmmha -1 h -1 ) compared to winter (87MJmmha -1 h -1 ). The Cubist model has been selected among various statistical models to perform the spatial interpolation due to its excellent performance, ability to model non-linearity and interpretability. The monthly prediction is an order more difficult than the annual one as it is limited by the number of covariates and, for consistency, the sum of all months has to be close to annual erosivity. The performance of the Cubist models proved to be generally high, resulting in R 2 values between 0.40 and 0.64 in cross-validation. The obtained months show an increasing trend of erosivity occurring from winter to summer starting from western to Eastern Europe. The maps also show a clear delineation of areas with different erosivity seasonal patterns, whose spatial outline was evidenced by cluster analysis. The monthly erosivity maps can be used to develop composite indicators that map both intra-annual variability and concentration of erosive events. Consequently, spatio-temporal mapping of rainfall erosivity permits to identify the months and the areas with highest risk of soil loss where conservation measures should be

  4. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  5. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  6. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  7. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  8. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    Science.gov (United States)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  9. A new physical barrier system for seawater intrusion control

    Science.gov (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  10. Detection of stratospheric ozone intrusions by windprofiler radars.

    Science.gov (United States)

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-08

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport.

  11. Coupled Wave Energy and Erosion Dynamics along a Salt Marsh Boundary, Hog Island Bay, Virginia, USA

    Directory of Open Access Journals (Sweden)

    Anthony M. Priestas

    2015-09-01

    Full Text Available The relationship between lateral erosion of salt marshes and wind waves is studied in Hog Island Bay, Virginia USA, with high-resolution field measurements and aerial photographs. Marsh retreat is compared to wave climate calculated in the bay using the spectral wave-model Simulating Waves Nearshore (SWAN. We confirm the existence of a linear relationship between long-term salt marsh erosion and wave energy, and show that wave power can serve as a good proxy for average salt-marsh erosion rates. At each site, erosion rates are consistent across several temporal scales, ranging from months to decades, and are strongly related to wave power. On the contrary, erosion rates vary in space and weakly depend on the spatial distribution of wave energy. We ascribe this variability to spatial variations in geotechnical, biological, and morphological marsh attributes. Our detailed field measurements indicate that at a small spatial scale (tens of meters, a positive feedback between salt marsh geometry and wave action causes erosion rates to increase with boundary sinuosity. However, at the scale of the entire marsh boundary (hundreds of meters, this relationship is reversed: those sites that are more rapidly eroding have a marsh boundary which is significantly smoother than the marsh boundary of sheltered and slowly eroding marshes.

  12. Historic evidence for a link between riparian vegetation and bank erosion in the context of instream habitat restoration

    Science.gov (United States)

    Salant, N.; Baillie, M. B.; Schmidt, J. C.; Intermountain CenterRiver Rehabilitation; Restoration

    2010-12-01

    An analysis of historic aerial photographs of the upper Strawberry River, Utah, demonstrates that rates of lateral bank erosion peaked with the loss of riparian cover during periods of willow removal for livestock grazing. Erosion rates have declined over the past two decades, concurrent with the removal of livestock grazing, modest increases in riparian cover, and the return of natural flows. Contrary to perception, present-day erosion rates are actually lower than pre-disturbance rates. Recent restoration activities to stabilize stream banks were based on the assumption that high erosion rates were contributing excess sediment to the streambed and degrading spawning gravels. However, our results show that while the historic loss of riparian vegetation contributed to an increase in bank erosion rates, bank erosion rates were not high prior to restoration. Furthermore, streambed samples show that the percentage of fine sediment in the substrate is insufficient to have a significant biological impact, supporting the finding that present-day bank erosion rates are not excessive relative to pre-disturbance rates. Current bank stabilization efforts were therefore motivated by a limited understanding of system conditions and history, suggesting that these restoration activities are unnecessary and misconceived. Our results demonstrate the large influence of riparian vegetation on bank erosion and instream habitat, as well as the importance of incorporating system history into restoration design.

  13. Tree species identity and functional traits but not species richness affect interrill erosion processes in young subtropical forests

    Science.gov (United States)

    Seitz, S.; Goebes, P.; Song, Z.; Bruelheide, H.; Härdtle, W.; Kühn, P.; Li, Y.; Scholten, T.

    2015-06-01

    Soil erosion is seriously threatening ecosystem functioning in many parts of the world. In this context, it is assumed that tree species richness and functional diversity of tree communities can play a critical role in improving ecosystem services such as erosion control. An experiment with 170 micro-scale runoff plots was conducted to investigate the influence of tree species richness and identity as well as tree functional traits on interrill erosion in a young forest ecosystem. An interrill erosion rate of 47.5 t ha-1 a-1 was calculated. This study provided evidence that different tree species affect interrill erosion, but higher tree species richness did not mitigate soil losses in young forest stands. Thus, different tree morphologies have to be considered, when assessing erosion under forest. High crown cover and leaf area index reduced soil losses in initial forest ecosystems, whereas rising tree height increased them. Even if a leaf litter cover was not present, remaining soil surface cover by stones and biological soil crusts was the most important driver for soil erosion control. Furthermore, soil organic matter had a decreasing influence on soil loss. Long-term monitoring of soil erosion under closing tree canopies is necessary and a wide range of functional tree traits should be taken into consideration in future research.

  14. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Individual protection standard for human intrusion. 63.321... Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE must determine the earliest time after disposal that the waste package would degrade sufficiently that a human...

  15. Erosion and stability of a mine soil

    International Nuclear Information System (INIS)

    Wu, T.H.; Stadler, A.T.; Low, C.

    1996-01-01

    Mine soils developed from mine spoils commonly have a wide range of particle size. The slopes of old spoil piles usually are marked by gullies due to years of uncontrolled erosion. These characteristics raise questions about applicability of available theories and models for estimating runoff and erosion. An investigation was made to determine whether available erosion models can work for mine soils and can account for gully erosion. The investigation at an abandoned surface mine consisted of measurement of soil and sediment properties, measurement of runoff and erosion, observations of armor by rock fragments on gully floor, and calculations with available theories of sediment transport and slope stability. The results at this site suggest that (1) predictions with the ANSWERS model have about the same accuracy as those made for agricultural lands; (2) armor provided by rock fragments are temporary as they are periodically removed by debris flows; (3) detachment by rainfall impact is the primary cause of erosion on short steep slopes; and (4) a simplified method can be used for estimating erosion on such slopes

  16. Soft drinks and in vitro dental erosion.

    Science.gov (United States)

    Gravelle, Brent L; Hagen Ii, Ted W; Mayhew, Susan L; Crumpton, Brooks; Sanders, Tyler; Horne, Victoria

    2015-01-01

    The purpose of this investigation was to determine to what extent the in vitro exposure of healthy teeth to various commonly consumed carbonated soft drinks may precipitate dental erosion. Forty-two healthy, extracted, previously unerupted human molars were weighed prior to, during, and after suspension in various sugared and diet or zero-calorie carbonated beverages for 20 days; the specimens were stored at room temperature while being stirred at 275 rpm. The percentage decrease in tooth weight from before to after exposure represented the weight loss due to enamel erosion; values in the experimental groups varied from 3.22% to 44.52% after 20 days' exposure. Data were subjected to analysis of variance and post hoc Scheffe testing at a level of α = 0.05. Nonsugared drinks (diet and zero-calorie) as a whole were more erosive than sugared beverages. A significant positive correlation was found between the amount of titratable acid and percentage of tooth erosion, while a significant negative correlation was revealed between the beverage pH and percentage of tooth erosion. No significant correlations were found between calcium or phosphate ion concentrations and the amount of erosion. It appears that enamel erosion is dependent on not only the beverage flow rate, pH, and amount of titratable acid, but also whether the soft drink is of the diet or zero-calorie variety, which reflects the type of artificial sweetener present.

  17. Lithosphere erosion atop mantle plumes

    Science.gov (United States)

    Agrusta, R.; Arcay, D.; Tommasi, A.

    2012-12-01

    Mantle plumes are traditionally proposed to play an important role in lithosphere erosion. Seismic images beneath Hawaii and Cape Verde show a lithosphere-asthenosphere-boundary (LAB) up to 50 km shallower than the surroundings. However, numerical models show that unless the plate is stationary the thermo-mechanical erosion of the lithosphere does not exceed 30 km. We use 2D petrological-thermo-mechanical numerical models based on a finite-difference method on a staggered grid and marker in cell method to study the role of partial melting on the plume-lithosphere interaction. A homogeneous peridotite composition with a Newtonian temperature- and pressure-dependent viscosity is used to simulate both the plate and the convective mantle. A constant velocity, ranging from 5 to 12.5 cm/yr, is imposed at the top of the plate. Plumes are created by imposing a thermal anomaly of 150 to 350 K on a 50 km wide domain at the base of the model (700 km depth); the plate right above the thermal anomaly is 40 Myr old. Partial melting is modeled using batch-melting solidus and liquidus in anhydrous conditions. We model the progressive depletion of peridotite and its effect on partial melting by assuming that the melting degree only strictly increases through time. Melt is accumulated until a porosity threshold is reached and the melt in excess is then extracted. The rheology of the partially molten peridotite is determined using viscous constitutive relationship based on a contiguity model, which enables to take into account the effects of grain-scale melt distribution. Above a threshold of 1%, melt is instantaneously extracted. The density varies as a function of partial melting degree and extraction. Besides, we analyze the kinematics of the plume as it impacts a moving plate, the dynamics of time-dependent small-scale convection (SSC) instabilities developing in the low-viscosity layer formed by spreading of hot plume material at the lithosphere base, and the resulting thermal

  18. Estimating surface soil erosion losses and mapping erosion risk for Yusufeli micro-catchment (Artvin

    Directory of Open Access Journals (Sweden)

    Mustafa Tüfekçioğlu

    2016-10-01

    Full Text Available Sheet erosion, one of the most important types of water erosion, takes place on the top soil as tiny soil layer movement that affects lake and stream ecosystem. This type of erosion is very important because the productive soil layer on the top soil can be lost in a very short period of time. The goal of this study was to quantify the amount of surface (sheet and rill soil erosion, and to identify areas under high erosion risk within the study area at Yusufeli province in Artvin by using RUSLE erosion methodology. As a result of the study it was found that the average annual potential soil loss by surface erosion was 3.6 ton ha-1yr-1. Additionally, the maps produced and conclusions reached by the study revealed that the areas of high erosion risk were identified spatially and measures to control erosion on some of these high risk areas can be possible with appropriate erosion control techniques.

  19. Interrill soil erosion processes on steep slopes

    Science.gov (United States)

    Zhang, X. C. (John); Wang, Z. L.

    2017-05-01

    To date interrill erosion processes are not fully understood under different rainfall and soil conditions. The objectives are to 1) identify the interrill erosion regime and limiting process under the study condition, 2) characterize the interactive effects of rainfall intensity and flow depth on sediment transport competency and mode, and 3) develop a lumped interrill erosion model. A loess loam soil with 39% sand and 45% silt was packed to flumes and exposed to simulated rainfall. A complete factorial design with three factors was used, which included rainfall intensity (48, 62, 102, 149, and 170 mm h-1), slope gradient (17.6, 26.8, 36.4, 46.6, and 57.7%), and slope length (0.4, 0.8, 1.2, 1.6, and 2 m). Rain splash, sediment discharge in runoff, and flow velocity were measured. Results showed that rainfall intensity played a dual role not only in detaching soil materials but also in enhancing sediment transport. Sediment transport was the process limiting interrill erosion rate under the study condition. Two major sediment transport modes were identified: rainfall-driven rolling/creeping and flow-driven rolling/sliding. The relative importance of each mode was largely determined by flow depth. The competence of the flow in transporting sediment decreased downslope as flow depth increased due to increased dissipation of raindrop energy. The optimal mean flow depth for the maximal interrill erosion rates was erosion rate. The negative correlation seemed stronger for heavier rains, indicating the cushioning effects of flow depth. Lumped interrill erosion models, developed from short slopes, are likely to overestimate erosion rates. Given transport as the limiting process, the so called erodibility value, estimated with those models, is indeed sediment transportability under the study condition. The effects of slope length on interrill erosion regimes need to be studied further under a wider range of conditions.

  20. Divertor erosion in DIII-D

    Energy Technology Data Exchange (ETDEWEB)

    Whyte, D.G. [Univ. of California, San Diego, CA (United States); Bastasz, R.; Wampler, W.R. [Sandia National Labs., Albuquerque, NM (United States); Brooks, J.N. [Argonne National Lab., IL (United States); West, W.P.; Wong, C.P.C.; Buzhinskij, O.I. [General Atomics, San Diego, CA (United States); Opimach, I.V. [TRINITI Lab. (United States)

    1998-08-01

    Net erosion rates of carbon target plates have been measured in situ for the DIII-D lower divertor. The principal method of obtaining this data is the DiMES sample probe. Recent experiments have focused on erosion at the outer strike-point (OSP) of two divertor plasma conditions: attached (T{sub e} > 40 eV) ELMing plasmas, and detached (T{sub e} < 2 eV) ELMing plasmas. For the attached cases, the erosion rates exceed 10 cm/exposure-year, even with incident heat flux < 1 MW/m{sup 2}. In this case, measurements and modeling agree for both gross and net carbon erosion, showing the near-surface transport and redeposition of the carbon is well understood. In the attached cases, physical sputtering (with enhancement from self-sputtering and oblique incidence) is dominant, and the effective sputtering yield, Y, is greater than 10%. In ELM-free discharges, the total OSP net erosion rate is equal to the rate of carbon accumulation in the core plasma. For the detached divertor cases, the cold incident plasma eliminates physical sputtering. Attempts to measure chemically eroded hydrocarbon molecules spectroscopically indicate an upper limit of Y {le} 0.1% for the chemical sputtering yield. Net erosion is suppressed at the outer strike-point, which becomes a region of net redeposition ({approximately} 4 cm/exposure-year). The private flux wall is measured to be a region of net redeposition with dense, high neutral pressure, attached divertor plasmas. Leading edges intercepting parallel heat flux ({approximately} 50 MW/m{sup 2}) have very high net erosion rates at the OSP of an attached plasma ({approximately} 10 {micro}m/s > 1,000x erosion rate of aligned surfaces). Leading edge erosion, and subsequent carbon redeposition, caused by tile gaps can account for half of the deuterium codeposition in the DIII-D divertor.

  1. Sputtering erosion of fusion reactor cavity walls

    International Nuclear Information System (INIS)

    Bohachevsky, I.O.; Hafer, J.F.

    1976-12-01

    Devised are functions that describe the empirically and theoretically determined behavior of sputtering coefficients. These functions are used in a computer program that calculates erosion rates and total erosion of surfaces bombarded by ion beams of specified intensity. Presented here are analytic expressions that describe the effects of ion energy and angle of incidence, computational procedures, and results. Results, computed for alpha, triton, deuteron, and heavy-metal ions bombarding niobium, carbon, and iron surfaces indicate that for pellets with heavy metal shell structures sputtering erosion should be carefully considered and properly designed for

  2. [Gastric band erosion: Alternative management].

    Science.gov (United States)

    Echaverry-Navarrete, Denis José; Maldonado-Vázquez, Angélica; Cortes-Romano, Pablo; Cabrera-Jardines, Ricardo; Mondragón-Pinzón, Erwin Eduardo; Castillo-González, Federico Armando

    2015-01-01

    Obesity is a public health problem, for which the prevalence has increased worldwide at an alarming rate, affecting 1.7 billion people in the world. To describe the technique employed in incomplete penetration of gastric band where endoscopic management and/or primary closure is not feasible. Laparoscopic removal of gastric band was performed in five patients with incomplete penetrance using Foley catheterization in the perforation site that could lead to the development of a gastro-cutaneous fistula. The cases presented include a leak that required surgical lavage with satisfactory outcome, and one patient developed stenosis 3 years after surgical management, which was resolved endoscopically. In all cases, the penetration site closed spontaneously. Gastric band erosion has been reported in 3.4% of cases. The reason for inserting a catheter is to create a controlled gastro-cutaneous fistula, allowing spontaneous closure. Various techniques have been described: the totally endoscopic, hybrid techniques (endoscopic/laparoscopic) and completely laparoscopic. A technique is described here that is useful and successful in cases where the above-described treatments are not viable. Copyright © 2015. Published by Masson Doyma México S.A.

  3. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  4. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  5. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  6. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  7. Puerto Rico Relative Erosion Potential (REP) - 2000

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The relative erosion potential is an indicator of sediment and pollution runoff from land based on slope, soil type, land cover (circa 2000) and (maximum monthly)...

  8. Compressor Impeller Erosion Resistant Surface Treatment

    National Research Council Canada - National Science Library

    Riley, Michael

    2000-01-01

    ...). Coatings based on tungsten carbide tantalum carbide. titanium carbide all with a cobalt matrix were evaluated for high velocity particle erosion in conventional wear test studies as well as wind tunnel testing...

  9. Vegetated Reinforced Soil Slope Streambank Erosion Control

    National Research Council Canada - National Science Library

    Sotir, Robbin B; Fischenich, J. C

    2003-01-01

    ...). The VRSS system is useful for the immediate repair or prevention of deeper failures providing a structurally sound system with soil reinforcement, drainage and erosion control typically on steepened...

  10. The erosive potential of candy sprays.

    Science.gov (United States)

    Gambon, D L; Brand, H S; Nieuw Amerongen, A V

    2009-05-23

    To determine the erosive potential of seven different commercially available candy sprays in vitro and in vivo. The erosive potential was determined in vitro by measuring the pH and neutralisable acidity. The salivary pH and flow rate were measured in healthy volunteers after administration of a single dose of candy spray. Candy sprays have an extremely low pH (1.9-2.3) and a neutralisable acidity varying between 0.8-1.6 ml of 0.25M NaOH. In vivo, candy sprays induced a short-term 3.0 to 5.8-fold increase in salivary flow rate with a concomitant drop in salivary pH to values between 4.4 and 5.8. All candy sprays tested have an erosive potential. This information is of use for clinicians counselling juvenile patients with dental erosion.

  11. Puerto Rico Relative Vulnerability to Erosion

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Physical factors, such as the slope of the land, the texture of the soil, and the precipitation regime influence erosion in an area. Parts of Puerto Rico are very...

  12. Rain Erosion/Measurement Impact Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The FARM Rain Erosion/Impact Measurement Lab develops solutions for deficiencies in the ability of materials, coatings and designs to withstand a severe operational...

  13. Puerto Rico Relative Erosion Potential (REP) - 1990

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The relative erosion potential is an indicator of sediment and pollution runoff from land based on slope, soil type, land cover (circa 1990) and (maximum monthly)...

  14. Emission Facilities - Erosion & Sediment Control Facilities

    Data.gov (United States)

    NSGIC Education | GIS Inventory — An Erosion and Sediment Control Facility is a DEP primary facility type related to the Water Pollution Control program. The following sub-facility types related to...

  15. Understanding and Predicting Gun Barrel Erosion

    National Research Council Canada - National Science Library

    Johnston, Ian A

    2005-01-01

    The Australian Defence Force will soon have to contend with gun barrel erosion issues arising from the use of new low-vulnerability gun propellants, the acquisition of new ammunition and gun systems...

  16. Regulated Environmental Activity Sites - CriticalErosion

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Created based on the Critical Erosion Report for 2005. Indicates the condition of shoreline, determined by our staff of Coastal Engineers, for the year 2005. This...

  17. Evaluation of erosion and siltation control fabrics.

    Science.gov (United States)

    1976-01-01

    New proprietary products in three areas of siltation and erosion control were evaluated. Hold/Gro and Griffnet materials were evaluated for use as slope stabilizers and were compared with the Department's present method of straw tacked with an asphal...

  18. The role of fluoride in erosion therapy.

    Science.gov (United States)

    Huysmans, Marie-Charlotte; Young, Alix; Ganss, Carolina

    2014-01-01

    The role of fluoride in erosion therapy has long been questioned. However, recent research has yielded positive results. In this chapter, an overview of the literature is provided regarding the application of fluorides in the prevention and treatment of erosion and erosive wear. The results are presented and discussed for different fluoride sources such as monovalent and polyvalent fluorides, and for different vehicles such as toothpastes, solutions and rinses, as well as varnishes and gels. It is concluded that fluoride applications are very likely to be of use in the preventive treatment of erosive wear. Most promising are high-concentration, acidic formulations and the polyvalent fluoride sources, with the best evidence available for stannous fluoride. However, the evidence base for clinical effectiveness is still small. © 2014 S. Karger AG, Basel.

  19. Paradiaphyseal calcific tendinitis with cortical bone erosion.

    Science.gov (United States)

    Fritz, P; Bardin, T; Laredo, J D; Ziza, J M; D'Anglejan, G; Lansaman, J; Bucki, B; Forest, M; Kuntz, D

    1994-05-01

    To determine the clinical, radiologic, and histologic features of calcific tendinitis with cortical bone erosion. The records of 6 patients with paradiaphyseal calcific tendinitis and adjacent bone cortex erosion were reviewed. Calcific tendinitis involved the linea aspera in 4 patients, the bicipital groove in 1 patient, and the deltoid insertion in another. Calcium deposits were associated with cortical bone erosions, revealed on plain radiographs in 4 patients and computed tomography scans in 2. Bone scans were performed in 2 patients and showed local hyperfixation of the isotope. In 4 patients, suspicion of a neoplasm led to a biopsy. Calcium deposits appeared to be surrounded by a foreign body reaction with numerous giant cells. Apatite crystals were identified by transmission electron microscopy and elemental analysis in 1 surgical sample. Paradiaphyseal calcific tendinitis with cortical bone erosion is an uncommon presentation of apatite deposition disease.

  20. Soil erosion - a local and national problem

    Science.gov (United States)

    C.G. Bates; O.R. Zeasman

    1930-01-01

    The erosion of soils through the action of rain water and that from melting snow is almost universal in its occurrence. The gradual erosion and levelling of any country is inevitable, being a process which has gone on as long as there has been free water on the face of the earth. Nevertheless, this process is an extremely slow one where the landscape is naturally well...

  1. Natural and anthropogenic rates of soil erosion

    Directory of Open Access Journals (Sweden)

    Mark A. Nearing

    2017-06-01

    Full Text Available Regions of land that are brought into crop production from native vegetation typically undergo a period of soil erosion instability, and long term erosion rates are greater than for natural lands as long as the land continues being used for crop production. Average rates of soil erosion under natural, non-cropped conditions have been documented to be less than 2 Mg ha−1 yr−1. On-site rates of erosion of lands under cultivation over large cropland areas, such as in the United States, have been documented to be on the order of 6 Mg ha−1 yr−1 or more. In northeastern China, lands that were brought into production during the last century are thought to have average rates of erosion over this large area of as much as 15 Mg ha−1 yr−1 or more. Broadly applied soil conservation practices, and in particular conservation tillage and no-till cropping, have been found to be effective in reducing rates of erosion, as was seen in the United States when the average rates of erosion on cropped lands decreased from on the order of 9 Mg ha−1 yr−1 to 6 or 7 Mg ha−1 yr−1 between 1982 and 2002, coincident with the widespread adoption of new conservation tillage and residue management practices. Taking cropped lands out of production and restoring them to perennial plant cover, as was done in areas of the United States under the Conservation Reserve Program, is thought to reduce average erosion rates to approximately 1 Mg ha−1 yr−1 or less on those lands.

  2. Divertor erosion in DIII-D

    International Nuclear Information System (INIS)

    Whyte, D.G.; Bastasz, R.; Wampler, W.R.; Brooks, J.N.; West, W.P.; Wong, C.P.C.

    1998-05-01

    Net erosion rates of carbon target plates have been measured in situ for the DIII-D lower divertor. The principal method of obtaining this data is the DiMES sample probe. Recent experiments have focused on erosion at the outer strike-point of two divertor plasma conditions: (1) attached (Te > 40 eV) ELMing plasmas and (2) detached (Te 10 cm/year, even with incident heat flux 2 . In this case, measurements and modeling agree for both gross and net carbon erosion, showing the near-surface transport and redeposition of the carbon is well understood and that effective sputtering yields are > 10%. In ELM-free discharges, this erosion rate can account for the rate of carbon accumulation in the core plasma. Divertor plasma detachment eliminates physical sputtering, while spectroscopically measured chemical erosion yields are also found to be low (Y(C/D + ) ≤ 2.0 x 10 -3 ). This leads to suppression of net erosion at the outer strike-point, which becomes a region of net redeposition (∼ 4 cm/year). The private flux wall is measured to be a region of net redeposition with dense, high neutral pressure, attached divertor plasmas. Leading edges intercepting parallel heat flux (∼ 50 MW/m 2 ) have very high net erosion rates (∼ 10 microm/s) at the OSP of an attached plasma. Leading edge erosion, and subsequent carbon redeposition, caused by tile gaps can account for half of the deuterium codeposition in the DIII-D divertor

  3. Divertor erosion in DIII-D

    International Nuclear Information System (INIS)

    Whyte, D.G.; Bastasz, R.; Wampler, W.R.; Brooks, J.N.; West, W.P.; Wong, C.P.C.; Buzhinskij, O.I.; Opimach, I.V.

    1998-08-01

    Net erosion rates of carbon target plates have been measured in situ for the DIII-D lower divertor. The principal method of obtaining this data is the DiMES sample probe. Recent experiments have focused on erosion at the outer strike-point (OSP) of two divertor plasma conditions: attached (T e > 40 eV) ELMing plasmas, and detached (T e 2 . In this case, measurements and modeling agree for both gross and net carbon erosion, showing the near-surface transport and redeposition of the carbon is well understood. In the attached cases, physical sputtering (with enhancement from self-sputtering and oblique incidence) is dominant, and the effective sputtering yield, Y, is greater than 10%. In ELM-free discharges, the total OSP net erosion rate is equal to the rate of carbon accumulation in the core plasma. For the detached divertor cases, the cold incident plasma eliminates physical sputtering. Attempts to measure chemically eroded hydrocarbon molecules spectroscopically indicate an upper limit of Y ≤ 0.1% for the chemical sputtering yield. Net erosion is suppressed at the outer strike-point, which becomes a region of net redeposition (∼ 4 cm/exposure-year). The private flux wall is measured to be a region of net redeposition with dense, high neutral pressure, attached divertor plasmas. Leading edges intercepting parallel heat flux (∼ 50 MW/m 2 ) have very high net erosion rates at the OSP of an attached plasma (∼ 10 microm/s > 1,000x erosion rate of aligned surfaces). Leading edge erosion, and subsequent carbon redeposition, caused by tile gaps can account for half of the deuterium codeposition in the DIII-D divertor

  4. Repeated cortisol administration does not reduce intrusive memories - A double blind placebo controlled experimental study.

    Science.gov (United States)

    Graebener, Alexandra Heike; Michael, Tanja; Holz, Elena; Lass-Hennemann, Johanna

    2017-11-01

    PTSD is a severe mental disorder, which may develop after exposure to traumatic events and is characterized by intrusive memories. Intrusions are sudden brief sensory memories of the traumatic event, that cause immense distress and impairment in every day functioning. Thus, the reduction of intrusive memories is one of the main aims of PTSD therapy. Recently, the glucocorticoid cortisol has been proposed as a pharmacological option to reduce intrusive memories, because cortisol is known to have memory retrieval inhibiting effects. However, the research on the effects of cortisol administration on intrusive memories is not conclusive. The aim of the present study was to examine if repeated cortisol administration inhibits intrusions and recognition memory in an experimental study using the trauma film paradigm. In a randomized double-blind placebo controlled design participants were exposed to a traumatic film (known to induce intrusions in healthy participants) and received either a low dose of cortisol (20mg) or placebo on the three days following "trauma exposure". Intrusive memories were assessed with an Electronic Diary and an Intrusion Triggering Task. Furthermore, we assessed explicit memory for the traumatic film clip with a recognition test. Contrary to our predictions, the cortisol group did not report fewer intrusions than the placebo group nor did it show diminished performance on the recognition test. Our results show that sole cortisol administration after a traumatic experience cannot reduce intrusive re-experiencing. Copyright © 2017 Elsevier B.V. and ECNP. All rights reserved.

  5. Susceptibility of bovine dental enamel with initial erosion lesion to new erosive challenges.

    Directory of Open Access Journals (Sweden)

    Gabriela Cristina de Oliveira

    Full Text Available This in vitro study evaluated the impact of initial erosion on the susceptibility of enamel to further erosive challenge. Thirty bovine enamel blocks were selected by surface hardness and randomized into two groups (n = 15: GC- group composed by enamel blocks without erosion lesion and GT- group composed by enamel blocks with initial erosion lesion. The baseline profile of each block was determined using the profilometer. The initial erosion was produced by immersing the blocks into HCl 0.01 M, pH 2.3 for 30 seconds, under stirring. The erosive cycling consisted of blocks immersion in hydrochloric acid (0.01 M, pH 2.3 for 2 minutes, followed by immersion in artificial saliva for 120 minutes. This procedure was repeated 4 times a day for 5 days, and the blocks were kept in artificial saliva overnight. After erosive cycling, final profile measurement was performed. Profilometry measured the enamel loss by the superposition of initial and final profiles. Data were analyzed by t-test (p<0.05. The result showed no statistically significant difference between groups (GS = 14.60±2.86 and GE = .14.69±2.21 μm. The presence of initial erosion on bovine dental enamel does not enhance its susceptibility to new erosive challenges.

  6. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  7. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  8. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  9. Non-intrusive Load Disaggregation Based on Kernel Density Estimation

    Science.gov (United States)

    Sen, Wang; Dongsheng, Yang; Chuchen, Guo; Shengxian, Du

    2017-05-01

    Aiming at the problem of high cost and difficult implementation of high frequency non-intrusive load decomposition method, this paper proposes a new method based on kernel density estimation(KDE) for low frequency NILM (Non-intrusive load monitoring). The method establishes power reference model of electricity load in different working conditions and appliance’s possible combinations first, then probability distribution is calculated as appliances features by kernel density estimation. After that, target power data is divided by step changes, whose distributions will be compared with reference models, and the most similar reference model will be chosen as the decomposed consequence. The proposed approach was tested with data from the GREEND public data set, it showed better performance in terms of energy disaggregation accuracy compared with many traditional NILM approaches. Our results show good performance which can achieve more than 93% accuracy in simulation.

  10. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  11. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  13. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  14. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  15. Dental erosion in children: a literature review.

    Science.gov (United States)

    Linnett, V; Seow, W K

    2001-01-01

    Epidemiological studies have shown that the prevalence of dental erosion in children varies widely between 2 and 57%. Changes seen in dental erosion range from removal of surface characteristics to extensive loss of tooth tissue with pulp exposure and abscess formation. Symptoms of dental erosion range from sensitivity to severe pain associated with pulp exposure. The etiology of dental erosion is dependent on the presence of extrinsic or intrinsic acid in the oral environment. Extrinsic sources of acids in children include frequent consumption of acidic foods and drinks, and acidic medications. Regurgitation of gastric contents into the mouth, as occurs in gastroesophageal reflux, is the most common source of intrinsic acid in children. A multitude of factors may modify the erosion process, such as saliva, oral hygiene practices, and presence or absence of fluoride. When dental erosion is diagnosed, it is important to investigate and identify the acid source, and to determine if the process is ongoing. The aim of treatment is to eliminate the cause of acid exposure, and to minimize the effects of acid exposure where it is not possible to remove the acid source. Restoration of the dentition involves stainless steel crowns to restore lost vertical dimension, and composite resin for esthetics.

  16. Erosion of Earthen Levees by Wave Action

    Science.gov (United States)

    Ozeren, Y.; Wren, D. G.; Reba, M. L.

    2016-02-01

    Earthen levees of aquaculture and irrigation reservoirs in the United States often experience significant erosion due to wind-generated waves. Typically constructed using local soils, unprotected levees are subjected to rapid erosion and retreat due to wind generated waves and surface runoff. Only a limited amount of published work addresses the erosion rates for unprotected levees, and producers who rely on irrigation reservoirs need an economic basis for selecting a protection method for vulnerable levees. This, in turn, means that a relationship between wave energy and erosion of cohesive soils is needed. In this study, laboratory experiments were carried out in order to quantify wave induced levee erosion and retreat. A model erodible bank was packed using a soil consisting of approximately 14% sand, 73% silt, and 13% clay in a 20.6 m long 0.7 m wide and 1.2 m deep wave tank at the USDA-ARS, National Sedimentation Laboratory in Oxford MS. The geometry of the levee face was monitored by digital camera and the waves were measured by means of 6 capacitance wave staffs. Relationships were established between levee erosion, edge and retreat rates, and incident wave energy.

  17. Men’s stranger intrusions : rethinking street harassment.

    OpenAIRE

    Vera-Gray, F.

    2016-01-01

    Women's experiences of intrusive men in public space, popularly termed ‘street harassment’, are the most understudied yet commonly experienced forms of violence against women. Despite acknowledgement of its importance, an explicit debate on naming – with an exploration of how language creates both openings and restrictions of what can be said – is yet to be had in the literature. This paper begins this conversation, detailing the benefits and challenges in current terminology, and exploring t...

  18. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  19. Research on chronicles correlation based network intrusion detection techniques

    International Nuclear Information System (INIS)

    Han Zhengping; Jin Yan; Chen Taiwei; Xu Rongsheng

    2007-01-01

    According to some problems existed in network intrusion detection technique, such as alerts overwhelming, false-positives and lack of alert description, this paper introduces chronicle correlation method to alert events analysis by some correlative examples. With designed chronicle recognition language, portscan's alerts can be reduced, false-positives in buffer overflow's alerts can be detected, and NetBios DCERPC attack's alerts semantics can be improved. (authors)

  20. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  1. Animal intrusion status report for fiscal year 1989

    Energy Technology Data Exchange (ETDEWEB)

    Landeen, D.S.

    1990-08-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  2. Intrusion of anterior teeth to improve smile esthetics.

    Science.gov (United States)

    Chandrasekharan, Deepak; Balaji, S M

    2010-03-01

    A gummy smile is probably one of the most common causes of an unaesthetic smile. Causes include overeruption of maxillary anterior teeth and maxillary vertical excess. Intrusion of maxillary anterior teeth with Orthodontics and Le forte I superior repositioning may form a part of the solution. Of late the use of micro implants have improved the smile esthetics of borderline surgical cases by allowing the Orthodontist to intrude teeth more than what was possible with conventional Orthodontics.

  3. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  4. Mechanisms of extrusion and intrusion formation in fatigued crystalline materials

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Man, Jiří

    2014-01-01

    Roč. 596, FEB (2014), s. 15-24 ISSN 0921-5093 R&D Projects: GA ČR(CZ) GAP108/10/2371; GA ČR(CZ) GA13-23652S Institutional support: RVO:68081723 Keywords : Fatigue * Extrusion * Intrusion * Persistent slip band * Fatigue crack initiation Subject RIV: JL - Materials Fatigue, Friction Mechanics Impact factor: 2.567, year: 2014

  5. "Keynote address, Theme 4, Management of steepland erosion: an overview"

    Science.gov (United States)

    Robert R. Ziemer

    1981-01-01

    Abstract - Steepland erosion is a composite of surface, channel, and mass erosion. The relative importance of each process is determined by an interaction between climate, soil, geology, topography, and vegetation. A change in any of these components can increase or decrease the rate of erosion. The key to successful management of erosion is the ability to 1)...

  6. Surface Erosion Control Techniques on Newly Constructed Forest Roads

    Science.gov (United States)

    Johnny M. Grace; John Wilhoit; Robert Rummer; Bryce Stokes

    1999-01-01

    A newly constructed forest road was treated with three erosion control treatments: wood excelsior erosion mat, native grass species, and exotic grass species. The study evaluates treatment methods on the basis of sediment reduction and runoff volume reduction compared to no treatment. The erosion mat treatment was most effective in mitigating erosion losses with a 98...

  7. Soil erosion as a driver of land-use change

    NARCIS (Netherlands)

    Bakker, M.M.; Govers, G.; Kosmas, C.; VanAcker, H.; Oost, van K.; Rounsevell, M.

    2005-01-01

    Although much research has been carried out on the crop productivity response to soil erosion, little is known about the role of soil erosion as a driver of land-use change. Given, however, the some-times large erosion-induced reductions in crop yields, it appears likely that erosion has a strong

  8. Satellite-based estimation of rainfall erosivity for Africa

    NARCIS (Netherlands)

    Vrieling, A.; Sterk, G.; Jong, S.M. de

    2010-01-01

    Rainfall erosivity is a measure for the erosive force of rainfall. Rainfall kinetic energy determines the erosivity and is in turn greatly dependent on rainfall intensity. Attempts for its large-scale mapping are rare. Most are based on interpolation of erosivity values derived from rain gauge

  9. Rill erosion in natural and disturbed forests: 1. Measurements

    Science.gov (United States)

    P. R. Robichaud; J. W. Wagenbrenner; R. E. Brown

    2010-01-01

    Rill erosion can be a large portion of the total erosion in disturbed forests, but measurements of the runoff and erosion at the rill scale are uncommon. Simulated rill erosion experiments were conducted in two forested areas in the northwestern United States on slopes ranging from 18 to 79%. We compared runoff rates, runoff velocities, and sediment flux rates from...

  10. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  11. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  12. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  13. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  14. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

    Directory of Open Access Journals (Sweden)

    Al Quhtani Masoud

    2017-03-01

    Full Text Available Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

  15. Intrusive imagery in people with a specific phobia of vomiting.

    Science.gov (United States)

    Price, Katy; Veale, David; Brewin, Chris R

    2012-03-01

    AND OBJECTIVES: Specific phobia of vomiting (SPOV) is a chronic, pervasive and debilitating disorder which is clinically regarded as difficult to treat. Research into its development, maintenance and treatment has been limited. This study explored the prevalence and characteristics of intrusive mental imagery in people with SPOV. It investigated the relationship between presence of imagery and severity of phobia. Thirty-six participants meeting DSM-IV criteria for SPOV were recruited from online support groups and outpatient clinics. A semi-structured quantitative interview was administered. Twenty-nine (81%) participants reported multi-sensory intrusive imagery of adult (52%) and childhood memories (31%) and worst case scenarios ("flashforwards") of vomiting (17%). Extent of imagery was significantly related to severity of phobia. Participants primarily fearing others vomiting had less severe phobic symptoms. No control group was used and a heterogeneous sample of clinical and community participants was recruited. Correlational data comparing extent of imagery with severity of SPOV symptoms were derived from as yet unvalidated measures. Intrusive mental imagery is a clinically important feature of SPOV and may contribute to its maintenance. Causality needs to be demonstrated. Copyright © 2011 Elsevier Ltd. All rights reserved.

  16. Dimensionality reduction using Principal Component Analysis for network intrusion detection

    Directory of Open Access Journals (Sweden)

    K. Keerthi Vasan

    2016-09-01

    Full Text Available Intrusion detection is the identification of malicious activities in a given network by analyzing its traffic. Data mining techniques used for this analysis study the traffic traces and identify hostile flows in the traffic. Dimensionality reduction in data mining focuses on representing data with minimum number of dimensions such that its properties are not lost and hence reducing the underlying complexity in processing the data. Principal Component Analysis (PCA is one of the prominent dimensionality reduction techniques widely used in network traffic analysis. In this paper, we focus on the efficiency of PCA for intrusion detection and determine its Reduction Ratio (RR, ideal number of Principal Components needed for intrusion detection and the impact of noisy data on PCA. We carried out experiments with PCA using various classifier algorithms on two benchmark datasets namely, KDD CUP and UNB ISCX. Experiments show that the first 10 Principal Components are effective for classification. The classification accuracy for 10 Principal Components is about 99.7% and 98.8%, nearly same as the accuracy obtained using original 41 features for KDD and 28 features for ISCX, respectively.

  17. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  18. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  19. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  20. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  1. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  2. Reduction of saltwater intrusion by modifying hydraulic conductivity

    Science.gov (United States)

    Strack, O. D. L.; Stoeckl, L.; Damm, K.; Houben, G.; Ausk, B. K.; de Lange, W. J.

    2016-09-01

    We present an approach for reducing saltwater intrusion in coastal aquifers by artificially reducing the hydraulic conductivity in the upper part of selected areas by using a precipitate. We apply a previously presented analytical approach to develop formulas useful for the design of artificial barriers. Equations for the location of the tip of the saltwater wedge are presented and verified through a sand-tank experiment. The analysis is capable of computing discharges exactly, but requires the Dupuit-Forchheimer approximation to compute points of the interface between flowing fresh and stationary saltwater. We consider a vertical coastline and boundaries in the freshwater zone of either given discharge or given head. We demonstrate in the paper that reduction of the hydraulic conductivity in the upper part of a coastal aquifer will result in a decrease of saltwater intrusion, and present analytic expressions that can be used for design purposes. The previously presented analytical approach can be applied to design systems to reduce saltwater intrusion caused by pumping inland from the zone that contains saline groundwater.

  3. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  4. Erosivity, surface runoff, and soil erosion estimation using GIS-coupled runoff-erosion model in the Mamuaba catchment, Brazil.

    Science.gov (United States)

    Marques da Silva, Richarde; Guimarães Santos, Celso Augusto; Carneiro de Lima Silva, Valeriano; Pereira e Silva, Leonardo

    2013-11-01

    This study evaluates erosivity, surface runoff generation, and soil erosion rates for Mamuaba catchment, sub-catchment of Gramame River basin (Brazil) by using the ArcView Soil and Water Assessment Tool (AvSWAT) model. Calibration and validation of the model was performed on monthly basis, and it could simulate surface runoff and soil erosion to a good level of accuracy. Daily rainfall data between 1969 and 1989 from six rain gauges were used, and the monthly rainfall erosivity of each station was computed for all the studied years. In order to evaluate the calibration and validation of the model, monthly runoff data between January 1978 and April 1982 from one runoff gauge were used as well. The estimated soil loss rates were also realistic when compared to what can be observed in the field and to results from previous studies around of catchment. The long-term average soil loss was estimated at 9.4 t ha(-1) year(-1); most of the area of the catchment (60%) was predicted to suffer from a low- to moderate-erosion risk (soil erosion was estimated to exceed > 12 t ha(-1) year(-1). Expectedly, estimated soil loss was significantly correlated with measured rainfall and simulated surface runoff. Based on the estimated soil loss rates, the catchment was divided into four priority categories (low, moderate, high and very high) for conservation intervention. The study demonstrates that the AvSWAT model provides a useful tool for soil erosion assessment from catchments and facilitates the planning for a sustainable land management in northeastern Brazil.

  5. Helicobacter Pylori Eradication Therapy in both Erosive and Non-erosive Gastritis — A Prospective Study

    Directory of Open Access Journals (Sweden)

    Mohammad Quamrul Hasan

    2014-01-01

    Full Text Available Background: Infection with Helicobacter pylori (H. pylori is a recognized cause of peptic ulcer and gastritis. Persistence of infection is a definite risk factor for gastric malignancy. Healing of gastritis after eradication of H. pylori reduces the risks of peptic ulcer disease and gastric malignancy. Objectives: To find out the relationship of H. pylori with erosive and nonerosive gastritis, the effect of anti-H. pylori therapy and to compare the effects of anti-H. pylori therapy between two types of gastritis. Materials and Methods: This prospective study was done in the Gastroenterology department of Bangabandhu Sheikh Mujib Medical University, Dhaka from June 2008 to May 2009. One hundred eighty dyspeptic patients were enrolled for the study. Patients with gastritis diagnosed by endoscopy underwent rapid urease test (RUT. RUT positive patients were considered to have H. pylori infection and were treated with triple therapy (omeprazole, amoxycillin and metronidiazole for 14 days. Treatment responses were assessed by clinical history and also by endoscopic biopsy and RUT. Results of endoscopic findings and RUT after treatment were compared with pretreatment status. Results: Seventy patients completed the treatment and finally could be assessed. Endoscopic findings of 70 patients revealed that 56 (80% patients had erosive gastritis and 14 (20% patients had nonerosive gastritis. After treatment, 47 (67.1% lesions became normal, 16 (22.9% remained erosive and 7 (10% non-erosive as before. Out of 14 non-erosive diseases, 7 became normal, while out of 56 erosive diseases 40 became normal. The erosive group responded significantly better than the non-erosive group (c2=32.766, p<0.001. Fifty nine (84.3% patients with gastritis showed negative urease test after treatment. Conclusion: Strong relation between H. pylori infection and gastritis was found. Majority were antral erosive gastritis. Erosive group responded better than non-erosive group.

  6. Annotated bibliography on soil erosion and erosion control in subarctic and high-latitude regions of North America.

    Science.gov (United States)

    C.W. Slaughter; J.W. Aldrich

    1989-01-01

    This annotated bibliography emphasizes the physical processes of upland soil erosion, prediction of soil erosion and sediment yield, and erosion control. The bibliography is divided into two sections: (1) references specific to Alaska, the Arctic and subarctic, and similar high-latitude settings; and (2) references relevant to understanding erosion, sediment production...

  7. Erosion associated with cable and tractor logging in northwestern California

    Science.gov (United States)

    R. M. Rice; P. A. Datzman

    1981-01-01

    Abstract - Erosion and site conditions were measured at 102 logged plots in northwestern California. Erosion averaged 26.8 m 3 /ha. A log-normal distribution was a better fit to the data. The antilog of the mean of the logarithms of erosion was 3.2 m 3 /ha. The Coast District Erosion Hazard Rating was a poor predictor of erosion related to logging. In a new equation...

  8. Effects of surface slope on erosion rates of quartz particles

    OpenAIRE

    Lodge, Phillip.

    2006-01-01

    Modeling sediment erosion is important in a wide range of environmental problems. The effects of various environmental factors on erosion rates have been studied, but the effects of surface slope on erosion rates of a wide range of sediments have not been quantified. The effects of surface slope, both in the direction of flow (pitch) and perpendicular to the flow (roll), on erosion rates of quartz particles were investigated using the Sediment Erosion at Depth Flume (Sedflume). US Navy (US...

  9. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  10. Pattern of bone erosion and bone proliferation in psoriatic arthritis hands

    DEFF Research Database (Denmark)

    Poggenborg, René Panduro; Bird, P; Boonen, A

    2014-01-01

    OBJECTIVES: To investigate the pattern and development of bone erosion and proliferation in patients with psoriatic arthritis (PsA) during treatment with adalimumab, using high-resolution computed tomography (CT) and conventional radiography. METHOD: Forty-one biologic-naïve PsA patients were...... initiated with adalimumab 40 mg subcutaneously every other week. CT and radiography of the 2nd-5th metacarpophalangeal (MCP), proximal interphalangeal (PIP), and distal interphalangeal (DIP) joints were conducted at baseline (n = 41) and after 24 weeks (n = 32). Changes in bone erosion and proliferation......, bone proliferations were located primarily on the sides of the distal part of the DIP joints (43% of all proliferations), but also proximally in DIP (17%) and MCP joints (27%). For bone erosions and proliferations, respectively, radiography showed a low sensitivity (17% and 26%), but a high specificity...

  11. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  12. IN SITU MEASUREMENT OF BEDROCK EROSION

    Directory of Open Access Journals (Sweden)

    D. H. Rieke-Zapp

    2012-07-01

    Full Text Available While long term erosion rates of bedrock material may be estimated by dating methods, current day erosion rates are – if at all available – based on rough estimates or on point measurements. Precise quantification of short term erosion rates are required to improve our understanding of short term processes, for input in landscape evolution models, as well as for studying the mechanics and efficiency of different erosion processes in varying geomorphological settings. Typical current day erosion rates in the European Alps range from sub-millimetre to several millimetres per year depending on the dominant erosion processes. The level of surveying accuracy required for recurring sub-millimetre to millimetre measurements in the field is demanding. A novel surveying setup for in-situ measurement of bedrock erosion was tested recently in three different locations in Switzerland. Natural bedrock was investigated in the Gornera gorge close to Zermatt. Further on, bedrock samples were installed in exposed locations in the Erlenbach research watershed close to Einsiedeln, and in the Illgraben debris flow channel, located in the Canton Schwyz and Valais, respectively. A twofold measurement approach was chosen for all locations. For the first setup control points providing an absolute reference frame for recurrent measurements were embedded close to the area of interest. Close range photogrammetry was applied to measure surface changes on the bedrock samples. The precision for surface measurements in the field was 0.1 mm (1 σ and thus suitable for the application. The equipment needed for the surveys can easily be carried to the field. At one field site a structured light scanner was used along with the photogrammetric setup. Although the current generation of structured light scanners appeared less suitable for field application, data acquisition was much faster and checking the data for completeness in the field was straight forward. The latest

  13. In Situ Measurement of Bedrock Erosion

    Science.gov (United States)

    Rieke-Zapp, D. H.; Beer, A.; Turowski, J. M.; Campana, L.

    2012-07-01

    While long term erosion rates of bedrock material may be estimated by dating methods, current day erosion rates are - if at all available - based on rough estimates or on point measurements. Precise quantification of short term erosion rates are required to improve our understanding of short term processes, for input in landscape evolution models, as well as for studying the mechanics and efficiency of different erosion processes in varying geomorphological settings. Typical current day erosion rates in the European Alps range from sub-millimetre to several millimetres per year depending on the dominant erosion processes. The level of surveying accuracy required for recurring sub-millimetre to millimetre measurements in the field is demanding. A novel surveying setup for in-situ measurement of bedrock erosion was tested recently in three different locations in Switzerland. Natural bedrock was investigated in the Gornera gorge close to Zermatt. Further on, bedrock samples were installed in exposed locations in the Erlenbach research watershed close to Einsiedeln, and in the Illgraben debris flow channel, located in the Canton Schwyz and Valais, respectively. A twofold measurement approach was chosen for all locations. For the first setup control points providing an absolute reference frame for recurrent measurements were embedded close to the area of interest. Close range photogrammetry was applied to measure surface changes on the bedrock samples. The precision for surface measurements in the field was 0.1 mm (1 σ) and thus suitable for the application. The equipment needed for the surveys can easily be carried to the field. At one field site a structured light scanner was used along with the photogrammetric setup. Although the current generation of structured light scanners appeared less suitable for field application, data acquisition was much faster and checking the data for completeness in the field was straight forward. The latest generation of compact

  14. A 2500 year record of natural and anthropogenic soil erosion in South Greenland

    Science.gov (United States)

    Massa, Charly; Bichet, Vincent; Gauthier, Émilie; Perren, Bianca B.; Mathieu, Olivier; Petit, Christophe; Monna, Fabrice; Giraudeau, Jacques; Losno, Rémi; Richard, Hervé

    2012-01-01

    The environmental impact of the Norse landnám (colonization) in Greenland has been studied extensively. But to date, no study has quantified the soil erosion that Norse agricultural practices are believed to have caused. To resolve this problem, a high resolution sedimentary record from Lake Igaliku in South Greenland is used to quantitatively reconstruct 2500 years of soil erosion driven by climate and historical land use. An accurate chronology, established on 18 AMS 14C, and 210Pb and 137Cs dates, allows for the estimation of detritic fluxes and their uncertainties. Land clearance and the introduction of grazing livestock by the Norse around 1010 AD caused an acceleration of soil erosion up to ˜8 mm century -1 in 1180 AD which is two-fold higher than the natural pre- landnám background. From 1335 AD to the end of the Norse Eastern Settlement (in the mid-fifteenth century), the vegetation began to recover from initial disturbance and soil erosion decreased. After an initial phase of modern sheep breeding similar to the medieval one, the mechanization of agriculture in the 1980s caused an unprecedented soil erosion rate of up to ˜21 mm century -1, five times the pre-anthropogenic levels. Independently, a suite of biological and geochemical proxies (including Ti and diatom concentrations, C:N ratio, δ13C and δ15N of organic matter) confirm that the medieval and modern anthropogenic erosion far exceeds any natural erosion over the last 2500 years. Our findings question the veracity of the catastrophic scenario of overgrazing and land degradation considered to have been the major factor responsible for Norse settlement demise. They also shed light on the sustainability of modern practices and their consequences for the future of agriculture in Greenland.

  15. Predicting of soil erosion with regarding to rainfall erosivity and soil erodibility

    Science.gov (United States)

    Suif, Zuliziana; Razak, Mohd Amirun Anis Ab; Ahmad, Nordila

    2018-02-01

    The soil along the hill and slope are wearing away due to erosion and it can take place due to occurrence of weak and heavy rainfall. The aim of this study is to predict the soil erosion degree in Universiti Pertahanan Nasional Malaysia (UPNM) area focused on two major factor which is soil erodibility and rainfall erosivity. Soil erodibility is the possibilities of soil to detach and carried away during rainfall and runoff. The "ROM" scale was used in this study to determine the degree of soil erodibility, namely low, moderate, high, and very high. As for rainfall erosivity, the erosive power caused by rainfall that cause soil loss. A daily rainfall data collected from January to April was analyzed by using ROSE index classification to identify the potential risk of soil erosion. The result shows that the soil erodibilty are moderate at MTD`s hill, high at behind of block Lestari and Landslide MTD hill, and critical at behind the mess cadet. While, the highest rainfall erosivity was recorded in March and April. Overall, this study would benefit the organization greatly in saving cost in landslide protection as relevant authorities can take early measures repairing the most affected area of soil erosion.

  16. Probabilistic soil erosion modeling using the Erosion Risk Management Tool (ERMIT) after wildfires

    Science.gov (United States)

    P. R. Robichaud; W. J. Elliot; J. W. Wagenbrenner

    2011-01-01

    The decision of whether or not to apply post-fire hillslope erosion mitigation treatments, and if so, where these treatments are most needed, is a multi-step process. Land managers must assess the risk of damaging runoff and sediment delivery events occurring on the unrecovered burned hillslope. We developed the Erosion Risk Management Tool (ERMiT) to address this need...

  17. Does a more sophisticated storm erosion model improve probabilistic erosion estimates?

    NARCIS (Netherlands)

    Ranasinghe, R.W.M.R.J.B.; Callaghan, D.; Roelvink, D.

    2013-01-01

    The dependency between the accuracy/uncertainty of storm erosion exceedance estimates obtained via a probabilistic model and the level of sophistication of the structural function (storm erosion model) embedded in the probabilistic model is assessed via the application of Callaghan et al.'s (2008)

  18. Soil carbon and nitrogen erosion in forested catchments: implications for erosion-induced terrestrial carbon sequestration

    Science.gov (United States)

    E. M. Stacy; S. C. Hart; C. T. Hunsaker; D. W. Johnson; A. A. Berhe

    2015-01-01

    Lateral movement of organic matter (OM) due to erosion is now considered an important flux term in terrestrial carbon (C) and nitrogen (N) budgets, yet most published studies on the role of erosion focus on agricultural or grassland ecosystems. To date, little information is available on the rate and nature of OM eroded from forest ecosystems. We present annual...

  19. Regional soil erosion assessment based on a sample survey and geostatistics

    Science.gov (United States)

    Yin, Shuiqing; Zhu, Zhengyuan; Wang, Li; Liu, Baoyuan; Xie, Yun; Wang, Guannan; Li, Yishan

    2018-03-01

    Soil erosion is one of the most significant environmental problems in China. From 2010 to 2012, the fourth national census for soil erosion sampled 32 364 PSUs (Primary Sampling Units, small watersheds) with the areas of 0.2-3 km2. Land use and soil erosion controlling factors including rainfall erosivity, soil erodibility, slope length, slope steepness, biological practice, engineering practice, and tillage practice for the PSUs were surveyed, and the soil loss rate for each land use in the PSUs was estimated using an empirical model, the Chinese Soil Loss Equation (CSLE). Though the information collected from the sample units can be aggregated to estimate soil erosion conditions on a large scale; the problem of estimating soil erosion condition on a regional scale has not been addressed well. The aim of this study is to introduce a new model-based regional soil erosion assessment method combining a sample survey and geostatistics. We compared seven spatial interpolation models based on the bivariate penalized spline over triangulation (BPST) method to generate a regional soil erosion assessment from the PSUs. Shaanxi Province (3116 PSUs) in China was selected for the comparison and assessment as it is one of the areas with the most serious erosion problem. Ten-fold cross-validation based on the PSU data showed the model assisted by the land use, rainfall erosivity factor (R), soil erodibility factor (K), slope steepness factor (S), and slope length factor (L) derived from a 1 : 10 000 topography map is the best one, with the model efficiency coefficient (ME) being 0.75 and the MSE being 55.8 % of that for the model assisted by the land use alone. Among four erosion factors as the covariates, the S factor contributed the most information, followed by K and L factors, and R factor made almost no contribution to the spatial estimation of soil loss. The LS factor derived from 30 or 90 m Shuttle Radar Topography Mission (SRTM) digital elevation model (DEM) data

  20. Advances in Predicting Soil Erosion After Fire Using the Rangeland Hydrology and Erosion Model

    Science.gov (United States)

    Al-Hamdan, Osama Z.; Pierson, Frederick B.; Nearing, Mark A.; Williams, C. Jason; Hernandez, Mariano; Boll, Jan; Nouwakpo, Sayjro; Weltz, Mark A.; Spaeth, Kenneth E.

    2017-04-01

    The magnitude of erosion from a hillslope is governed by the availability of sediment and connectivity of overland flow and erosion processes. For undisturbed conditions, sediment is mainly detached and transported by rainsplash and sheetflow (splash-sheet) processes in bare batches, but sediment generally only travels a short distance before deposition. On recently disturbed sites (e.g., after fire), bare ground is more extensive and runoff and erosion rates are higher relative to undisturbed conditions. Increased erosion following disturbance occurs largely due to a shift from splash-sheet to concentrated-flow-dominated processes. On long-disturbed sites (e.g., after woody plant encroachment), years of soil loss can limit sediment availability and soil erosion. In contrast, recently burned landscapes typically have ample sediment available and generate high erosion rates. This presentation highlights recent advancements in hillslope erosion prediction by the Rangeland Hydrology and Erosion Model (RHEM) that accommodate recently burned conditions. The RHEM tool is a process-based model that was developed specifically for predicting hillslope runoff and erosion on rangeland ecosystems. The advancements presented here include development of empirical equations to predict erodibility parameters for conditions in which erosion by concentrated flow processes is limited (by runoff or sediment availability) and an erodibility parameter for conditions in which erosion by concentrated flow processes is the dominant erosion mechanism and sediment is amply available (burned conditions). The data used for developing and evaluating the erodibility parameter equations were obtained from rainfall simulation databases maintained by the USDA-Agricultural Research Service. The data span undisturbed, long-disturbed, and recently burned conditions. For undisturbed and long-disturbed conditions, a regression analysis was applied to derive the relationship between splash

  1. An investigation of potential neural correlates of intrusive retrieval of distressing memories.

    Science.gov (United States)

    Battaglini, Eva; Liddell, Belinda J; Das, Pritha; Malhi, Gin S; Felmingham, Kim; Bryant, Richard A

    2018-03-01

    Despite the prevalence of intrusive memories across psychological disorders, little is known about the neural networks that underpin this form of memory. This study used functional magnetic resonance imaging (fMRI) to identify neural circuits associated with the retrieval of intrusive memories. Participants with moderate levels of anxiety (N = 30) underwent a cold pressor task to induce a physiological stress response, after which they viewed 10 neutral and 10 negative film clips. In a method designed to induce intrusive memories, participants then completed an fMRI scan in which they viewed short (2 s) depictions of neutral components from the original film clips. There were no significant differences in activations during intrusion and non-intrusion responses. Exploratory analyses comparing intrusive responses to neutral stimuli found the insula, inferior frontal gyrus, precuneus, right cerebellum and bilateral supplementary motor area were uniquely activated during experience of intrusions (compared to the neutral cue baseline), whereas no significant activations were in response to negative scenes that did not trigger intrusions. This study did not compare the different neural processes implicated in intrusive and intentional emotional memories. The limited intrusions that could be elicited in the scanning environment restricted the number of trials that could be employed. Although no differences in neural activations were observed between intrusive and non-intrusive responses, the observation of precuneus involvement is consistent with models that propose that intrusive memories are impacted by the extent to which there is contextual integration of the relevant memories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Potential for monitoring soil erosion features and soil erosion modeling components from remotely sensed data

    Science.gov (United States)

    Langran, K. J.

    1983-01-01

    Accurate estimates of soil erosion and its effects on soil productivity are essential in agricultural decision making and planning from the field scale to the national level. Erosion models have been primarily developed for designing erosion control systems, predicting sediment yield for reservoir design, predicting sediment transport, and simulating water quality. New models proposed are more comprehensive in that the necessary components (hydrology, erosion-sedimentation, nutrient cycling, tillage, etc.) are linked in a model appropriate for studying the erosion-productivity problem. Recent developments in remote sensing systems, such as Landsat Thematic Mapper, Shuttle Imaging Radar (SIR-B), etc., can contribute significantly to the future development and operational use of these models.

  3. Study on the standard of soil erosion gradation based on erosive daily rainfall

    Science.gov (United States)

    Li, Gang; Ye, Suigao; Shen, Zhaowei; Lu, Fangchun; Zhang, Jinjuan

    2017-11-01

    This paper took Yuyao city as the research area. the daily rainfall data of 30-year was collected from the typical rainfall station. And the daily rainfall power function model was used to calculate the rainfall erosivity. The weight that the rainfall erosivity of the rainfall less than 30mm accounted for the total annual rainfall erosivity was calculated and analyzed. A method for soil erosion intensity gradation based on daily rainfall was proposed. At the same time, according to People’s Republic of China water conservancy industry standard “the standards for classification and gradation of soil erosion”, the weight value was used to establish the gradation standard of soil erosion intensity. The daily soil loss tolerance was 7 t/km2 calculated by this method.

  4. Erosion and Accretion on a Mudflat: The Importance of Very Shallow-Water Effects

    Science.gov (United States)

    Shi, Benwei; Cooper, James R.; Pratolongo, Paula D.; Gao, Shu; Bouma, T. J.; Li, Gaocong; Li, Chunyan; Yang, S. L.; Wang, Ya Ping

    2017-12-01

    Understanding erosion and accretion dynamics during an entire tidal cycle is important for assessing their impacts on the habitats of biological communities and the long-term morphological evolution of intertidal mudflats. However, previous studies often omitted erosion and accretion during very shallow-water stages (VSWS, water depths erosion and accretion dynamics are likely to differ from those during deeper flows. In this study, we examine the contribution of very shallow-water effects to erosion and accretion of the entire tidal cycle, based on measured and modeled time-series of bed-level changes. Our field experiments revealed that the VSWS accounted for only 11% of the duration of the entire tidal cycle, but erosion and accretion during these stages accounted for 35% of the bed-level changes of the entire tidal cycle. Predicted cumulative bed-level changes agree much better with measured results when the entire tidal cycle is modeled than when only the conditions at water depths of >0.2 m (i.e., probe submerged) are considered. These findings suggest that the magnitude of bed-level changes during VSWS should not be neglected when modeling morphodynamic processes. Our results are useful in understanding the mechanisms of micro-topography formation and destruction that often occur at VSWS, and also improve our understanding and modeling ability of coastal morphological changes.

  5. Sand transport, erosion and granular electrification

    DEFF Research Database (Denmark)

    Merrison, J.P.

    2012-01-01

    The transport of granular materials by wind has a major impact on our environment through sand/soil erosion and the generation and transport of atmospheric dust aerosols. Terrestrially the transport of dust involves billions of tons of material every year, influencing the global climate and impac......The transport of granular materials by wind has a major impact on our environment through sand/soil erosion and the generation and transport of atmospheric dust aerosols. Terrestrially the transport of dust involves billions of tons of material every year, influencing the global climate...... can affect grain transport through the generation of intense electric fields and processes of electrostatic assembly. Importantly the transport of sand is characterized by saltation, which is known to be an active process for erosion and therefore a source for dust and sand formation. Using novel...... erosion simulation techniques the link between grain transport rates and erosion rates has been quantified. Furthermore this can be linked to production rates for dust and has been associated with chemical and mineral alteration through a process of mechanical activation of fractured surfaces. This work...

  6. Evaluation of the serum zinc level in erosive and non-erosive oral lichen planus.

    Science.gov (United States)

    Gholizadeh, N; Mehdipour, M; Najafi, Sh; Bahramian, A; Garjani, Sh; Khoeini Poorfar, H

    2014-06-01

    Lichen planus is a chronic inflammatory immunologic-based disease involving skin and mucosa. This disease is generally divided into two categories: erosive and non-erosive. Many etiologic factors are deliberated regarding the disease; however, the disorders of immune system and the role of cytotoxic T-lymphocytes and monocytes are more highlighted. Zinc is an imperative element for the growth of epithelium and its deficiency induces the cytotoxic activity of T-helper2 cells, which seems to be associated with lichen planus. This study was aimed to evaluate the levels of serum zinc in erosive and non-erosive oral lichen planus (OLP) and to compare it with the healthy control group to find out any feasible inference. A total of 22 patients with erosive oral lichen planus, 22 patients with non erosive OLP and 44 healthy individuals as the control group were recruited in this descriptive-comparative study. All the participants were selected from the referees to the department of oral medicine, school of dentistry, Tabriz University of Medical Sciences. Serum zinc level was examined for all the individuals with liquid-stat kit (Beckman Instruments Inc.; Carlsbad, CA). Data were analyzed by adopting the ANOVA and Tukey tests, using SPSS 16 statistical software. The mean age of patients with erosive and non-erosive LP was 41.7 and 41.3 years, respectively. The mean age of the healthy control group was 34.4 years .The mean serum zinc levels in the erosive and non erosive lichen planus groups and control groups were 8.3 (1.15), 11.15 (0.92) and 15.74 (1.75) μg/dl respectively. The difference was statistically significant (plichen planus. This finding may probably indicate the promising role of zinc in development of oral lichen planus.

  7. Understanding soil erosion impacts in temperate agroecosystems: bridging the gap between geomorphology and soil ecology using nematodes as a model organism

    Science.gov (United States)

    Baxter, C.; Rowan, J. S.; McKenzie, B. M.; Neilson, R.

    2013-11-01

    Soil is a key asset of natural capital, providing a myriad of goods and ecosystem services that sustain life through regulating, supporting and provisioning roles, delivered by chemical, physical and biological processes. One of the greatest threats to soil is accelerated erosion, which raises a natural process to unsustainable levels, and has downstream consequences (e.g.~economic, environmental and social). Global intensification of agroecosystems is a recognised major cause of soil erosion which, in light of predicted population growth and increased demand for food security, will continue or increase. Transport and redistribution of biota by soil erosion has hitherto been ignored and thus is poorly understood. With the move to sustainable intensification this is a key knowledge gap that needs to be addressed. Here we highlight the erosion-energy and effective-erosion-depth continuum in soils, differentiating between different forms of soil erosion, and argue that nematodes are an appropriate model taxa to investigate impacts of erosion on soil biota across scales. We review the different known mechanisms of soil erosion that impact on soil biota in general, and nematodes in particular, and highlight the few detailed studies, primarily from tropical regions, that have considered soil biota. Based on the limited literature and using nematodes as a model organism we outline future research priorities to initially address the important interrelationships between soil erosion processes and soil biota.

  8. Continental erosion and the Cenozoic rise of marine diatoms.

    Science.gov (United States)

    Cermeño, Pedro; Falkowski, Paul G; Romero, Oscar E; Schaller, Morgan F; Vallina, Sergio M

    2015-04-07

    Marine diatoms are silica-precipitating microalgae that account for over half of organic carbon burial in marine sediments and thus they play a key role in the global carbon cycle. Their evolutionary expansion during the Cenozoic era (66 Ma to present) has been associated with a superior competitive ability for silicic acid relative to other siliceous plankton such as radiolarians, which evolved by reducing the weight of their silica test. Here we use a mathematical model in which diatoms and radiolarians compete for silicic acid to show that the observed reduction in the weight of radiolarian tests is insufficient to explain the rise of diatoms. Using the lithium isotope record of seawater as a proxy of silicate rock weathering and erosion, we calculate changes in the input flux of silicic acid to the oceans. Our results indicate that the long-term massive erosion of continental silicates was critical to the subsequent success of diatoms in marine ecosystems over the last 40 My and suggest an increase in the strength and efficiency of the oceanic biological pump over this period.

  9. An Experimental Simulation Method of Erosion Process on Gully Erosion in Loess Plateau in China

    Science.gov (United States)

    Gao, Jianen; Zhang, Yuanxing

    2017-04-01

    In view of simulation difficultment of the field gully erosion process because of complex of rainfall runoff erosion mechanism and gully geometry a design means and experimentation technology and its verification test were given based on similarity theory and hydrodynamic principles. The basic ideas was that the erosion process of the field erosion gully was forecast by constructing similar model. The model and antetype should be in obedience to the same physical equations of rainfall, runoff, erosion, sediment transport, bed deformation and Soil water transport. The geometric, kinematical and dynamic similarity must be obeyed for these models. The primary similarity scale relation expressions were the ones of the geometric, rainfall, flow, erosion sediment transport and soil water movement similarity etc. The similarity of the hydraulic boundary was the necessary and sufficient condition between the model and the prototype. The gully prototype is one of Majiagou of Ansai county of Yanan City of Shaanxi Province in China. Its location is 36°53'55.75"N and 109°13'39.08"E. The model experiment wan carried out in State Key Laboratory of Soil Erosion and Dry land Farming On the Loess Plateau in Institute of Soil and Water Conservation of Northwest A&F University. First soil was selected by starting velocity similar. Second, the normal and scale 10 experiment model was built under complying with the similarities of geometric, rainfall, flow, erosion production sediment transport and bed deformation etc. The model hydraulic boundary from the prototype was the factor of the test process of rainfall. The experiment results indicated that the extreme rainstorm gully erosion process of the prototype could be reappeared. The equivalent rainfall process of gully prototype were that the rainfall intensity was 1.25 mm/min and the lasting time was 508 min and precipitation was 636mmn. Both the erosion amount and the erosion gully topography of the scale model were successfully

  10. Erosion rates for polymers measured on LDEF

    Science.gov (United States)

    Gregory, John C.

    1992-01-01

    The summary and viewgraphs of work presented at the Long Duration Exposure Facility (LDEF) materials workshop are given. Experimental data for erosion depths and rates for polymers measured on LDEF are given. In general, agreement is reasonably good between erosion rates from the University of Alabama in Huntsville (UAH) LDEF experiment and prior data obtained at much lower mission fluences. Agreement is particularly satisfying in the case of Kapton where the prior data base is large. In spite of the known presence of silicaceous contamination on LDEF surfaces, the erosion rates of the highly erodible materials are hardly affected, if at all. Graphs showing changes in optical properties (reflectance and transmittance) of metal films are included.

  11. Erosion of buffer caused by groundwater leakages

    International Nuclear Information System (INIS)

    Autio, J.; Hanana, K.; Punkkinen, O.; Koskinen, K.; Olin, M.

    2010-01-01

    Document available in extended abstract form only. In the Finnish HLW disposal concept the most important properties of the bentonite clay being considered for these isolation purposes are its thermal behaviour, low hydraulic conductivity, diffusion limited transport, rheology, plasticity, sufficient swelling potential, and exchange capacity. All of these properties depend critically on bentonite density; therefore, any potential mass loss or redistribution events must be well characterized. One such event or process is the erosion of bentonite by flowing groundwater and the groundwater flowing in newly formed channels, in special. Mechanical erosion during the operational phase, due to high groundwater pressure gradients in open excavations, has been identified as a critical issue in TKS-2006 and SR-Can. This work addresses the mechanical erosion of bentonite by fluid shear. In order for buffer erosion to occur three processes must take place: detachment, entrainment, and transport. These processes are followed by the settling of the material and redistribution of buffer mass. Erosion begins with the detachment of a particle from surrounding material, which requires the application of shear forces greater than the attractive force between the particle and parent structure. Entrainment is the process by which the eroding medium lifts the detached particle into the flow. The most important aspect in entrainment is transfer of fluid's inertial forces via surface friction to particles' inertial forces, which, in turn, must overcome the frictional resistance between the particle and its surroundings. Factors influencing frictional resistance include gravity, particle mass, saturation degree of parent structure, composition of water present in parent structure, particle size, and surface roughness. Recent erosion tests, whereby water flow was directed over compacted bentonite blocks or through a system of bentonite pellets, have indicated that bentonite erodes

  12. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  13. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  14. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  15. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  16. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  17. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  18. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  19. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  20. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  1. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  2. A graphical feature generation approach for intrusion detection

    OpenAIRE

    Chen Shi; Zuo Zhen; Huang Zhi Ping; Guo Xiao Jun

    2016-01-01

    In order to develop a novel effective and efficient intrusion detection system, a novel hybrid method based on a graphical features-based k-nearest neighbor approach, namely GFNN, is proposed in this paper. In GFNN, k-means clustering algorithm is used to extract cluster centre of each class in the given dataset. Then, the distance between a specific data sample and each cluster centre is calculated, and a radar chart is plotted based on the new data composed of distance based features. The s...

  3. Role of erosion and isostasy in the Cordillera Blanca uplift: insights from Low-T thermochronology and landscape evolution modeling (northern Peru, Andes)

    Science.gov (United States)

    Margirier, A.; Robert, X.; Braun, J.; Laurence, A.

    2017-12-01

    The uplift and exhumation of the highest Peruvian peaks seems closely linked to the Cordillera Blanca normal fault that delimits and shape the western flank of the Cordillera Blanca. Two models have been previously proposed to explain the occurrence of extension and the presence of this active normal fault in a compression setting but the Cordillera Blanca normal fault and the uplift and exhumation of the Cordillera Blanca remain enigmatic. Recent studies suggested an increase of exhumation rates during the Quaternary in the Cordillera Blanca and related this increase to a change in climate and erosion process (glacial erosion vs. fluvial erosion). The Cordillera Blanca granite has been significantly eroded since its emplacement (12-5 Ma) indicating a significant mass of rocks removal. Whereas it has been demonstrated recently that the effect of eroding denser rocks can contribute to an increase of uplift rate, the impact of erosion and isostasy on the increase of the Cordillera Blanca uplift rates has never been explored. Based on numerical modeling of landscape evolution we address the role of erosion and isostasy in the uplift and exhumation of the Cordillera Blanca. We performed inversions of the present-day topography, total exhumation and thermochronological data using a landscape evolution model (FastScape). Our results evidence the contribution of erosion and associated flexural rebound to the uplift of the Cordillera Blanca. Our models suggest that the erosion of the Cordillera Blanca dense intrusion since 3 Ma could also explain the Quaternary exhumation rate increase in this area. Finally, our results allow to question the previous models proposed for the formation of the Cordillera Blanca normal fault.

  4. EPro Non-contact erosion profiling

    DEFF Research Database (Denmark)

    Meinert, Palle

    Pro is a profiling program build to measure the same surface or work piece multiple times and track changes due to erosion. It was developed during 2001 - 2002 at Aalborg University and was part of a Master of Science project dealing with stability of rubble mound breakwaters. The goal was to aut......Pro is a profiling program build to measure the same surface or work piece multiple times and track changes due to erosion. It was developed during 2001 - 2002 at Aalborg University and was part of a Master of Science project dealing with stability of rubble mound breakwaters. The goal...

  5. Wind and water erosion control on semiarid lands

    International Nuclear Information System (INIS)

    Siddoway, F.H.

    1980-01-01

    Commercial crop production on semiarid lands is difficult because insufficient water is often present to manage the system effectively. Erosion control presents the major management problem. The factors contributing to wind erosion and their interaction have been quantified into a wind erosion equation. The control of wind erosion through agronomic alteration of the various factors is discussed. The quantification and control of water erosion is also discussed with respect to the Universal Soil Loss Equation. Radioisotopes tracers have been used in conjunction with these erosion equations to measure soil losses. (author)

  6. Impact of tillage erosion on water erosion in a hilly landscape.

    Science.gov (United States)

    Wang, Y; Zhang, J H; Zhang, Z H; Jia, L Z

    2016-05-01

    Little has been known of the interaction between tillage erosion and water erosion, while the two erosion processes was independently studied. Can tillage-induced soil redistribution lead to exaggerated (or retarded) runoff flow and sediment concentrations in steeply sloping fields? A series of simulated tillage and artificial rainfall events were applied to rectangular runoff plots (2m×8m) with a slope of 15° to examine the impacts of tillage erosion intensities on water erosion in the Yangtze Three Gorges Reservoir Area, China. Mean flow velocity, effective/critical shear stress, and soil erodibility factor K were calculated to analyze the differences in hydrodynamic characteristics induced by tillage. Our experimental results suggest that mean runoff rates were 2.26, 1.19, and 0.65Lmin(-1) and that mean soil detachment rates were 1.53, 1.01, and 0.61gm(-2)min(-1) during the 70-min simulated rainfall events for 52-, 31-, and 10-year tillage, respectively. A significant difference (Pwater losses tended to increase with increasing tillage intensity. A significant difference in mean flow velocity occurred near the upper and lower slope boundaries of the field, while significant differences (Perosion increases soil erodibility and delivers the soil for water erosion in sloping fields, accelerating water erosion. Copyright © 2016. Published by Elsevier B.V.

  7. The role of compassion, suffering, and intrusive thoughts in dementia caregiver depression.

    Science.gov (United States)

    Schulz, Richard; Savla, Jyoti; Czaja, Sara J; Monin, Joan

    2017-09-01

    Exposure to suffering of a relative or friend increases the risk for psychological and physical morbidity. However, little is known about the mechanisms that account for this effect. We test a theoretical model that identifies intrusive thoughts as a mediator of the relation between perceived physical and psychological suffering of the care recipient and caregiver depression. We also assess the role of compassion as a moderator of the relation between perceived suffering and intrusive thoughts. Hispanic and African American caregivers (N = 108) of persons with dementia were assessed three times within a one-year period. Using multilevel modeling, we assessed the mediating role of intrusive thoughts in the relation between perceived physical and psychological suffering and CG depression, and we tested moderated mediation to assess the role of caregiver compassion in the relation between perceived suffering and intrusive thoughts. The effects of perceived physical suffering on depression were completely mediated through intrusive thoughts, and compassion moderated the relation between physical suffering and intrusive thoughts. Caregivers who had greater compassion reported more intrusive thoughts even when perceived physical suffering of the CR was low. For perceived psychological suffering, the effects of suffering on depression were partially mediated through intrusive thoughts. Understanding the role of intrusive thoughts and compassion in familial relationships provides new insights into mechanisms driving caregiver well-being and presents new opportunities for intervention.

  8. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  9. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Directory of Open Access Journals (Sweden)

    Laura Jobson

    Full Text Available Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1. In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed. The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  10. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  11. Soil erosion after forest fires in the Valencia region

    Science.gov (United States)

    González-Pelayo, Óscar; Keizer, Jan Jacob; Cerdà, Artemi

    2014-05-01

    Soil erosion after forest fire is triggered by the lack of vegetation cover and the degradation of the physical, biological and chemical properties (Martí et al., 2012; Fernández et al., 2012; Guénon, 2013). Valencia region belongs to the west Mediterranean basin ("Csa", Köppen climate classification), with drought summer periods that enhance forest fire risk. The characteristics of the climate, lithology and land use history makes this region more vulnerable to soil erosion. In this area, fire recurrence is being increased since late 50s (Pausas, 2004) and post-fire erosion studies became more popular from 80's until nowadays (Cerdá and Mataix-Solera, 2009). Research in Valencia region has contributed significantly to a better understanding of the effect of spatial and temporal scale on runoff and sediment yield measurements. The main achievements concerns: a) direct measurement of erosion rates under a wide range of methodologies (natural vs simulated rainfall, open vs closed plots); from micro- to meso-plot and catchment scale in single (Rubio et al., 1994; Cerdà et al., 1995; Cerdà 1998a; 1998b; Llovet et al., 1998; Cerdà, 2001; Calvo-Cases et al., 2003; Andreu et al., 2001; Mayor et al., 2007; Cerdà and Doerr, 2008) and multiples fires (Campo et al., 2006; González-Pelayo et al., 2010a). Changes in soil properties (Sanroque et al., 1985; Rubio et al., 1997; Boix-Fayós, 1997; Gimeno-Garcia et al., 2000; Guerrero et al., 2001; Mataix-Solera et al., 2004; González-Pelayo et al., 2006; Arcenegui et al., 2008; Campo et al., 2008; Bodí et al., 2012), in post-fire vegetation patterns (Gimeno-García et al., 2007) and, studies on mitigation strategies (Bautista et al., 1996; Abad et al., 2000). b) Progress to understanding post-fire erosion mechanism and sediment movement (Boix-Fayós et al., 2005) by definition of thresholds for sediment losses; fire severity, slope angle, bedrock, rain characteristics, vegetation pattern and ecosystem resilience (Mayor

  12. Is telomere erosion a mechanism of species extinction?

    Science.gov (United States)

    Stindl, Reinhard

    2004-03-15

    According to the fossil record, 99.9% of all species that have ever lived on Earth have disappeared. However, only about 4% died out during the five mass extinction events, whereas it seems that the majority of species vanished without any signs of significant earthbound or extraterrestrial physical threats. Clearly, biological extinction mechanisms are by far the most important, but they are subject to serious limitations concerning the worldwide disappearance of species. In view of that, species-inherent mechanisms, which could lead to the worldwide destabilization of a population, might be worth reconsideration. Telomeres, the protective caps of chromosome ends, and the enzyme telomerase have been well preserved in plants and animals during evolution. In the absence of telomerase activity, telomeric DNA has been shown to shorten every time a cell divides. The concept of a mitotic clock based on the gradual erosion of telomeres is now generally accepted and has been confirmed in numerous plants and animals. Chromosomal rearrangements are the hallmarks of two completely different biological phenomena, cancer and speciation. In premalignant cells, gradual telomere erosion beyond a critical threshold is a well-known inducer of chromosomal instability. The species clock hypothesis, as presented here, is based on the idea of a tiny loss of mean telomere length per generation. This mechanism would not rapidly endanger the survival of a particular species. Yet, after many thousands of generations, critically short telomeres could lead to the weakening and even the extinction of old species and would simultaneously create the unstable chromosomal environment that might result in the origination of new species. Copyright 2004 Wiley-Liss, Inc.

  13. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  14. Nuclear-power-plant perimeter-intrusion alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  15. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  16. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi

    2013-01-01

    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

  17. ESTIMATION OF INTRUSION DETECTION PROBABILITY BY PASSIVE INFRARED DETECTORS

    Directory of Open Access Journals (Sweden)

    V. V. Volkhonskiy

    2015-07-01

    Full Text Available Subject of Research. The paper deals with estimation of detection probability of intruder by passive infrared detector in different conditions of velocity and direction for automated analyses of physical protection systems effectiveness. Method. Analytic formulas for detection distance distribution laws obtained by means of experimental histogram approximation are used. Main Results. Applicability of different distribution laws has been studied, such as Rayleigh, Gauss, Gamma, Maxwell and Weibull distribution. Based on walk tests results, approximation of experimental histograms of detection distance probability distribution laws by passive infrared detectors was done. Conformity of the histograms to the mentioned analytical laws according to fitting criterion 2 has been checked for different conditions of velocity and direction of intruder movement. Mean and variance of approximate distribution laws were equal to the same parameters of experimental histograms for corresponding intruder movement parameters. Approximation accuracy evaluation for above mentioned laws was done with significance level of 0.05. According to fitting criterion 2, the Rayleigh and Gamma laws are corresponded mostly close to the histograms for different velocity and direction of intruder movement. Dependences of approximation accuracy for different conditions of intrusion have been got. They are usable for choosing an approximation law in the certain condition. Practical Relevance. Analytic formulas for detection probability are usable for modeling of intrusion process and objective effectiveness estimation of physical protection systems by both developers and users.

  18. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  19. Features extraction algorithm about typical railway perimeter intrusion event

    Science.gov (United States)

    Zhou, Jieyun; Wang, Chaodong; Liu, Lihai

    2017-10-01

    Research purposes: Optical fiber vibration sensing system has been widely used in the oil, gas, frontier defence, prison and power industries. But, there are few reports about the application in railway defence. That is because the surrounding environment is complicated and there are many challenges to be overcomed in the optical fiber vibration sensing system application. For example, how to eliminate the effects of vibration caused by train, the natural environments such as wind and rain and how to identify and classify the intrusion events. In order to solve these problems, the feature signals of these events should be extracted firstly. Research conclusions: (1) In optical fiber vibration sensing system based on Sagnac interferometer, the peak-to-peak value, peak-to-average ratio, standard deviation, zero-crossing rate, short-term energy and kurtosis may serve as feature signals. (2) The feature signals of resting state, climbing concrete fence, breaking barbed wire, knocking concrete fence and rainstorm have been extracted, which shows significant difference among each other. (3) The research conclusions can be used in the identification and classification of intrusion events.

  20. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.