WorldWideScience

Sample records for biological intrusion erosion

  1. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  2. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  3. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  4. Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.

    1986-02-01

    This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user

  5. Preliminary assessment of geologic materials to minimize biological intrusion of low-level waste trench covers and plans for the future

    International Nuclear Information System (INIS)

    Hakonson, T.E.; White, G.C.; Gladney, E.S.; Muller, M.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause radionuclide transport from a waste site. Preliminary results demonstrate that a sandy backfill material offers little resistance to root and animal intrusion through the cover profile. However, bentonite clay, cobble, and cobble-gravel combinations do reduce plant root and animal intrusion through cover profiles compared with sandy backfill soil. However, bentonite clay barrier systems appear to be degraded by plant roots through time. Desiccation of the clay barrier by invading plant roots may limit the usefulness of bentonite clay as a moisture and/or biological carrier unless due consideration is given to this interaction. Future experiments are described that further examine the effect of plant roots on clay barrier systems and that determine the effectiveness of proposed biological barriers on larger scales and under various stress conditions

  6. Evaluation of geologic materials to limit biological intrusion of low-level waste site covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; White, G.C.; Karlen, E.M.

    1982-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. This paper reports the preliminary results of a screening study to-determine the effectiveness of four biobarrier materials to stop plant root and animal penetration into simulated low-level wastes. Experiments employed 288 lysimeters consisting of 25-cm-diam PVC pipe, with four factors tested: plant species (alfalfa, barley, and sweet clover); top soil thickness (30 and 60 cm); biobarrier material (crushed tuff, bentonite clay, cobble, and cobble-gravel); and biobarrier thickness (clay-15, 30, and 45 cm, others 30, 60, and 90 cm). The crushed tuff, a sandy backfill material, offers little resistance to root and animal intrusion through the cover profile, while bentonite clay, cobble, and cobble-gravel combinations do reduce plant root and animal intrusion thorugh cover profiles. However, dessication of the clay barrier by invading plant roots may limit the usefulness of this material as a moisture and/or biological barrier. The cobble-gravel combination appears to be the best candidate for further testing on a larger scale because the gravel helps impede the imgration of soil into the cobble layer - the probable cause of failure of cobble-only biobarriers

  7. Preliminary report of biological intrusion studies at the Idaho National Engineering Laboratory subsurface disposal area

    International Nuclear Information System (INIS)

    Reynolds, T.D.; Arthur, W.J.

    1983-01-01

    As part of a larger study on the effects of biological intrusion of plants and animals into the soil cover placed over low-level radioactive wastes stored at the Idaho National Engineering Laboratory Subsurface Disposal Area (SDA), research was initiated in the summer of 1982 to determine the burrow characteristics and movement patterns of several small mammal species, and the rooting depths of various plants. The depth, length, and volume of burrows were determined for four small mammal species: deer mouse (Peromyscus maniculatus), Ord's kangaroo rat (Dipodomys ordii), montane vole (Microtus montanus), and Townsend's ground squirrel (Spermophilis townsendii). The latter species excavated the greatest mean burrow depth (39 cm), length (404 cm), and volume (14.8 1). Movement patterns of three species were determined by radiotelemetry. The mean area of use for P. maniculatus, D. ordii, and M. montanus was 2.3, 1.5, and 1.2 ha respectively. Limited data on rooting depths of various native and introduced plant species at the SDA were obtained by literature review and excavation. During FY-83, experiments will be conducted, using the information obtained from the first year of this study, to evaluate the impact of burrowing mammals and root intrusion on the integrity of the soil cover currently existing at the SDA. Details of these experimental studies are presented

  8. How development and disturbance of biological soil crust do affect runoff and erosion in drylands?

    Energy Technology Data Exchange (ETDEWEB)

    Chamizo, S.; Canton, Y.; Afana, A.; Lazaro, R.; Domingo, F.; Sole-Benet, A.

    2009-07-01

    Deserts and semiarid ecosystems (shrub lands and grasslands) are the largest terrestrial biome, covering more than 40% of the Earth's terrestrial surface and Biological Soil Crusts (BSCs) are the predominant surface type in most of those ecosystems covering up to 70% of its surface. BSCs have been demonstrated to be very vulnerable to disturbance due to human activities and their loss has been implicated as a factor leading to accelerate soil erosion and other forms of land degradation. Incorporation of the response of different type of soil crusts and the effects of the their disturbance is likely to improve the prediction of runoff and water erosion models in arid and semi-arid catchments. The aim of this work is to analyse the influence of crust disturbance on infiltration and erosion. Extreme rainfall simulations at micro plots scale were performed in two semiarid ecosystems with different lithology and conditions of occurrence of BSCs: El Cautivo and Amoladeras. (Author) 10 refs.

  9. How development and disturbance of biological soil crust do affect runoff and erosion in drylands?

    International Nuclear Information System (INIS)

    Chamizo, S.; Canton, Y.; Afana, A.; Lazaro, R.; Domingo, F.; Sole-Benet, A.

    2009-01-01

    Deserts and semiarid ecosystems (shrub lands and grasslands) are the largest terrestrial biome, covering more than 40% of the Earth's terrestrial surface and Biological Soil Crusts (BSCs) are the predominant surface type in most of those ecosystems covering up to 70% of its surface. BSCs have been demonstrated to be very vulnerable to disturbance due to human activities and their loss has been implicated as a factor leading to accelerate soil erosion and other forms of land degradation. Incorporation of the response of different type of soil crusts and the effects of the their disturbance is likely to improve the prediction of runoff and water erosion models in arid and semi-arid catchments. The aim of this work is to analyse the influence of crust disturbance on infiltration and erosion. Extreme rainfall simulations at micro plots scale were performed in two semiarid ecosystems with different lithology and conditions of occurrence of BSCs: El Cautivo and Amoladeras. (Author) 10 refs.

  10. Bryophyte-dominated biological soil crusts mitigate soil erosion in an early successional Chinese subtropical forest

    Directory of Open Access Journals (Sweden)

    S. Seitz

    2017-12-01

    Full Text Available This study investigated the development of biological soil crusts (biocrusts in an early successional subtropical forest plantation and their impact on soil erosion. Within a biodiversity and ecosystem functioning experiment in southeast China (biodiversity and ecosystem functioning (BEF China, the effect of these biocrusts on sediment delivery and runoff was assessed within micro-scale runoff plots under natural rainfall, and biocrust cover was surveyed over a 5-year period. Results showed that biocrusts occurred widely in the experimental forest ecosystem and developed from initial light cyanobacteria- and algae-dominated crusts to later-stage bryophyte-dominated crusts within only 3 years. Biocrust cover was still increasing after 6 years of tree growth. Within later-stage crusts, 25 bryophyte species were determined. Surrounding vegetation cover and terrain attributes significantly influenced the development of biocrusts. Besides high crown cover and leaf area index, the development of biocrusts was favoured by low slope gradients, slope orientations towards the incident sunlight and the altitude of the research plots. Measurements showed that bryophyte-dominated biocrusts strongly decreased soil erosion, being more effective than abiotic soil surface cover. Hence, their significant role in mitigating sediment delivery and runoff generation in mesic forest environments and their ability to quickly colonise soil surfaces after disturbance are of particular interest for soil erosion control in early-stage forest plantations.

  11. Bryophyte-dominated biological soil crusts mitigate soil erosion in an early successional Chinese subtropical forest

    Science.gov (United States)

    Seitz, Steffen; Nebel, Martin; Goebes, Philipp; Käppeler, Kathrin; Schmidt, Karsten; Shi, Xuezheng; Song, Zhengshan; Webber, Carla L.; Weber, Bettina; Scholten, Thomas

    2017-12-01

    This study investigated the development of biological soil crusts (biocrusts) in an early successional subtropical forest plantation and their impact on soil erosion. Within a biodiversity and ecosystem functioning experiment in southeast China (biodiversity and ecosystem functioning (BEF) China), the effect of these biocrusts on sediment delivery and runoff was assessed within micro-scale runoff plots under natural rainfall, and biocrust cover was surveyed over a 5-year period. Results showed that biocrusts occurred widely in the experimental forest ecosystem and developed from initial light cyanobacteria- and algae-dominated crusts to later-stage bryophyte-dominated crusts within only 3 years. Biocrust cover was still increasing after 6 years of tree growth. Within later-stage crusts, 25 bryophyte species were determined. Surrounding vegetation cover and terrain attributes significantly influenced the development of biocrusts. Besides high crown cover and leaf area index, the development of biocrusts was favoured by low slope gradients, slope orientations towards the incident sunlight and the altitude of the research plots. Measurements showed that bryophyte-dominated biocrusts strongly decreased soil erosion, being more effective than abiotic soil surface cover. Hence, their significant role in mitigating sediment delivery and runoff generation in mesic forest environments and their ability to quickly colonise soil surfaces after disturbance are of particular interest for soil erosion control in early-stage forest plantations.

  12. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  13. Biological water contamination in some cattle production fields of Argentina subjected to runoff and erosion

    Directory of Open Access Journals (Sweden)

    Celio I. Chagas

    2014-10-01

    Full Text Available Grain production has displaced livestock to marginal lands in most of the productive regions in Argentina since 1990. In the fertile Rolling Pampa region, extensive cattle production has been concentrated in lowlands subjected to flooding, salt excess, erosion and sedimentation processes but also in some feedlots recently located in sloping arable lands prone to soil erosion. We studied the concentration of microbiological contamination indicators in runoff water and sediments accumulated in depressions along the tributary network from these lands devoted to cattle production. The aims of this work were: (i to gather a reliable set of data from different monitoring periods and scales, (ii to search for simple and sensible variables to be used as indicators for surface water quality advising purposes and (iii to corroborate previous biological contamination conceptual models for this region. Concentration of pollution indicators in these ponds was related to mean stocking rates from nearby fields and proved to depend significantly on the accumulated water and sediments. Viable mesophiles and total coliforms were found mainly attached to large sediments rather than in the runoff water phase. Seasonal sampling showed that the time period between the last significant runoff event and each sampling date regarding enterococci proved to be a sensible variable for predicting contamination. Enterococci concentration tended to increase gradually until the next extraordinary runoff event washed away contaminants. The mentioned relationship may be useful for designing early warning surface water contamination programs regarding enterococci dynamics and other related microbial pollutants as well.

  14. Biological soil crust effects must be included to accurately model infiltration and erosion in drylands : an example from Tabernas Badlands

    NARCIS (Netherlands)

    Rodriguez-Caballero, E.; Canton, Y.; Jetten, V.G.

    2015-01-01

    In dryland ecosystems, runoff is mainly generated in bare areas, which are also more susceptible to water erosion than vegetated areas. These bare areas are often covered and protected by biological soil crusts (BSCs), which modify numerous physicochemical surface properties involved in runoff and

  15. Intrusion of the Bay of Bengal water into the Arabian Sea during winter monsoon and associated chemical and biological response

    Digital Repository Service at National Institute of Oceanography (India)

    PrasannaKumar, S.; Narvekar, J.; Kumar, A.; Shaji, C.; Anand, P.; Sabu, P.; Rijomon, G.; Josia, J.; Jayaraj, K.A.; Radhika, A.; Nair, K.K.C.

    off. The hydrological imbalance thus created on an annual scale will have to be balanced by the inter-basin exchange. In winter this happens through the intrusion of Bay of Bengal waters into the Arabian Sea, when the southward flowing East India...

  16. [Biological soil crust nitrogenase activity and its responses to hydro-thermic factors in different erosion regions on the Loess Plateau, China].

    Science.gov (United States)

    Ming, Jiao; Zhao, Yun-Ge; Xu, Ming-Xiang; Yang, Li-Na; Wang, Ai-Guo

    2013-07-01

    Based on field survey, the biological soil crusts at their stable development stage were collected from the water erosion region, water-wind erosion region, and wind erosion region on the Loess Plateau, aimed to study the effects of the variations of moisture and temperature on the crusts nitrogenase activity (NA). The NA of the crusts in the erosion regions decreased in the order of water erosion region (127.7 micromol x m(-2) x h(-1)) > water-wind erosion region (34.6 micromol x m(-2) x h(-1)) > wind erosion region (6.0 micromol x m(-2) x h(-1)), and the optimal temperature for the crust nitrogen fixation was 35 degrees C, 25 degrees C, and 15 degrees C, respectively. At the optimal temperature and 100% -40% field water-holding capacity, the NA of the crusts from the water erosion and water-wind erosion regions had no significant difference. The NA of the crusts from the wind erosion region was more sensitive to the variation of moisture, showing a dramatic decline when the moisture decreased to 80% field water-holding capacity, and totally lost when the moisture decreased to 20% field water-holding capacity. The differences in the NA of the crusts from the three erosion regions and the responses of the NA to the variations of moisture and temperature were likely associated with the climate, environment, and the crust species composition.

  17. Agriculture and stream water quality: A biological evaluation of erosion control practices

    Science.gov (United States)

    Lenat, David R.

    1984-07-01

    Agricultural runoff affects many streams in North Carolina. However, there is is little information about either its effect on stream biota or any potential mitigation by erosion control practices. In this study, benthic macroinvertebrates were sampled in three different geographic areas of North Carolina, comparing control watersheds with well-managed and poorly managed watersheds. Agricultural streams were characterized by lower taxa richness (especially for intolerant groups) and low stability. These effects were most evident at the poorly managed sites. Sedimentation was the apparent major problem, but some changes at agricultural sites implied water quality problems. The groups most intolerant of agricultural runoff were Ephemeroptera, Plecoptera and Trichoptera. Tolerant species were usually filter-feeders or algal grazers, suggesting a modification of the food web by addition of particulate organic matter and nutrients. This study clearly indicates that agricultural runoff can severely impact stream biota. However, this impact can be greatly mitigated by currently recommended erosion control practices.

  18. Forest-biological erosion control on coal-mine spoil banks in Bulgaria

    International Nuclear Information System (INIS)

    Haigh, M.J.; Gentcheva-Kostadinova, S.; Zheleva, E.

    1995-01-01

    The forest fallowing of coal-mine spoils helps re-establish the processes of natural, self-sustaining, soil formation. Environmental monitoring in Bulgaria demonstrates that forestation can moderate soil pH (from ph> 3.0 to pH 1.3 g/cm 3 in the 0-5 cm layer) in the case of coal briquette spoils at Pernik, near Sofia. Ground losses from forested, 16-17 degree slope, coal briquette-spoils at Pernik are a quarter of those from an entirely unvegetated section of the same embankment (48.5 vs 12. 1 mm in the period 1988-1994) despite the absence of ground cover beneath the trees. On lignite spoil banks, at Maritsa-Iztok, central Bulgaria, forestation increases the organic content of the soil to greater depths than revegetation with grass, and to a greater degree than conventional agricultural cultivation. On Pinus nigra forested crest sites at Pernik, and in Robinia pseudacacia forested groves on the lignite minespoil banks at Maritsa-Iztok, slopes showed ground advance rather than ground retreat. Slopes protected by mechanical means alone did not allow soil growth and, where the structure broke down, they suffered as much erosion as untreated sites. In sum, the forest fallowing of surface coal-mine disturbed land accelerates organic matter accumulation in the soil, helps improve soil structure, reduces erosion, and may transform soil loss into soil gain, even on steeply sloping sites. 17 refs., 3 figs., 1 tab

  19. Runoff erosion

    OpenAIRE

    Evelpidou, Niki (Ed.); Cordier, Stephane (Ed.); Merino, Agustin (Ed.); Figueiredo, Tomás de (Ed.); Centeri, Csaba (Ed.)

    2013-01-01

    Table of Contents PART I – THEORY OF RUNOFF EROSION CHAPTER 1 - RUNOFF EROSION – THE MECHANISMS CHAPTER 2 - LARGE SCALE APPROACHES OF RUNOFF EROSION CHAPTER 3 - MEASURING PRESENT RUNOFF EROSION CHAPTER 4 - MODELLING RUNOFF EROSION CHAPTER 5 - RUNOFF EROSION AND HUMAN SOCIETIES: THE INFLUENCE OF LAND USE AND MANAGEMENT PRACTICES ON SOIL EROSION PART II - CASE STUDIES CASE STUDIES – INTRODUCTION: RUNOFF EROSION IN MEDITERRANEAN AREA CASE STUDY 1: Soil Erosion Risk...

  20. Biologically-initiated rock crust on sandstone: Mechanical and hydraulic properties and resistance to erosion

    Czech Academy of Sciences Publication Activity Database

    Slavík, M.; Bruthans, J.; Filippi, Michal; Schweigstillová, Jana; Falteisek, L.; Řihošek, J.

    2017-01-01

    Roč. 278, FEB 1 (2017), s. 298-313 ISSN 0169-555X R&D Projects: GA ČR GA13-28040S; GA ČR(CZ) GA16-19459S Institutional support: RVO:67985831 ; RVO:67985891 Keywords : biofilm * biocrust * biologically-initiated rock crust * sandstone protection * case hardening Subject RIV: DB - Geology ; Mineralogy; DB - Geology ; Mineralogy (USMH-B) OBOR OECD: Geology; Geology (USMH-B) Impact factor: 2.958, year: 2016

  1. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  2. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  3. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  4. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  5. Saliva and dental erosion

    Directory of Open Access Journals (Sweden)

    Marília Afonso Rabelo Buzalaf

    2012-10-01

    Full Text Available Dental erosion is a multifactorial condition. The consideration of chemical, biological and behavioral factors is fundamental for its prevention and therapy. Among the biological factors, saliva is one of the most important parameters in the protection against erosive wear. Objective: This review discusses the role of salivary factors on the development of dental erosion. Material and Methods: A search was undertaken on MeDLINe website for papers from 1969 to 2010. The keywords used in the research were "saliva", "acquired pellicle", "salivary flow", "salivary buffering capacity" and "dental erosion". Inclusion of studies, data extraction and quality assessment were undertaken independently and in duplicate by two members of the review team. Disagreements were solved by discussion and consensus or by a third party. Results: Several characteristics and properties of saliva play an important role in dental erosion. Salivary clearance gradually eliminates the acids through swallowing and saliva presents buffering capacity causing neutralization and buffering of dietary acids. Salivary flow allows dilution of the acids. In addition, saliva is supersaturated with respect to tooth mineral, providing calcium, phosphate and fluoride necessary for remineralization after an erosive challenge. Furthermore, many proteins present in saliva and acquired pellicle play an important role in dental erosion. Conclusions: Saliva is the most important biological factor affecting the progression of dental erosion. Knowledge of its components and properties involved in this protective role can drive the development of preventive measures targeting to enhance its known beneficial effects.

  6. Saliva and dental erosion.

    Science.gov (United States)

    Buzalaf, Marília Afonso Rabelo; Hannas, Angélicas Reis; Kato, Melissa Thiemi

    2012-01-01

    Dental erosion is a multifactorial condition. The consideration of chemical, biological and behavioral factors is fundamental for its prevention and therapy. Among the biological factors, saliva is one of the most important parameters in the protection against erosive wear. This review discusses the role of salivary factors on the development of dental erosion. A search was undertaken on MeDLINe website for papers from 1969 to 2010. The keywords used in the research were "saliva", "acquired pellicle", "salivary flow", "salivary buffering capacity" and "dental erosion". Inclusion of studies, data extraction and quality assessment were undertaken independently and in duplicate by two members of the review team. Disagreements were solved by discussion and consensus or by a third party. Several characteristics and properties of saliva play an important role in dental erosion. Salivary clearance gradually eliminates the acids through swallowing and saliva presents buffering capacity causing neutralization and buffering of dietary acids. Salivary flow allows dilution of the acids. In addition, saliva is supersaturated with respect to tooth mineral, providing calcium, phosphate and fluoride necessary for remineralization after an erosive challenge. Furthermore, many proteins present in saliva and acquired pellicle play an important role in dental erosion. Saliva is the most important biological factor affecting the progression of dental erosion. Knowledge of its components and properties involved in this protective role can drive the development of preventive measures targeting to enhance its known beneficial effects.

  7. Acoustic measurements of soil-pipeflow and internal erosion

    Science.gov (United States)

    Internal erosion of soil pipes can lead to embankment failures, landslides, and gully erosion. Therefore, non-intrusive methods are needed to detect and monitor soil pipeflow and the resulting internal erosion. This paper presents a laboratory study using both active and passive acoustic techniques ...

  8. Erosion and erosion-corrosion

    International Nuclear Information System (INIS)

    Isomoto, Yoshinori

    2008-01-01

    It is very difficult to interpret the technical term of erosion-corrosion' which is sometimes encountered in piping systems of power plants, because of complicated mechanisms and several confusing definitions of erosion-corrosion phenomena. 'FAC (flow accelerated corrosion)' is recently introduced as wall thinning of materials in power plant systems, as a representative of 'erosion-corrosion'. FAC is, however, not necessarily well understood and compared with erosion-corrosion. This paper describes firstly the origin, definition and fundamental understandings of erosion and erosion-corrosion, in order to reconsider and reconfirm the phenomena of erosion, erosion-corrosion and FAC. Next, typical mapping of erosion, corrosion, erosion-corrosion and FAC are introduced in flow velocity and environmental corrosiveness axes. The concept of damage rate in erosion-corrosion is finally discussed, connecting dissolution rate, mass transfer of metal ions in a metal oxide film and film growth. (author)

  9. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  10. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  11. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  12. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  13. Recovery of hillside soils, degraded by the erosion, by means of the use of biological-forest procedures

    International Nuclear Information System (INIS)

    Leon Moreno, Clara Esperanza

    1998-01-01

    Soil degradation is present in some areas of the Guanenta Comunero province in Andean Region of Colombia. Different responsible factors are identified: inadequate soil management (tilling in slope direction), machinery overuse and monoculture without natural cover. This carried out erosion that is severe in 40% of the affected area with furrows, gullies and barrens occurrence. For prevent the erosion were built wood barriers, established whit gramineous, leguminous and trees. The gramineous, Brachiaria decumbens was established using seeds a live material, which produced 1860, and 1631 kg/ha of dry material respectively. Arachis pintoi established like protein bank and in association reached a soil coverage of 87 % and improved disposability of Ca, Mg, K and P. farmers can easily build wooden barriers and them can retain sediments un amounts of 4.72, 23.43 and 1.50 m 3 in areas of 207,494 and 129 m 2 respectively

  14. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    Science.gov (United States)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  15. Erosive gastritis

    International Nuclear Information System (INIS)

    Mohammed, S.H.; Conrad, C.; Kjoergaad, J.

    1982-01-01

    Erosive gastritis is a well-defined radiologic and endoscopic entity. It is one of the common causes of upper gastrointestinal bleeding, yet it is seldom diagnosed and often confused with a number of other diseases. This communication re-emphasizes the characteristic endoscopic and radiologic features of erosive gastritis and its differential diagnosis. Two representative cases are reported. (orig.)

  16. Erosive gastritis

    Energy Technology Data Exchange (ETDEWEB)

    Mohammed, S.H.; Conrad, C.; Kjoergaad, J.

    1982-08-01

    Erosive gastritis is a well-defined radiologic and endoscopic entity. It is one of the common causes of upper gastrointestinal bleeding, yet it is seldom diagnosed and often confused with a number of other diseases. This communication re-emphasizes the characteristic endoscopic and radiologic features of erosive gastritis and its differential diagnosis. Two representative cases are reported.

  17. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  18. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  19. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  20. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  1. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  2. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  3. Erhversbetinget erosion?

    DEFF Research Database (Denmark)

    Dige, Irene; Gjørup, Hans; Nyvad, Bente

    2012-01-01

    Baggrund – I forbindelse med dental erosion er en grundig udredning af patienten vigtig, således at årsagen til erosionernes opståen findes, og der kan iværksættes adækvat forebyggende indsats. En sådan udredning er ikke mindst vigtig, når arbejdsmiljøet mistænkes. Patienttilfælde – En 30-årig...... arbejdsskade, men ikke anerkendt, da erosioner ikke er optaget på Arbejdsskadestyrelsens liste over erhvervssygdomme. En systematisk registrering af lignende tilfælde kunne imidlertid på sigt ændre retspraksis for fremtidige patienter med arbejdsbetinget erosion....... patient, der arbejder som pladesmed, blev henvist til Landsdels- og Videnscenter, Århus Sygehus, med henblik på udredning af patientens kraftige slid. Patienten udviste ikke-alderssvarende tandslid af emalje og dentin svarende til erosion forårsaget af syredampe i arbejdsmiljøet, muligvis forstærket af...

  4. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  5. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  6. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  7. Ultrasound-detected bone erosion is a relapse risk factor after discontinuation of biologic disease-modifying antirheumatic drugs in patients with rheumatoid arthritis whose ultrasound power Doppler synovitis activity and clinical disease activity are well controlled.

    Science.gov (United States)

    Kawashiri, Shin-Ya; Fujikawa, Keita; Nishino, Ayako; Okada, Akitomo; Aramaki, Toshiyuki; Shimizu, Toshimasa; Umeda, Masataka; Fukui, Shoichi; Suzuki, Takahisa; Koga, Tomohiro; Iwamoto, Naoki; Ichinose, Kunihiro; Tamai, Mami; Mizokami, Akinari; Nakamura, Hideki; Origuchi, Tomoki; Ueki, Yukitaka; Aoyagi, Kiyoshi; Maeda, Takahiro; Kawakami, Atsushi

    2017-05-25

    In the present study, we explored the risk factors for relapse after discontinuation of biologic disease-modifying antirheumatic drug (bDMARD) therapy in patients with rheumatoid arthritis (RA) whose ultrasound power Doppler (PD) synovitis activity and clinical disease activity were well controlled. In this observational study in clinical practice, the inclusion criteria were based on ultrasound disease activity and clinical disease activity, set as low or remission (Disease Activity Score in 28 joints based on erythrocyte sedimentation rate Ultrasound was performed in 22 joints of bilateral hands at discontinuation for evaluating synovitis severity and presence of bone erosion. Patients with a maximum PD score ≤1 in each joint were enrolled. Forty patients with RA were consecutively recruited (November 2010-March 2015) and discontinued bDMARD therapy. Variables at the initiation and discontinuation of bDMARD therapy that were predictive of relapse during the 12 months after discontinuation were assessed. The median patient age was 54.5 years, and the median disease duration was 3.5 years. Nineteen (47.5%) patients relapsed during the 12 months after the discontinuation of bDMARD therapy. Logistic regression analysis revealed that only the presence of bone erosion detected by ultrasound at discontinuation was predictive of relapse (OR 8.35, 95% CI 1.78-53.2, p = 0.006). No clinical characteristics or serologic biomarkers were significantly different between the relapse and nonrelapse patients. The ultrasound synovitis scores did not differ significantly between the groups. Our findings are the first evidence that ultrasound bone erosion may be a relapse risk factor after the discontinuation of bDMARD therapy in patients with RA whose PD synovitis activity and clinical disease activity are well controlled.

  8. Rainfall Erosivity in Europe

    DEFF Research Database (Denmark)

    Panagos, Panos; Ballabio, Cristiano; Borrelli, Pasquale

    2015-01-01

    Rainfall is one the main drivers of soil erosion. The erosive force of rainfall is expressed as rainfall erosivity. Rainfall erosivity considers the rainfall amount and intensity, and is most commonly expressed as the Rfactor in the USLE model and its revised version, RUSLE. At national...... and continental levels, the scarce availability of data obliges soil erosion modellers to estimate this factor based on rainfall data with only low temporal resolution (daily, monthly, annual averages). The purpose of this study is to assess rainfall erosivity in Europe in the form of the RUSLE R-factor, based...

  9. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  10. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  11. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  12. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  13. Mapping erosion from space

    NARCIS (Netherlands)

    Vrieling, A.

    2007-01-01

    Soil erosion by water is the most important land degradation problem worldwide. Spatial information on erosion is required for defining effective soil and water conservation strategies. Satellite remote sensing can provide relevant input to regional erosion assessment. This thesis comprises a review

  14. Erosion-corrosion

    International Nuclear Information System (INIS)

    Aghili, B.

    1999-05-01

    A literature study on erosion-corrosion of pipings in the nuclear industry was performed. Occurred incidents are reviewed, and the mechanism driving the erosion-corrosion is described. Factors that influence the effect in negative or positive direction are treated, as well as programs for control and inspection. Finally, examples of failures from databases on erosion-corrosion are given in an attachment

  15. Assessing storm erosion hazards

    NARCIS (Netherlands)

    Ranasinghe, Ranasinghe W M R J B; Callaghan, D.; Ciavola, Paolo; Coco, Giovanni

    2017-01-01

    The storm erosion hazard on coasts is usually expressed as an erosion volume and/or associated episodic coastline retreat. The accurate assessment of present-day and future storm erosion volumes is a key task for coastal zone managers, planners and engineers. There are four main approaches that can

  16. Managing dental erosion.

    Science.gov (United States)

    Curtis, Donald A; Jayanetti, Jay; Chu, Raymond; Staninec, Michal

    2012-01-01

    The clinical signs of dental erosion are initially subtle, yet often progress because the patient remains asymptomatic, unaware and uninformed. Erosion typically works synergistically with abrasion and attrition to cause loss of tooth structure, making diagnosis and management complex. The purpose of this article is to outline clinical examples of patients with dental erosion that highlight the strategy of early identification, patient education and conservative restorative management. Dental erosion is defined as the pathologic chronic loss of dental hard tissues as a result of the chemical influence of exogenous or endogenous acids without bacterial involvement. Like caries or periodontal disease, erosion has a multifactorial etiology and requires a thorough history and examination for diagnosis. It also requires patient understanding and compliance for improved outcomes. Erosion can affect the loss of tooth structure in isolation of other cofactors, but most often works in synergy with abrasion and attrition in the loss of tooth structure (Table 1). Although erosion is thought to be an underlying etiology of dentin sensitivity, erosion and loss of tooth structure often occurs with few symptoms. The purpose of this article is threefold: first, to outline existing barriers that may limit early management of dental erosion. Second, to review the clinical assessment required to establish a diagnosis of erosion. And third, to outline clinical examples that review options to restore lost tooth structure. The authors have included illustrations they hope will be used to improve patient understanding and motivation in the early management of dental erosion.

  17. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  18. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  19. Marshes on the Move: Testing effects of seawater intrusion on vegetation communities of the salt marsh-upland ecotone

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress to...

  20. Protection from erosion following wildfire

    Science.gov (United States)

    Peter R. Robichaud; William J. Elliot

    2006-01-01

    Erosion in the first year after a wildfire can be up to three orders of magnitude greater than the erosion from undisturbed forests. To mitigate potential postfire erosion, various erosion control treatments are applied on highly erodible areas with downstream resources in need of protection. Because postfire erosion rates generally decline by an order of magnitude for...

  1. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  2. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  3. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  4. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Scales and erosion

    Science.gov (United States)

    There is a need to develop scale explicit understanding of erosion to overcome existing conceptual and methodological flaws in our modelling methods currently applied to understand the process of erosion, transport and deposition at the catchment scale. These models need to be based on a sound under...

  6. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  7. Effectiveness of the GAEC cross compliance standards Rational management of set aside, Grass strips to control soil erosion and Vegetation buffers along watercourses on surface animal diversity and biological quality of soil

    Directory of Open Access Journals (Sweden)

    Marta Biaggini

    2011-08-01

    Full Text Available Landscape simplification and loss of natural and semi-natural habitats are the major causes of biodiversity decrease in agricultural landscapes. In order to mitigate the effects of intensive agricultural management the Ministry of Agricultural, Food and Forestry Policies in Italy has included the agronomic measures Rational management of set aside, Grass strips to control soil erosion and Vegetation buffers along watercourses in the decree on cross compliance. In this paper we review the results of a field research performed in Central Italy. The aim of the study was to evaluate the efficacy of the above mentioned GAEC standards for animal diversity enhancement. Using different animal groups as indicators, superficial Arthropod fauna and Herpetofauna, we found striking differences in the biodiversity levels of areas characterized by the application or by the lack of GAEC standards, with the latter being characterized by a significatively impoverished fauna. In particular, the set aside area and the buffer of riparian vegetation resulted of primary importance to allow higher biodiversity levels. Also the analysis of the biological quality of the soil, as assessed through the QBS-ar index based on edaphic micro-Arthropod fauna, indicated a higher quality of semi-natural habitats with respect to arable lands.

  8. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  9. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  10. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  11. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  12. Measurement of erosion: Is it possible?

    NARCIS (Netherlands)

    Stroosnijder, L.

    2005-01-01

    Reasons for erosion measurements are: (1) to determine the environmental impact of erosion and conservation practices, (2) scientific erosion research; (3) development and evaluation of erosion control technology; (4) development of erosion prediction technology and (5) allocation of conservation

  13. Numerical modelling of concentrated leak erosion during Hole Erosion Tests

    OpenAIRE

    Mercier, F.; Bonelli, S.; Golay, F.; Anselmet, F.; Philippe, P.; Borghi, R.

    2015-01-01

    This study focuses on the numerical modelling of concentrated leak erosion of a cohesive soil by a turbulent flow in axisymmetrical geometry, with application to the Hole Erosion Test (HET). The numerical model is based on adaptive remeshing of the water/soil interface to ensure accurate description of the mechanical phenomena occurring near the soil/water interface. The erosion law governing the interface motion is based on two erosion parameters: the critical shear stress and the erosion co...

  14. Rainfall erosivity in Europe.

    Science.gov (United States)

    Panagos, Panos; Ballabio, Cristiano; Borrelli, Pasquale; Meusburger, Katrin; Klik, Andreas; Rousseva, Svetla; Tadić, Melita Perčec; Michaelides, Silas; Hrabalíková, Michaela; Olsen, Preben; Aalto, Juha; Lakatos, Mónika; Rymszewicz, Anna; Dumitrescu, Alexandru; Beguería, Santiago; Alewell, Christine

    2015-04-01

    Rainfall is one the main drivers of soil erosion. The erosive force of rainfall is expressed as rainfall erosivity. Rainfall erosivity considers the rainfall amount and intensity, and is most commonly expressed as the R-factor in the USLE model and its revised version, RUSLE. At national and continental levels, the scarce availability of data obliges soil erosion modellers to estimate this factor based on rainfall data with only low temporal resolution (daily, monthly, annual averages). The purpose of this study is to assess rainfall erosivity in Europe in the form of the RUSLE R-factor, based on the best available datasets. Data have been collected from 1541 precipitation stations in all European Union (EU) Member States and Switzerland, with temporal resolutions of 5 to 60 min. The R-factor values calculated from precipitation data of different temporal resolutions were normalised to R-factor values with temporal resolutions of 30 min using linear regression functions. Precipitation time series ranged from a minimum of 5 years to a maximum of 40 years. The average time series per precipitation station is around 17.1 years, the most datasets including the first decade of the 21st century. Gaussian Process Regression (GPR) has been used to interpolate the R-factor station values to a European rainfall erosivity map at 1 km resolution. The covariates used for the R-factor interpolation were climatic data (total precipitation, seasonal precipitation, precipitation of driest/wettest months, average temperature), elevation and latitude/longitude. The mean R-factor for the EU plus Switzerland is 722 MJ mm ha(-1) h(-1) yr(-1), with the highest values (>1000 MJ mm ha(-1) h(-1) yr(-1)) in the Mediterranean and alpine regions and the lowest (<500 MJ mm ha(-1) h(-1) yr(-1)) in the Nordic countries. The erosivity density (erosivity normalised to annual precipitation amounts) was also the highest in Mediterranean regions which implies high risk for erosive events and floods

  15. Immunohistochemical Study of p53 Expression in Patients with Erosive and Non-Erosive Oral Lichen Planus

    Science.gov (United States)

    Shiva, Atena; Zamanian, Ali; Arab, Shahin; Boloki, Mahsa

    2018-01-01

    Statement of the Problem: Oral lichen planus is a common mucocutaneous lesion with a chronic inflammatory process mediated by immune factors while a few cases of the disease become malignant. Purpose: This study aimed to determine the frequency of p53 marker as a tumor suppressor in patients with erosive and non-erosive oral lichen planus (OLP) by using immunohistochemical methods. Materials and Method: This descriptive cross-sectional study investigated the p53 expression in 16 erosive OLP, 16 non-erosive OLP samples, and 8 samples of normal oral mucosa through immunohistochemistry. The percentage of stained cells in basal and suprabasal layers, and inflammatory infiltrate were graded according to the degree of staining; if 0%, 50% of the cells were stained, they were considered as (-), (+), (++), (+++) and (++++), respectively. The obtained data was statistically analyzed and compared by using Chi square and Fisher’s exact test. Results: The mean percentage of p53 positive cells in erosive OLP (34.5±14.2) was considerably higher than that in non-erosive OLP (23.8±10.4) and normal mucosa (17.5±17). There was a significant difference among the three groups of erosive, non-erosive and control in terms of staining intensity. No significant difference existed between the patients’ age and sex in the two OLP groups. Conclusion: The increased incidence of p53 from normal mucosa to erosive OLP indicated the difference between biological behavior of erosive and non-erosive OLP. It can be claimed that the erosive OLP has great premalignant potential compared with the non-erosive one.

  16. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  17. Coastal Erosion Control Methods

    Science.gov (United States)

    Greene, V.

    2016-12-01

    Coastal erosion is bad because the ecosystem there will be washed away and the animals could drown or be displaced and have to adapt to a new ecosystem that they are not prepared for. I'm interested in this problem because if there aren't beaches when I grow up I won't be able to do the things I would really like to do. I would like to be a marine biologist. Secondly, I don't want to see beach houses washed away. I would like to see people live in harmony with their environment. So, to study ways in which to preserve beaches I will make and use models that test different erosion controls. Two different ideas for erosion control I tested are using seaweed or a rock berm. I think the rock berm will work better than the model of seaweed because the seaweed is under water and the waves can carry the sand over the seaweed, and the rock berm will work better because the rocks will help break the waves up before they reach the shore and the waves can not carry the sand over the rocks that are above the water. To investigate this I got a container to use to model the Gulf of Mexico coastline. I performed several test runs using sand and water in the container to mimic the beach and waves from the Gulf of Mexico hitting the shoreline. I did three trials for the control (no erosion control), seaweed and a rock berm. Rock berms are a border of a raised area of rock. The model for seaweed that I used was plastic shopping bags cut into strips and glued to the bottom of my container to mimic seaweed. My results were that the control had the most erosion which ranged from 2.75 - 3 inches over 3 trials. The seaweed was a little better than the control but was very variable and ranged from 1.5 - 3 inches over 3 trials. The rock berm worked the best out of all at controlling erosion with erosion ranging from 1.5 - 2 inches. My hypothesis was correct because the rock berm did best to control erosion compared to the control which had no erosion control and the model with seaweed.

  18. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  19. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  20. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  1. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  2. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  3. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  4. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  5. Petrology, composition, and age of intrusive rocks associated with the Quartz Hill molybdenite deposit, southeastern Alaska.

    Science.gov (United States)

    Hudson, T.; Smith, James G.; Elliott, R.L.

    1979-01-01

    A large porphyry molybdenum deposit (Quartz Hill deposit) was recently discovered in the heart of the Coast Range batholithic complex about 70 km E of Ketchikan, SE Alaska. Intrusive rocks associated with the mineral deposit form two composite epizonal to hypabyssal stocks and many dikes in country rocks. All observed metallization and alteration is within the Quartz Hill stock. Molybdenite forms fracture coatings and occurs in veins with quartz. Alteration is widespread and includes development of secondary quartz, pyrite, K-feldspar, biotite, white mica, chlorite, and zeolite. Field relations indicate that the stocks were emplaced after regional uplift and erosion of the Coast Range batholithic complex, and K-Ar data show that intrusion and alteration took place in late Oligocene time, about 27 to 30 Ma ago. Data from the Ketchikan quadrangle indicate that porphyry molybdenum metallization in the Coast Range batholithic complex is associated with regionally extensive but spotty, middle Tertiary or younger, felsic magmatism. -from Authors

  6. Erosive Lichen Planus.

    Science.gov (United States)

    Mauskar, Melissa

    2017-09-01

    Lichen planus is an inflammatory mucocutaneous condition with a myriad of clinical manifestations. There are 3 forms of lichen planus that effect the vulva: papulosquamous, hypertrophic, and erosive. Erosive lichen planus can progress to vulvar scaring, vaginal stenosis, and squamous cell carcinoma; these long-term sequelae cause sexual distress, depression, and decreased quality of life for patients. Diagnosis is often delayed because of patient embarrassment or clinician misdiagnosis. Early recognition and treatment is essential to decreasing the morbidity of this condition. Multimodal treatment, along with a multidisciplinary approach, will improve outcomes and further clinical advances in studying this condition. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Control of erosive tooth wear: possibilities and rationale

    Directory of Open Access Journals (Sweden)

    Mônica Campos Serra

    2009-06-01

    Full Text Available Dental erosion is a type of wear caused by non bacterial acids or chelation. There is evidence of a significant increase in the prevalence of dental wear in the deciduous and permanent teeth as a consequence of the frequent intake of acidic foods and drinks, or due to gastric acid which may reach the oral cavity following reflux or vomiting episodes. The presence of acids is a prerequisite for dental erosion, but the erosive wear is complex and depends on the interaction of biological, chemical and behavioral factors. Even though erosion may be defined or described as an isolated process, in clinical situations other wear phenomena are expected to occur concomitantly, such as abrasive wear (which occurs, e.g, due to tooth brushing or mastication. In order to control dental loss due to erosive wear it is crucial to take into account its multifactorial nature, which predisposes some individuals to the condition.

  8. Mesh erosion after abdominal sacrocolpopexy.

    Science.gov (United States)

    Kohli, N; Walsh, P M; Roat, T W; Karram, M M

    1998-12-01

    To report our experience with erosion of permanent suture or mesh material after abdominal sacrocolpopexy. A retrospective chart review was performed to identify patients who underwent sacrocolpopexy by the same surgeon over 8 years. Demographic data, operative notes, hospital records, and office charts were reviewed after sacrocolpopexy. Patients with erosion of either suture or mesh were treated initially with conservative therapy followed by surgical intervention as required. Fifty-seven patients underwent sacrocolpopexy using synthetic mesh during the study period. The mean (range) postoperative follow-up was 19.9 (1.3-50) months. Seven patients (12%) had erosions after abdominal sacrocolpopexy with two suture erosions and five mesh erosions. Patients with suture erosion were asymptomatic compared with patients with mesh erosion, who presented with vaginal bleeding or discharge. The mean (+/-standard deviation) time to erosion was 14.0+/-7.7 (range 4-24) months. Both patients with suture erosion were treated conservatively with estrogen cream. All five patients with mesh erosion required transvaginal removal of the mesh. Mesh erosion can follow abdominal sacrocolpopexy over a long time, and usually presents as vaginal bleeding or discharge. Although patients with suture erosion can be managed successfully with conservative treatment, patients with mesh erosion require surgical intervention. Transvaginal removal of the mesh with vaginal advancement appears to be an effective treatment in patients failing conservative management.

  9. Erosion of dust aggregates

    NARCIS (Netherlands)

    Seizinger, A.; Krijt, S.; Kley, W.

    2013-01-01

    Aims: The aim of this work is to gain a deeper insight into how much different aggregate types are affected by erosion. Especially, it is important to study the influence of the velocity of the impacting projectiles. We also want to provide models for dust growth in protoplanetary disks with simple

  10. Hydrology and soil erosion

    Science.gov (United States)

    Leonard J. Lane; Mary R. Kidwell

    2003-01-01

    We review research on surface water hydrology and soil erosion at the Santa Rita Experimental Range (SRER). Almost all of the research was associated with eight small experimental watersheds established from 1974 to 1975 and operated until the present. Analysis of climatic features of the SRER supports extending research findings from the SRER to broad areas of the...

  11. Bentonite erosion. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Birgersson, Martin; Boergesson, Lennart; Hedstroem, Magnus; Karnland, Ola; Nilsson, Ulf (Clay Technology AB, Lund (Sweden))

    2009-12-15

    Low saline water may reach KBS-3 repository depth, e.g. during periods of glaciation. Under such aqueous conditions, the montmorillonite part of the bentonite buffer might transform into a sol and thereby be transported away with flowing water in fractures. The primary aim with this report is to improve the understanding of the basic principles for this possible montmorillonite particle release. The report includes experimental and theoretical work performed at Clay Technology. Natural bentonite and ion-exchanged purified montmorillonite from three different geographical origins, Wyoming (U.S.), Milos (Greece) and Kutch (India) have been studied. Experimental and/or theoretical investigations have been performed with respect to: - Free swelling ability; - Rheological properties; - Rate of bentonite loss into fractures; - Filtering; - Ion exchange; - Sol formation ability; - Ion diffusion; - Mass loss due to erosion. The performed erosion experiments show that erosion does not occur in a mixed calcium/sodium montmorillonite with at least 20% calcium in exchange positions, when the external solution contains above 4 mM charge equivalents. This result is in agreement with the presented conceptual view of sol formation and measured equilibrium properties in mixed calcium/sodium montmorillonite. The findings imply that the buffer will be stable for non-glacial conditions. However, erosion due to sol formation cannot be ruled out for glacial conditions.

  12. Erosion scenarios for Wellenberg

    International Nuclear Information System (INIS)

    Klemenz, W.

    1993-09-01

    The proposed Wellenberg site for a radioactive waste repository is located between Altzellen in the Engelberger valley and the Oberrickenbach valley, in a thick Valanginian marl series. The marl is generally overlaid with unconsolidated rocks but reaches to the surface in some places. In contrast to the situation in the Oberbauenstock region this marl complex is not protected by an overlying erosion resistant series and exhibits a marked relief. The question therefore arises with respect to the Wellenberg site, to what extent will the marl (i.e. the repository host rock formation) be removed by erosion processes during the 100,000 years interval under consideration and what overburden will remain at the end of this period. This report presents the results of an investigation of the longterm behaviour of the proposed site in respect of those processes of erosion and deposition which can lead to changes in the terrain surface and its location relative to the repository. A wide range of possible scenarios encompassing different developments of climatic conditions during the 100,000 year period of interest, was investigated. In addition to the continuation of the present climate and the occurrence of a new ice age on the scale of the Wuerm glaciation the consequences of altered climatic conditions on erosion removal of the repository overburden were considered. Within the 100,000 year period of interest none of the scenarios considered leads to the exposure of the repository. (author) figs., tabs, refs

  13. Dune erosion above revetments

    NARCIS (Netherlands)

    Van Thiel de Vries, J.S.M.

    2012-01-01

    In a situation with a narrow dune, the dune base can be protected with a revetment to reduce dune erosion during extreme events. To quantify the effects of a revetment on storm impact, the functionality of the numerical storm impact model XBeach (Roelvink et al., 2009) is extended to account for the

  14. Bentonite erosion. Final report

    International Nuclear Information System (INIS)

    Birgersson, Martin; Boergesson, Lennart; Hedstroem, Magnus; Karnland, Ola; Nilsson, Ulf

    2009-12-01

    Low saline water may reach KBS-3 repository depth, e.g. during periods of glaciation. Under such aqueous conditions, the montmorillonite part of the bentonite buffer might transform into a sol and thereby be transported away with flowing water in fractures. The primary aim with this report is to improve the understanding of the basic principles for this possible montmorillonite particle release. The report includes experimental and theoretical work performed at Clay Technology. Natural bentonite and ion-exchanged purified montmorillonite from three different geographical origins, Wyoming (U.S.), Milos (Greece) and Kutch (India) have been studied. Experimental and/or theoretical investigations have been performed with respect to: - Free swelling ability; - Rheological properties; - Rate of bentonite loss into fractures; - Filtering; - Ion exchange; - Sol formation ability; - Ion diffusion; - Mass loss due to erosion. The performed erosion experiments show that erosion does not occur in a mixed calcium/sodium montmorillonite with at least 20% calcium in exchange positions, when the external solution contains above 4 mM charge equivalents. This result is in agreement with the presented conceptual view of sol formation and measured equilibrium properties in mixed calcium/sodium montmorillonite. The findings imply that the buffer will be stable for non-glacial conditions. However, erosion due to sol formation cannot be ruled out for glacial conditions.

  15. An assessment of the radiological impact of human intrusion at the UK Low Level Waste Repository (LLWR) - 59356

    International Nuclear Information System (INIS)

    Hicks, Tim; Baldwin, Tamara; Cummings, Richard; Sumerling, Trevor

    2012-01-01

    The UK Low Level Waste Repository Ltd submitted an Environmental Safety Case for the disposal of low-level waste (LLW) to the Environment Agency on the 1 May 2011. The Environmental Safety Case (ESC) presents a complete case for the environmental safety of the Low Level Waste Repository (LLWR) both during operations and in the long term (Cummings et al, in these proceedings). This includes an assessment of the long-term radiological safety of the facility, including an assessment of the potential consequences of human intrusion at the site. The human intrusion assessment is based on a cautiously realistic approach in defining intrusion cases and parameter values. A range of possible human intrusion events was considered based on present-day technologies and credible future uses of the site. This process resulted in the identification of geotechnical investigations, a housing development and a smallholding as requiring quantitative assessment. A particular feature of the site is that, because of its proximity to the coast and in view of expected global sea-level rise, it is vulnerable to coastal erosion. During such erosion, wastes and engineered barrier materials will be exposed, and could become targets for investigation or recovery. Therefore, human intrusion events have been included that are associated with such activities. A radiological assessment model has been developed to analyse the impacts of potential human intrusion at the site. A key feature of the model is the representation of the spatial layout of the disposal site, including the engineered cap design and the large-scale spatial heterogeneity of radionuclide concentrations within the repository. The model has been used to calculate the radiation dose to intruders and to others following intrusion at different times and at different locations across the site, for the each of the selected intrusion events, considering all relevant exposure modes. Potential doses due to radon and its daughters in

  16. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  17. Categorization of erosion control matting.

    Science.gov (United States)

    2012-05-29

    Erosion control is a critical aspect of any Georgia Department of Transportation (GDOT) : construction project, with the extreme negative impacts of high sediment loads in natural : waterways having been well documented. A variety of erosion control ...

  18. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  19. Erosion of pelvicol used in sacrocolpopexy.

    Science.gov (United States)

    Mukati, Marium S; Shobeiri, S Abbas

    2013-01-01

    Biologic graft materials are used more frequently in pelvic reconstructive surgeries. We describe here the complete process of removal of such a biologic graft in the office. We report a case of a 69-year-old woman with pig dermal graft erosion 1 year after placement. The patient presented with complaints of vaginal discharge. Upon examination, the graft material was seen eroding through the vaginal apex. The pig tissue was removed whole and intact in the office without complications. Transvaginal removal of pig tissue in the office relieved the patient's symptoms.

  20. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  1. Erosion control works and the intensity of soil erosion in the upper part of the river Toplica drainage basin

    International Nuclear Information System (INIS)

    Kostadinov, S; Dragovic, N; Zlatic, M; Todosijevic, M

    2008-01-01

    Aiming at the protection of the future storage 'Selova' against erosion and sediment, and also to protect the settlements and roads in the drainage basin against torrential floods, erosion control works in the upper part of the river Toplica basin, upstream of the storage 'Selova', started in 1947. The works included building-technical works (check dams) and biological works (afforestation and grassing of bare lands and other erosion risk areas). Within the period 1947-2006, the following erosion control works were executed: afforestation of bare lands on the slopes 2,257.00 ha, grassing of bare lands 1,520.00 ha, and altogether 54 dams were constructed in the river Toplica tributaries. This caused the decrease of sediment transport in the main flow of the river Toplica. This paper, based on the field research conducted in two time periods: 1988 and in the period 2004-2007, presents the state of erosion in the basin before erosion control works; type and scope of erosion control works and their effect on the intensity of erosion in the river Toplica basin upstream of the future storage 'Selova'.

  2. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  3. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  4. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  5. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  6. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  7. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  8. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  9. Rainfall erosivity map for Ghana

    International Nuclear Information System (INIS)

    Oduro Afriyie, K.

    1995-10-01

    Monthly rainfall data, spanning over a period of more than thirty years, were used to compute rainfall erosivity indices for various stations in Ghana, using the Fournier index, c, defined as p 2 /P, where p is the rainfall amount in the wettest month and P is the annual rainfall amount. Values of the rainfall erosivity indices ranged from 24.5 mm at Sunyani in the mid-portion of Ghana to 180.9 mm at Axim in the south western coastal portion. The indices were used to construct a rainfall erosivity map for the country. The map revealed that Ghana may be broadly divided into five major erosion risk zones. The middle sector of Ghana is generally in the low erosion risk zone; the northern sector is in the moderate to severe erosion risk zone, while the coastal sector is in the severe to extreme severe erosion risk zone. (author). 11 refs, 1 fig., 1 tab

  10. Soil erosion in Iran: Issues and solutions

    Science.gov (United States)

    Hamidreza Sadeghi, Seyed; Cerdà, Artemi

    2015-04-01

    Iran currently faces many soil erosion-related problems (see citations below). These issues are resulted from some inherent characteristic and anthropogenic triggering forces. Nowadays, the latter plays more important rule to accelerate the erosion with further emphasis on soil erosion-prone arid and semi arid regions of the country. This contribution attempts to identify and describe the existing main reasons behind accelerated soil erosion in Iran. Appropriate solutions viz. structural and non-structural approaches will be then advised to combat or minimise the problems. Iran can be used as a pilot research site to understand the soil erosion processes in semiarid, arid and mountainous terrain and our research will review the scientific literature and will give an insight of the soil erosion rates in the main factors of the soil erosion in Iran. Key words: Anthropogenic Erosion, Land Degradation; Sediment Management; Sediment Problems Acknowledgements The research projects GL2008-02879/BTE, LEDDRA 243857 and PREVENTING AND REMEDIATING DEGRADATION OF SOILS IN EUROPE THROUGH LAND CARE (RECARE)FP7-ENV-2013- supported this research. References Aghili Nategh, N., Hemmat, A., & Sadeghi, M. (2014). Assessing confined and semi-confined compression curves of highly calcareous remolded soil amended with farmyard manure. Journal of Terramechanics, 53, 75-82. Arekhi, S., Bolourani, A. D., Shabani, A., Fathizad, H., Ahamdy-Asbchin, S. 2012. Mapping Soil Erosion and Sediment Yield Susceptibility using RUSLE, Remote Sensing and GIS (Case study: Cham Gardalan Watershed, Iran). Advances in Environmental Biology, 6(1), 109-124. Arekhi, S., Shabani, A., Rostamizad, G. 2012. Application of the modified universal soil loss equation (MUSLE) in prediction of sediment yield (Case study: Kengir Watershed, Iran). Arabian Journal of Geosciences, 5(6), 1259-1267.Sadeghi, S. H., Moosavi, V., Karami, A., Behnia, N. 2012. Soil erosion assessment and prioritization of affecting factors at plot

  11. Instrumentation and methods evaluations for shallow land burial of waste materials: water erosion

    International Nuclear Information System (INIS)

    Hostetler, D.D.; Murphy, E.M.; Childs, S.W.

    1981-08-01

    The erosion of geologic materials by water at shallow-land hazardous waste disposal sites can compromise waste containment. Erosion of protective soil from these sites may enhance waste transport to the biosphere through water, air, and biologic pathways. The purpose of this study was to review current methods of evaluating soil erosion and to recommend methods for use at shallow-land, hazardous waste burial sites. The basic principles of erosion control are: minimize raindrop impact on the soil surface; minimize runoff quantity; minimize runoff velocity; and maximize the soil's resistance to erosion. Generally soil erosion can be controlled when these principles are successfully applied at waste disposal sites. However, these erosion control practices may jeopardize waste containment. Typical erosion control practices may enhance waste transport by increasing subsurface moisture movement and biologic uptake of hazardous wastes. A two part monitoring program is recommended for US Department of Energy (DOE) hazardous waste disposal sites. The monitoring programs and associated measurement methods are designed to provide baseline data permitting analysis and prediction of long term erosion hazards at disposal sites. These two monitoring programs are: (1) site reconnaissance and tracking; and (2) site instrumentation. Some potential waste transport problems arising from erosion control practices are identified. This report summarizes current literature regarding water erosion prediction and control

  12. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  13. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  14. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  15. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  16. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  17. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  18. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  19. Erosion-corrosion synergistics in the low erosion regime

    International Nuclear Information System (INIS)

    Corey, R.G.; Sethi, V.K.

    1986-01-01

    Many engineering alloys display good high temperature corrosion resistance. However, when they are used in corrosive environments where they are subjected to erosion also, the corrosion resistance has been adversely affected. The phenomenon known as erosion-corrosion is complex and requires detailed investigation of how the erosion and corrosion kinetics interact and compete. At the Kentucky Center for Energy Research Laboratory, an erosion-corrosion tester was used to perform erosion-oxidation tests on 2 1/4 Cr-1 Mo steel at 500-600 0 C using alumina abrasive at low velocities. The erosion-oxidation rate data and morphology of exposed surfaces are consistent with oxide chipping and fracturing being the mode of material loss

  20. Acute effects of alcohol on intrusive memory development and viewpoint dependence in spatial memory support a dual representation model.

    Science.gov (United States)

    Bisby, James A; King, John A; Brewin, Chris R; Burgess, Neil; Curran, H Valerie

    2010-08-01

    A dual representation model of intrusive memory proposes that personally experienced events give rise to two types of representation: an image-based, egocentric representation based on sensory-perceptual features; and a more abstract, allocentric representation that incorporates spatiotemporal context. The model proposes that intrusions reflect involuntary reactivation of egocentric representations in the absence of a corresponding allocentric representation. We tested the model by investigating the effect of alcohol on intrusive memories and, concurrently, on egocentric and allocentric spatial memory. With a double-blind independent group design participants were administered alcohol (.4 or .8 g/kg) or placebo. A virtual environment was used to present objects and test recognition memory from the same viewpoint as presentation (tapping egocentric memory) or a shifted viewpoint (tapping allocentric memory). Participants were also exposed to a trauma video and required to detail intrusive memories for 7 days, after which explicit memory was assessed. There was a selective impairment of shifted-view recognition after the low dose of alcohol, whereas the high dose induced a global impairment in same-view and shifted-view conditions. Alcohol showed a dose-dependent inverted "U"-shaped effect on intrusions, with only the low dose increasing the number of intrusions, replicating previous work. When same-view recognition was intact, decrements in shifted-view recognition were associated with increases in intrusions. The differential effect of alcohol on intrusive memories and on same/shifted-view recognition support a dual representation model in which intrusions might reflect an imbalance between two types of memory representation. These findings highlight important clinical implications, given alcohol's involvement in real-life trauma. Copyright 2010 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  1. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  2. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  3. A terminological matter: paragenesis, antigravitative erosion or antigravitational erosion ?

    Directory of Open Access Journals (Sweden)

    Pasini G.

    2009-07-01

    Full Text Available In the speleological literature three terms are utilized to designate the “ascending erosion”: paragenesis (= paragénésis, coined in1968, antigravitative erosion (= erosione antigravitativa, coined in 1966 and antigravitational erosion (wrong English translation ofthe Italian term erosione antigravitativa, utilized later on. The term paragenesis should be abandoned because of the priority of theterm erosione antigravitativa - on the ground of the “law of priority” – and because of its ambiguous etimology. On the other hand,the term antigravitational erosion should be forsaken in favour of the term antigravitative erosion, given the meaning that the termsgravitation and gravity have in Physics. Therefore, to designate the phenomenon of the “ascending erosion” there would be nothingleft but the term antigravitative erosion.The antigravitative erosion process and its recognizability are illustrated.Examples of caves with evident antigravitative erosion phenomena, developed in different karstifiable rocks and in several partsof the world, are given.It is recalled that the antigravitative erosion is a phenomenon well-known since 1942 and widely proven and supported, and that it isrelatively easy – in many cases - to recognize the antigravitative origin of karstic passages.It is stressed that the antigravitative erosion is an important phenomenon, exclusive of the karstic caves and unique in nature.

  4. Evolution of the bentonite barrier under glacial meltwater intrusion conditions

    Energy Technology Data Exchange (ETDEWEB)

    Schaefer, T.; Bouby, M. [Karlsruhe Institute of Technology (KIT), Eggenstein-Leopoldshafen (Germany). Inst. for Nuclear Waste Disposal (INE); Blechschmidt, I. [NAGRA National Cooperation Disposal Radioactive Waste, Wettingen (Switzerland); and others

    2015-07-01

    Recent safety assessments for repository concepts that combine a clay engineered barrier system (EBS) with a fractured rock have shown that melt water intrusion may have a direct impact on the EBS barrier function in two aspects: - Generation of colloids may degrade the engineered barrier - Colloid transport of radionuclides may reduce the efficiency of the natural barrier The studies presented here are performed in the framework of the Federal Ministry of Economic Affairs and Energy (BMWi) KIT/GRS project KOLLORADO-e, the EU collaborative project CP BELBaR (www.skb.se/belbar) and especially within the Colloid Formation and Migration (CFM) project at the Grimsel Test Site, GTS (www.grimsel.com). Key research areas are (a) the erosion of the bentonite buffer, (b) clay colloid stability and (c) colloid-radionuclide- host rock surface interactions. Concerning bentonite buffer integrity parameters like the bentonite type, Na-/Ca-exchangeable cation ratio, compaction density, role of accessory minerals, the fracture aperture size and groundwater chemistry and flow velocity are investigated in order to identify controlling factors, understand the main mechanisms of erosion from the bentonite surface and to quantify the extent of the possible erosion under these different conditions. Clay colloid stability studies are performed under different geochemical conditions. The main objective is to answer the question if colloids formed at the near/far field interface would be stable only if favourable conditions exist and therefore their relevance for radionuclide transport will be strongly dependent on the local geochemical conditions (inorganic cations Na{sup +}, Ca{sup 2+}, Mg{sup 2+}, Al{sup 3+} and organic complexing agents). Finally, the interaction between colloids and radionuclides and the host rock is intensively investigated in order to answer the question, how colloid mobility may be affected by the composition of the host rock, surface roughness and the mechanism of

  5. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  6. Erosion in extruder flow

    Science.gov (United States)

    Kaufman, Miron; Fodor, Petru S.

    A detailed analysis of the fluid flow in Tadmor's unwound channel model of the single screw extruder is performed by combining numerical and analytical methods. Using the analytical solution for the longitudinal velocity field (in the limit of zero Reynolds number) allows us to devote all the computational resources solely for a detailed numerical solution of the transversal velocity field. This high resolution 3D model of the fluid flow in a single-screw extruder allows us to identify the position and extent of Moffatt eddies that impede mixing. We further consider the erosion of particles (e.g. carbon-black agglomerates) advected by the polymeric flow. We assume a particle to be made of primary fragments bound together. In the erosion process a primary fragment breaks out of a given particle. Particles are advected by the laminar flow and they disperse because of the shear stresses imparted by the fluid. The time evolution of the numbers of particles of different sizes is described by the Bateman coupled differential equations used to model radioactivity. Using the particle size distribution we compute an entropic fragmentation index which varies from 0 for a monodisperse system to 1 for an extreme poly-disperse system.

  7. In-Situ Measurement of Hall Thruster Erosion Using a Fiber Optic Regression Probe

    Science.gov (United States)

    Polzin, Kurt; Korman, Valentin

    2009-01-01

    One potential life-limiting mechanism in a Hall thruster is the erosion of the ceramic material comprising the discharge channel. This is especially true for missions that require long thrusting periods and can be problematic for lifetime qualification, especially when attempting to qualify a thruster by analysis rather than a test lasting the full duration of the mission. In addition to lifetime, several analytical and numerical models include electrode erosion as a mechanism contributing to enhanced transport properties. However, there is still a great deal of dispute over the importance of erosion to transport in Hall thrusters. The capability to perform an in-situ measurement of discharge channel erosion is useful in addressing both the lifetime and transport concerns. An in-situ measurement would allow for real-time data regarding the erosion rates at different operating points, providing a quick method for empirically anchoring any analysis geared towards lifetime qualification. Erosion rate data over a thruster s operating envelope would also be useful in the modeling of the detailed physics inside the discharge chamber. There are many different sensors and techniques that have been employed to quantify discharge channel erosion in Hall thrusters. Snapshots of the wear pattern can be obtained at regular shutdown intervals using laser profilometry. Many non-intrusive techniques of varying complexity and sensitivity have been employed to detect the time-varying presence of erosion products in the thruster plume. These include the use quartz crystal microbalances, emission spectroscopy, laser induced flourescence, and cavity ring-down spectroscopy. While these techniques can provide a very accurate picture of the level of eroded material in the thruster plume, it is more difficult to use them to determine the location from which the material was eroded. Furthermore, none of the methods cited provide a true in-situ measure of erosion at the channel surface while

  8. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  9. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  10. Remote erosion and corrosion monitoring of subsea pipelines using acoustic telemetry and wet-mate connector technology

    Energy Technology Data Exchange (ETDEWEB)

    Painter, Howard; Barlow, Stewart [Teledyne ODI, Thousand Oaks, CA (United States); Clarke, Daniel [Teledyne Cormon, Thousand Oaks, CA (United States); Green, Dale [Teledyne Benthos, North Falmouth, MA (United States)

    2009-07-01

    This paper will present a novel approach for monitoring erosion and corrosion using proven sub sea technologies: intrusive erosion and corrosion monitoring, acoustic telemetry and wet-mateable connector technology. Intrusive metal loss based monitoring systems on sub sea pipelines are increasingly being used because of their ability to directly measure erosion and corrosion. These systems are integrated with the sub sea production control system or located close to the platform and hard-wired. However, locations remote from a sub sea control system or platform requires a dedicated communication system and long lengths of cable that can be cost prohibitive to procure and install. The system presented consists of an intrusive erosion or corrosion monitor with pressure and temperature transmitters, a retrievable electronics module with an acoustic modem, a data storage module, and a replaceable power module. Time-stamped erosion and corrosion data can be transmitted via an acoustic link to a surface platform, a vessel of opportunity or to a relaying modem. Acoustic signals can be transmitted up to 6 km from the monitoring location. The power module along with data module and acoustic modem are mounted on the erosion and corrosion module using wet-mateable connectors, allowing retrieval by remotely operated vehicles. The collected data can be used to assess the cumulative erosion and corrosion as well as use the real-time metal loss rate data to correlate with operational parameters. Benefits include optimization of corrosion inhibitor dosage rates, mitigation of damage caused by solids production, and increased flow assurance. (author)

  11. Rill erosion rates in burned forests

    Science.gov (United States)

    Joseph W. Wagenbrenner; Peter R. Robichaud

    2011-01-01

    Introduction Wildfires often produce large increases in runoff and erosion rates (e.g., Moody and Martin, 2009), and land managers need to predict the frequency and magnitude of postfire erosion to determine the needs for hazard response and possible erosion mitigation to reduce the impacts of increased erosion on public safety and valued resources. The Water Erosion...

  12. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  13. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  14. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  15. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  16. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  17. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  18. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  19. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  20. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  1. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  2. The erosive potential of lollipops

    NARCIS (Netherlands)

    Brand, H.S.; Gambon, D.L.; Paap, A.; Bulthuis, M.S.; Veerman, E.C.I.; Nieuw Amerongen, A.V.

    2009-01-01

    Aim: To determine the erosive potential of several commercially available lollipops and the protective effect of saliva. Methods: The erosive potential of lollipops was determined in vitro by measuring the pH and neutralisable acidity. Subsequently, 10 healthy volunteers tested different types of

  3. Wind erosion processes and control

    Science.gov (United States)

    Wind erosion continues to threaten the sustainability of our nations' soil, air, and water resources. To effectively apply conservation systems to prevent wind driven soil loss, an understanding of the fundamental processes of wind erosion is necessary so that land managers can better recognize the ...

  4. LAPSUS: soil erosion - landscape evolution model

    Science.gov (United States)

    van Gorp, Wouter; Temme, Arnaud; Schoorl, Jeroen

    2015-04-01

    LAPSUS is a soil erosion - landscape evolution model which is capable of simulating landscape evolution of a gridded DEM by using multiple water, mass movement and human driven processes on multiple temporal and spatial scales. It is able to deal with a variety of human landscape interventions such as landuse management and tillage and it can model their interactions with natural processes. The complex spatially explicit feedbacks the model simulates demonstrate the importance of spatial interaction of human activity and erosion deposition patterns. In addition LAPSUS can model shallow landsliding, slope collapse, creep, solifluction, biological and frost weathering, fluvial behaviour. Furthermore, an algorithm to deal with natural depressions has been added and event-based modelling with an improved infiltration description and dust deposition has been pursued. LAPSUS has been used for case studies in many parts of the world and is continuously developing and expanding. it is now available for third-party and educational use. It has a comprehensive user interface and it is accompanied by a manual and exercises. The LAPSUS model is highly suitable to quantify and understand catchment-scale erosion processes. More information and a download link is available on www.lapsusmodel.nl.

  5. Erosion--corrosion

    International Nuclear Information System (INIS)

    Vyas, B.

    1978-01-01

    The deterioration of materials by corrosion or erosion by itself presents a formidable problem and for this reason investigators have studied these two phenomena independently. In fact, there are very few systematic studies on E-C and the majority of references mention it only in passing. In most real systems, however, the two destructive processes take place simultaneously, hence the purpose of this review is to present the various interactions between the chemical and mechanical agents leading to accelerated degradation of the material. The papers cited in the review are those that lead to a better understanding of the process involved in the accelerated rate of material loss under E-C conditions

  6. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  7. Using REE tracers to measure sheet erosion changing to rill erosion

    International Nuclear Information System (INIS)

    Liu Puling; Xue Yazhou; Song Wei; Wang Mingyi; Ju Tongjun

    2004-01-01

    Rare Earth Elements (REE) tracer method was used to study sheet erosion changing to rill erosion on slope land. By placing different rare earth elements of different soil depth across a slope in an indoor plot, two simulated rainfalls were applied to study the change of erosion type and the rill erosion process. The results indicate that the main erosion type is sheet erosion at the beginning of the rainfalls, and serious erosion happens after rill erosion appears. Accumulated sheet and rill erosion amounts increase with the rainfalls time. The percentage of sheet erosion amount decreases and rill erosion percentage increases with time. At the end of the rainfalls, the total rill erosion amounts are 4-5 times more than sheet erosion. In this paper, a new REE tracer method was used to quantitatively distinguish sheet and rill erosion amounts. The new REE tracer method should be useful to future studying of erosion processes on slope lands. (authors)

  8. Modeling soil erosion in a watershed

    OpenAIRE

    Lanuza, R.

    1999-01-01

    Most erosion models have been developed based on a plot scale and have limited application to a watershed due to the differences in aerial scale. In order to address this limitation, a GIS-assisted methodology for modeling soil erosion was developed using PCRaster to predict the rate of soil erosion at watershed level; identify the location of erosion prone areas; and analyze the impact of landuse changes on soil erosion. The general methodology of desktop modeling or soil erosion at watershe...

  9. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  10. Gastric Mucosal Erosions - Radiologic evaluation -

    International Nuclear Information System (INIS)

    Kim, Seung Hyup

    1985-01-01

    70 cases of gastric mucosal erosions were diagnosed by double contrast upper gastrointestinal examinations and endoscopic findings. Analyzing the radiologic findings of these 70 cases of gastric mucosal erosions, the following results were obtained. 1. Among the total 70 cases, 65 cases were typical varioliform erosions showing central depressions and surrounding mucosal elevations. Remaining 5 cases were erosions of acute phase having multiple irregular depressions without surrounding elevations. 2. The gastric antrum was involved alone or in part in all cases. Duodenal bulb was involved with gastric antrum in 4 cases. 3. The majority of the cases had multiple erosions. There were only 2 cases of single erosion. 4. In 65 cases of varioliform erosions; 1) The diameter of the surrounding elevations varied from 3 to 20 mm with the majority (47 cases) between 6 and 10 mm. 2) In general, the surrounding elevations with sharp margin on double contrast films were also clearly demonstrated on compression films but those with faint margin were not. 3) The size of the central barium collections varied from pinpoint to 10 mm with the majority under 5 mm. The shape of the central barium collections in majority of the cases were round with a few cases of linear, triangular or star-shape. 5. In 5 cases of acute phase erosions; 1) All the 5 cases were females. 2) On double contrast radiography, all the cases showed multiple irregular depressed lesions without surrounding elevations. 3) 1 case had the history of hematemesis. 4) In 1 case, there was marked radiological improvement on follow-up study of 2 months interval. 6. In 23 cases, there were coexistent diseases with gastric mucosal erosions. These were 13 cases of duodenal bulb ulcers,7 cases of benign gastric ulcers and 3 others

  11. Detecting Anthropogenic Disturbance on Weathering and Erosion Processes

    Science.gov (United States)

    Vanacker, V.; Schoonejans, J.; Bellin, N.; Ameijeiras-Mariño, Y.; Opfergelt, S.; Christl, M.

    2014-12-01

    Anthropogenic disturbance of natural vegetation can profoundly alter the physical, chemical and biological processes within soils. Rapid removal of topsoil during intense farming can result in an imbalance between soil production through chemical weathering and physical erosion, with direct implications on local biogeochemical cycling. However, the feedback mechanisms between soil erosion, chemical weathering and biogeochemical cycling in response to anthropogenic forcing are not yet fully understood. In this paper, we analyze dynamic soil properties for a rapidly changing anthropogenic landscape in the Spanish Betic Cordillera; and focus on the coupling between physical erosion, soil production and soil chemical weathering. Modern erosion rates were quantified through analysis of sediment deposition volumes behind check dams, and represent catchment-average erosion rates over the last 10 to 50 years. Soil production rates are derived from in-situ produced 10Be nuclide concentrations, and represent long-term flux rates. In each catchment, soil chemical weathering intensities were calculated for two soil-regolith profiles. Although Southeast Spain is commonly reported as the European region that is most affected by land degradation, modern erosion rates are low (140 t ha-1 yr-1). About 50 % of the catchments are losing soils at a rate of less than 60 t km-2 yr-1. Our data show that modern erosion rates are roughly of the same magnitude as the long-term or cosmogenically-derived erosion rates in the Betic Cordillera. Soils developed on weathered metamorphic rocks have no well-developed profile characteristics, and are generally thin and stony. Nevertheless, soil chemical weathering intensities are high; and question the occurrence of past soil truncation.

  12. Buffer erosion in dilute groundwater

    International Nuclear Information System (INIS)

    Schatz, T.; Kanerva, N.; Martikainen, J.; Sane, P.; Olin, M.; Seppaelae, A.; Koskinen, K.

    2013-08-01

    One scenario of interest for repository safety assessment involves the loss of bentonite buffer material in contact with dilute groundwater flowing through a transmissive fracture interface. In order to examine the extrusion/erosion behavior of bentonite buffer material under such circumstances, a series of experiments were performed in a flow-through, 1 mm aperture, artificial fracture system. These experiments covered a range of solution chemistry (salt concentration and composition), material composition (sodium montmorillonite and admixtures with calcium montmorillonite), and flow velocity conditions. No erosion was observed for sodium montmorillonite against solution compositions from 0.5 g/L to 10 g/L NaCl. No erosion was observed for 50/50 calcium/sodium montmorillonite against 0.5 g/L NaCl. Erosion was observed for both sodium montmorillonite and 50/50 calcium/sodium montmorillonite against solution compositions ≤ 0.25 g/L NaCl. The calculated erosion rates for the tests with the highest levels of measured erosion, i.e., the tests run under the most dilute conditions (ionic strength (IS) < ∼1 mM), were well-correlated to flow velocity, whereas the calculated erosion rates for the tests with lower levels of measured erosion, i.e., the tests run under somewhat less dilute conditions (∼1 mM < IS < ∼4 mM), were not similarly correlated indicating that material and solution composition can significantly affect erosion rates. In every experiment, both erosive and non-erosive, emplaced buffer material extruded into the fracture and was observed to be impermeable to water flowing in the fracture effectively forming an extended diffusive barrier around the intersecting fracture/buffer interface. Additionally, a model which was developed previously to predict the rate of erosion of bentonite buffer material in low ionic strength water in rock fracture environments was applied to three different cases: sodium montmorillonite expansion in a vertical tube, a

  13. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  14. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  15. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  16. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  17. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  18. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  19. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  20. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  1. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  2. Erosive tooth wear in children

    NARCIS (Netherlands)

    Carvalho, T.S.; Lussi, A.; Jaeggi, T.; Gambon, D.L.; Lussi, A.; Ganss, C.

    2014-01-01

    Erosive tooth wear in children is a common condition. Besides the anatomical differences between deciduous and permanent teeth, additional histological differences may influence their susceptibility to dissolution. Considering laboratory studies alone, it is not clear whether deciduous teeth are

  3. Erosion-resistant composite material

    Science.gov (United States)

    Finch, C.B.; Tennery, V.J.; Curlee, R.M.

    A highly erosion-resistant composite material is formed of chemical vapor-deposited titanium diboride on a sintered titanium diboride-nickel substrate. This material may be suitable for use in cutting tools, coal liquefaction systems, etc.

  4. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  5. Soil Erosion and Agricultural Sustainability

    Science.gov (United States)

    Montgomery, D. R.

    2009-04-01

    Data drawn from a global compilation of studies support the long articulated contention that erosion rates from conventionally plowed agricultural fields greatly exceed rates of soil production, erosion under native vegetation, and long-term geological erosion. Whereas data compiled from around the world show that soil erosion under conventional agriculture exceeds both rates of soil production and geological erosion rates by up to several orders of magnitude, similar global distributions of soil production and geological erosion rates suggest an approximate balance. Net soil erosion rates in conventionally plowed fields on the order of 1 mm/yr can erode typical hillslope soil profiles over centuries to millennia, time-scales comparable to the longevity of major civilizations. Well-documented episodes of soil loss associated with agricultural activities date back to the introduction of erosive agricultural methods in regions around the world, and stratigraphic records of accelerated anthropogenic soil erosion have been recovered from lake, fluvial, and colluvial stratigraphy, as well as truncation of soil stratigraphy (such as truncated A horizons). A broad convergence in the results from studies based on various approaches employed to study ancient soil loss and rates of downstream sedimentation implies that widespread soil loss has accompanied human agricultural intensification in examples drawn from around the world. While a broad range of factors, including climate variability and society-specific social and economic contexts — such as wars or colonial relationships — all naturally influence the longevity of human societies, the ongoing loss of topsoil inferred from studies of soil erosion rates in conventional agricultural systems has obvious long-term implications for agricultural sustainability. Consequently, modern agriculture — and therefore global society — faces a fundamental question over the upcoming centuries. Can an agricultural system

  6. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  7. Erosion properties of unipolar arcs

    International Nuclear Information System (INIS)

    Chekalin, Eh.K.

    1982-01-01

    Processes modelling the formation of unipolar arcs on the elements of the first wall in limiters of the vacuum chamber and on active elements of tokamak divertor, are experimentally investigated. Erosion, processes that take place at two types of non-stationary cathode spots are considered. Experimental data prove the possibility of reducing erosion intensity by coating the surface of electrodes by oxide films, reduction of the temperature of electrode and discharge current

  8. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  9. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  10. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  11. Wind erosion of soils burned by wildfire

    Science.gov (United States)

    N. S. Wagenbrenner; M. J. Germino; B. K. Lamb; R. B. Foltz; P. R. Robichaud

    2011-01-01

    Wind erosion and aeolian transport processes are largely unstudied in the post-wildfire environment, but recent studies have shown that wind erosion can play a major role in burned landscapes. A wind erosion monitoring system was installed immediately following a wildfire in southeastern Idaho, USA to measure wind erosion from the burned area (Figure 1). This paper...

  12. Assessment of human intrusion and future human actions – Example from the Swedish LILW repository

    International Nuclear Information System (INIS)

    Andersson, Eva; Hjerpe, T.; Smith, G.

    2016-01-01

    Recommendations for FHA assessments: • The assumption of only considering inadvertent intrusion and using todays practice and technology is a key tool to make the assessment understandable. • Even after siting has been done, the placement of the repository, should be discussed in FHA scenarios, e.g. placement away from resources, discussion of erosion, and land uplift. • FEPs a good tool, good for constructing relevant scenarios and also for communication of the FHA assessment. • A few stylized scenarios are enough, good to include a drilling scenario as it is often used by different organizations. • Precise probabilities are hard to defend, avoid if possible and instead use the low likelihood in communication of the FHA results. • Communication of FHA scenarios is a tool to build confidence in the robustness of repository systems

  13. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  14. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  15. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  16. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  17. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  18. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  19. Indicadores de contaminación biológica asociados a la erosión hídrica en una cuenca de Pampa Ondulada Argentina Indicators of biological contamination associated with water erosion in basin belonging the rolling pampa, Argentina

    Directory of Open Access Journals (Sweden)

    Celio I. Chagas

    2006-07-01

    í a nivel de la cuenca bajo estudio.Agriculture activities use 70% of the world water resources, partly for animal production and particularly cattle feeding. There is an outstanding risk of biological contamination associated with this kind of production because animal feces and urine containing pathogens can be transported to surface waterways through runoff. The present investigation was carried out in the Tala basin belonging to the Rolling Pampa region in which intense runoff and erosion processes are widespread. In this basin there are extensive cattle feeding farms which are located close to the natural waterways, in bottomlands with hydrohalomorphic soils. There is also an increasing surface devoted to feedlots and intensive swine and poultry productions. The main use of the surface waters from the river and tributaries is direct cattle drinking. The aim of the present work was to analyze through biological indicators, the potential contamination of runoff water and sediments accumulated in lowlands devoted to cattle production and to determinate their human or animal origin. The waters showed concentration of biological indicators belonging to faecal streptococci and enterococci which can be related to animal but no to human contamination processes. A close relationship was observed between total coliforms and erosion borne sediment concentration in the studied area. Thus, the capacity of these sediments for carrying bacteria potentially harmful for animal health like Salmonella spp. was confirmed. The runoff, erosion and biological contamination processes proved to be related in the studied basin.

  20. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  1. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  2. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  3. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  4. Auto consolidated cohesive sediments erosion

    International Nuclear Information System (INIS)

    Ternat, F.

    2007-02-01

    Pollutants and suspended matters of a river can accumulate into the sedimentary column. Once deposited, they are submitted to self-weight consolidation processes, ageing and burying, leading to an increase of their erosion resistance. Pollutant fluxes can be related to sedimentary fluxes, determined by threshold laws. In this work, an erosion threshold model is suggested by introducing a cohesion force into the usual force balance. A model of cohesion is developed on the basis of interactions between argillaceous cohesive particles (clays), particularly the Van der Waals force, whose parameterization is ensured by means of granulometry and porosity. Artificial erosion experiments were performed in a recirculating erosion flume with natural cored sediments where critical shear stress measurements were performed. Other analyses provided granulometry and porosity. The results obtained constitute a good database for the literature. The model is then applied to the experimental conditions and gives good agreement with measurements. An example of the accounting for self-weight consolidation processes is finally suggested, before finishing on a Mohr like diagram dedicated to soft cohesive sediment erosion. (author)

  5. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  6. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  7. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  8. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  9. Bentonite erosion. Laboratory studies

    Energy Technology Data Exchange (ETDEWEB)

    Jansson, Mats (Div. of Nuclear Chemistry, Royal Inst. of Technology, Stockholm (Sweden), School of Chemical Science and Engineering)

    2009-11-15

    This report covers the laboratory studies that have been performed at Nuclear Chemistry, KTH in the project 'Bentonite Erosion'. Many of the experiments in this report were performed to support the work of the modelling group and were often relatively simple. One of the experiment series was performed to see the impact of gravity and concentration of mono- and di-valent cations. A clay suspension was prepared in a test tube. A net was placed in contact with the suspension, the test tube was filled with solutions of different concentrations and the system was left overnight to settle. The tube was then turned upside down and the behaviour was visually observed. Either the clay suspension fell through the net or stayed on top. By using this method surprisingly sharp determinations of the Critical Coagulation (Flocculation) Concentration (CCC/CFC) could be made. The CCC/CFC of Ca2+ was for sodium montmorillonite determined to be between 1 and 2 mM. An artificial fracture was manufactured in order to simulate the real case scenario. The set-up was two Plexiglas slabs separated by 1 mm thick spacers with a bentonite container at one side of the fracture. Water was pumped with a very low flow rate perpendicular to bentonite container and the water exiting the fracture was sampled and analyzed for colloid content. The bentonite used was treated in different ways. In the first experiment a relatively montmorillonite rich clay was used while in the second bentonite where only the readily soluble minerals had been removed was used. Since Plexiglas was used it was possible to visually observe the bentonite dispersing into the fracture. After the compacted bentonite (1,000 kg/m3) had been water saturated the clay had expanded some 12 mm out into the fracture. As the experiment progressed the clay expanded more out into the fracture and seemed to fractionate in two different phases with less material in the outmost phase. A dark rim which was later analyzed to contain

  10. Bentonite erosion - Laboratory studies

    International Nuclear Information System (INIS)

    Jansson, Mats

    2010-01-01

    Document available in extended abstract form only. Bentonite clay is proposed as buffer material in the KBS-3 concept of storing spent nuclear fuel. Since the clay is plastic it will protect the canisters containing the spent fuel from movements in the rock. Furthermore, the clay will expand when taking up water, become very compact and hence limit the transport of solutes to and from the canister to only diffusion. The chemical stability of the bentonite barrier is of vital importance. If much material would be lost the barrier will lose its functions. As a side effect, lots of colloids will be released which may facilitate radionuclide transport in case of a breach in the canister. There are scenarios where during an ice age fresh melt water may penetrate down to repository depths with relatively high flow rates and not mix with older waters of high salinity. Under such conditions bentonite colloids will be more stable and there is a possibility that the bentonite buffer would start to disperse and bentonite colloids be carried away by the passing water. This work is a part of a larger project called Bentonite Erosion, initiated and supported by SKB. In this work several minor experiments have been performed in order to investigate the influence of for instance di-valent cations, gravity, etc. on the dispersion behaviour of bentonite and/or montmorillonite. A bigger experiment where the real situation was simulated using an artificial fracture was conducted. Two Plexiglas slabs were placed on top of each other, separated by plastic spacers. Bentonite was placed in a container in contact with a fracture. The bentonite was water saturated before deionized water was pumped through the fracture. The evolution of the bentonite profile in the fracture was followed visually. The eluate was collected in five different slots at the outlet side and analyzed for colloid concentration employing Photon Correlation Spectroscopy (PCS) and a Single Particle Counter (SPC). Some

  11. Soil erosion in Slovene Istria

    Directory of Open Access Journals (Sweden)

    Matjaž Mikoš

    2009-12-01

    Full Text Available From the end of nineties of the 20th century, intense hydrologic and geomorphologic research is taking place in the Slovene Istria. As a part of this research also studies on soil erosion were undertaken in the period from 2005 to 2008. The field measurements were under taken onclosed 1m2 large erosion plots under three different land uses (on bare soils in an olive grove, on an overgrown meadow, in a forest, placed south of the Marezige village in the Rokava River basin.We show weekly measurements of surface erosion (interrill erosion for the period of 13 months (the end of March 2005 – the end of April 2006, as well as monthly and seasonal averages together with selected linear statistical correlations between soil erosion and weather parameters.From May 2005 to April 2006 the interrill erosion on bare soils in an olive grove with an inclination of 5.5° amounted to 9013 g/m2 (90 t/ha that corresponds to surface lowering rate of 8.5 mm/yr; on an overgrown meadow with an inclination of 9.4° it amounted to 168 g/m2 (1,68 t/ha that corresponds to surface lowering rate of 0.16 mm//yr; and in a forest with an inclination of 7.8° it amounted to 391 g/m2 (3,91 t/ha and in a forest with an inclination of 21.4° it amounted to 415 g/m2 (4,15 t/ha, respectively, that corresponds to surface lowering rate of 0.4 mm/yr.

  12. DISPERSION OF GLYPHOSATE IN SOILS UNDERGOING EROSION

    Directory of Open Access Journals (Sweden)

    Gorana Todorovic Rampazzo

    2010-08-01

    Full Text Available Different physical, chemical and biological processes influence the behaviour of organic contaminants in soils. A better understanding of the organic pollutant behaviour in soils would improve the environmental protection. One possible way for better attenuation of the risk of pollution in agriculture can be achieved through ta better-specified pesticide management based on the adaptation of the pesticide type and application rates to the specific environmental characteristics of the area of application. Nowadays, one of the actually most applied herbicide world wide is glyphosate. Glyphosate is highly water soluble and traces have been found in surface and groundwater systems. For a better understanding of the natural influence of erosion processes on glyphosate behaviour and dispersion under heavy rain conditions after application in the field, two erosion simulation experiments were conducted on two different locations in Austria with completely different soil types in September 2008. The results of the experiments showed that under normal practical conditions (e.g. no rainfall is expected immediatly after application, the potential adsorption capacity of the Kirchberg soil (Stagnic Cambisol, with about 16.000 ppm Fe-oxides is confirmed compared to the low adsorption Chernosem soil (about 8.000 ppm pedogenic Fe-oxides.  Considering the enormous difference in the run-off amounts between the two sites Pixendorf and Kirchberg soils it can be concluded how important the soil structural conditions and vegetation type and cover are for the risks of erosion and, as a consequence, pollution of neighbouring waters. In the rainfall experiments under comparable simulation conditions, the amount of run-off was about 10 times higher at Kirchberg, owing to its better infiltration rate, than at the Pixendorf site. Moreover, the total loss of glyphosate (NT+CT through run-off at the Kirchberg site was more than double that at Pixendorf, which confirms the

  13. EFFECTS OF SLOPE SHAPES ON SOIL EROSION

    Directory of Open Access Journals (Sweden)

    Hüseyin ŞENSOY, Şahin PALTA

    2009-01-01

    Full Text Available Water is one of the most important erosive forces. A great number of factors also play a role in erosion process and slope characteristic is also one of them. The steepness and length of the slope are important factors for runoff and soil erosion. Another slope factor that has an effect on erosion is the shape of the slope. Generally, different erosion and runoff characteristics exist in different slopes which can be classified as uniform, concave, convex and complex shape. In this study, the effects of slope shape on erosion are stated and emphasized by taking similar researches into consideration.

  14. Full-mouth minimally invasive adhesive rehabilitation to treat severe dental erosion: a case report.

    Science.gov (United States)

    Vailati, Francesca; Vaglio, Giovanna; Belser, Urs Christoph

    2012-02-01

    Dental erosion is increasing, and only recently are clinicians starting to acknowledge the problem. A prospective clinical trial investigating which therapeutic approach must be undertaken to treat erosion and when is under way at the University of Geneva (Geneva Erosion Study). All patients affected by dental erosion who present with signs of dentin exposure are immediately treated using only adhesive techniques. In this article, the full-mouth adhesive rehabilitation of one of these patients affected by severe dental erosion (ACE class IV) is illustrated. By the end of the therapy, a very pleasing esthetic outcome had been achieved (esthetic success), all of the patient's teeth maintained their vitality, and the amount of tooth structure sacrificed to complete the adhesive full-mouth rehabilitation was negligible (biological success).

  15. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  16. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  17. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  18. Elevated temperature erosive wear of metallic materials

    International Nuclear Information System (INIS)

    Roy, Manish

    2006-01-01

    Solid particle erosion of metals and alloys at elevated temperature is governed by the nature of the interaction between erosion and oxidation, which, in turn, is determined by the thickness, pliability, morphology, adhesion characteristics and toughness of the oxide scale. The main objective of this paper is to critically review the present state of understanding of the elevated temperature erosion behaviour of metals and alloys. First of all, the erosion testing at elevated temperature is reviewed. This is followed by discussion of the essential features of elevated temperature erosion with special emphasis on microscopic observation, giving details of the erosion-oxidation (E-O) interaction mechanisms. The E-O interaction has been elaborated in the subsequent section. The E-O interaction includes E-O maps, analysis of transition criteria from one erosion mechanism to another mechanism and quantification of enhanced oxidation kinetics during erosion. Finally, the relevant areas for future studies are indicated. (topical review)

  19. Understanding Soil Erosion in Irrigated Agriculture

    OpenAIRE

    O' Schwankl, Lawrence J

    2006-01-01

    A soil's physical and chemical properties determine whether it is vulnerable to erosion, which can reduce soil quality and cause other problems besides. Learn the basics of identifying what type of erosion is affecting your land and what's causing it.

  20. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  1. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  2. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  3. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  4. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  5. Erosion of the first wall of Tokamaks

    International Nuclear Information System (INIS)

    Guseva, M.I.; Ionova, E.S.; Martynenko, Yu.V.

    1980-01-01

    An estimate of the rate of erosion of the wall due to sputtering and blistering requires knowledge of the fluxes and energies of the particles which go from the plasma to the wall, of the sputtering coefficients S, and of the erosion coefficients S* for blistering. The overall erosion coefficient is equal to the sum of the sputtering coefficient and the erosion coefficient for blistering. Here the T-20 Tokamak is examined as an example of a large-scale Tokamak. 18 refs

  6. Soil Erosion. LC Science Tracer Bullet.

    Science.gov (United States)

    Buydos, John F., Comp.

    Soil erosion is the detachment and movement of topsoil or soil material from the upper part of the soil profile. It may occur in the form of rill, gully, sheet, or wind erosion. Agents of erosion may be water, wind, glacial ice, agricultural implements, machinery, and animals. Soil conservation measures require a thorough understanding of the…

  7. Natural and anthropogenic rates of soil erosion

    Science.gov (United States)

    Regions of land that are brought into crop production from native vegetation typically undergo a period of soil erosion instability, and long term erosion rates are greater than for natural lands as long as the land continues being used for crop production. Average rates of soil erosion under natur...

  8. Soil erosion in humid regions: a review

    Science.gov (United States)

    Daniel J. Holz; Karl W.J. Williard; Pamela J. Edwards; Jon E. Schoonover

    2015-01-01

    Soil erosion has significant implications for land productivity and surface water quality, as sediment is the leading water pollutant worldwide. Here, erosion processes are defined. The dominant factors influencing soil erosion in humid areas are reviewed, with an emphasis on the roles of precipitation, soil moisture, soil porosity, slope steepness and length,...

  9. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  10. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  11. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  12. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  13. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  14. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  15. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  16. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  17. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  18. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  19. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  20. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  1. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  2. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  3. Modeling the fluid/soil interface erosion in the Hole Erosion Test

    Directory of Open Access Journals (Sweden)

    Kissi B.

    2012-07-01

    Full Text Available Soil erosion is a complex phenomenon which yields at its final stage to insidious fluid leakages under the hydraulic infrastructures known as piping and which are the main cause of their rupture. The Hole Erosion Test is commonly used to quantify the rate of piping erosion. In this work, The Hole Erosion Test is modelled by using Fluent software package. The aim is to predict the erosion rate of soil during the hole erosion test. The renormalization group theory – based k–ε turbulence model equations are used. This modelling makes it possible describing the effect of the clay concentration in flowing water on erosion. Unlike the usual one dimensional models, the proposed modelling shows that erosion is not uniform erosion along the hole length. In particular, the concentration of clay is found to increase noticeably the erosion rate.

  4. The Arctic Coastal Erosion Problem

    Energy Technology Data Exchange (ETDEWEB)

    Frederick, Jennifer M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thomas, Matthew Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bull, Diana L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Craig A. [Integral Consulting Inc., San Francisco, CA (United States); Roberts, Jesse D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    Permafrost-dominated coastlines in the Arctic are rapidly disappearing. Arctic coastal erosion rates in the United States have doubled since the middle of the twentieth century and appear to be accelerating. Positive erosion trends have been observed for highly-variable geomorphic conditions across the entire Arctic, suggesting a major (human-timescale) shift in coastal landscape evolution. Unfortunately, irreversible coastal land loss in this region poses a threat to native, industrial, scientific, and military communities. The Arctic coastline is vast, spanning more than 100,000 km across eight nations, ten percent of which is overseen by the United States. Much of area is inaccessible by all-season roads. People and infrastructure, therefore, are commonly located near the coast. The impact of the Arctic coastal erosion problem is widespread. Homes are being lost. Residents are being dispersed and their villages relocated. Shoreline fuel storage and delivery systems are at greater risk. The U.S. Department of Energy (DOE) and Sandia National Laboratories (SNL) operate research facilities along some of the most rapidly eroding sections of coast in the world. The U.S. Department of Defense (DOD) is struggling to fortify coastal radar sites, operated to ensure national sovereignty in the air, against the erosion problem. Rapid alterations to the Arctic coastline are facilitated by oceanographic and geomorphic perturbations associated with climate change. Sea ice extent is declining, sea level is rising, sea water temperature is increasing, and permafrost state is changing. The polar orientation of the Arctic exacerbates the magnitude and rate of the environmental forcings that facilitate coastal land area loss. The fundamental mechanics of these processes are understood; their non-linear combination poses an extreme hazard. Tools to accurately predict Arctic coastal erosion do not exist. To obtain an accurate predictive model, a coupling of the influences of

  5. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  6. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  7. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  8. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  9. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  10. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  11. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  12. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  13. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  14. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  15. Preventing erosion at pipeline crossings of watercourses

    International Nuclear Information System (INIS)

    Sawatsky, L.; Arnold, G.

    1997-01-01

    Watercourses are naturally vulnerable to erosion but the risk is particularly acute after sub-soil and armour materials have been disturbed by trenching and backfilling during construction. Various types of erosion (river scour, river bed, river channel bed and river bank ) and the progressive removal of pipeline cover resulting from erosion were discussed. Methods of estimating the risk of progressive erosion, river avulsions and beaver dam scour, and methods of mitigating erosion at pipeline crossings such as deep burial, proper siting, conventional armouring, and a combination of bank toe protection, and upper bank vegetation cover, were described

  16. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  17. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  18. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  19. Soil Erosion Threatens Food Production

    Directory of Open Access Journals (Sweden)

    Michael Burgess

    2013-08-01

    Full Text Available Since humans worldwide obtain more than 99.7% of their food (calories from the land and less than 0.3% from the oceans and aquatic ecosystems, preserving cropland and maintaining soil fertility should be of the highest importance to human welfare. Soil erosion is one of the most serious threats facing world food production. Each year about 10 million ha of cropland are lost due to soil erosion, thus reducing the cropland available for world food production. The loss of cropland is a serious problem because the World Health Organization and the Food and Agricultural Organization report that two-thirds of the world population is malnourished. Overall, soil is being lost from agricultural areas 10 to 40 times faster than the rate of soil formation imperiling humanity’s food security.

  20. On inhibition of dental erosion.

    Science.gov (United States)

    Rölla, Gunnar; Jonski, Grazyna; Saxegaard, Erik

    2013-11-01

    To examine the erosion-inhibiting effect of different concentrations of hydrofluoric acid. Thirty-six human molars were individually treated with 10 ml of 0.1 M citric acid for 30 min (Etch 1), acid was collected and stored until analysis. The teeth were randomly divided into six groups and then individually treated with 10 ml of one of six dilutions (from 0.1-1%) of hydrofluoric acid. The teeth were then again treated with citric acid (Etch 2). The individual acid samples from Etch 1 and 2 were analyzed for calcium by flame atomic absorption spectroscopy and difference in calcium loss was calculated. The highest erosion inhibiting effect was obtained in groups with the highest concentrations of hydrofluoric acid, where the pH was lowest, below pKa of 3.17, thus the hydrofluoric acids being mainly in an undissociated state. Diluted hydrofluoric acid is present in aqueous solution of SnF2 and TiF4 (which are known to inhibit dental erosion): SnF2 + 3H2O = Sn(OH)2 + 2HF + H2O and TiF4 + 5H2O = Ti(OH)4 + 4HF + H2O. It is also known that pure, diluted hydrofluoric acid can inhibit dental erosion. Teeth treated with hydrofluoric acid are covered by a layer of CaF2-like mineral. This mineral is acid resistant at pH acid resistant mineral, initiated by tooth enamel treatment with hydrofluoric acid. Hydrofluoric acid is different in having fluoride as a conjugated base, which provides this acid with unique properties.

  1. Erosive forms in rivers systems

    International Nuclear Information System (INIS)

    Una Alvarez, E. de; Vidal Romani, J. R.; Rodriguez Martinez-Conde, R.

    2009-01-01

    The purpose of this work is to analyze the geomorphological meaning of the concepts of stability/change and to study its influence on a fluvial erosion system. Different cases of fluvial potholes in Galicia (NW of the Iberian Peninsula) are considered. The work conclusions refer to the nature of the process and its morphological evolution in order to advance towards later contributions with respect of this type of systems. (Author) 14 refs.

  2. Processes and mechanisms governing hard rock cliff erosion in western Brittany, France

    Science.gov (United States)

    Laute, Katja; Letortu, Pauline; Le Dantec, Nicolas

    2017-04-01

    The evolution of rocky coasts is controlled by the interplay between subaerial, marine as well as biological processes, and the geological context. In times of ongoing climate change it is difficult to predict how these erosional landscapes will respond for example to anticipated sea-level rise or to an increase in storminess. However, it can be expected that changes in the morphodynamics of rocky coasts will have a noticeable effect on society and infrastructure. Recent studies have proven that monitoring cliff micro-seismic ground motion has been very effective in exploring both marine and atmospheric actions on coastal cliffs. But only few studies have focused so far on the effects of wave loading and water circulation (runoff, infiltration, water table variations) on cliff stability and subsequent erosion, considering the interaction between subaerial and marine processes. This project focuses on the identification and quantification of environmental controls on hard rock cliff erosion with an emphasis on discriminating the relative contributions of subaerial and marine processes. We aim at relating different sources of mechanical stress (e.g. wave loading, direct wave impact, hydrostatic pressure, thermal expansion) to cliff-scale strain (cliff-top swaying and shaking) and micro-fracturing (generation, expansion and contraction of micro-cracks) with the objective to unravel and discriminate triggering mechanisms of cliff failure. A four-month monitoring field experiment during the winter period (February-May) of 2017 is carried out at a cliff face located in Porsmilin beach (western Brittany, France). The selected cliff section is exposed to Atlantic swell from the south/southwest with a significant wave height of ca. 1.5 m on average and, reaching up to 4 m during storm events. The cliff rises ca. 20 m above the beach and is mainly formed of orthogneiss with intrusions of granodiorite. The entire cliff is highly fractured and altered, which can promote slope

  3. Erosion corrosion in wet steam

    International Nuclear Information System (INIS)

    Tavast, J.

    1988-03-01

    The effect of different remedies against erosion corrosion in wet steam has been studied in Barsebaeck 1. Accessible steam systems were inspected in 1984, 1985 and 1986. The effect of hydrogen peroxide injection of the transport of corrosion products in the condensate and feed water systems has also been followed through chemical analyses. The most important results of the project are: - Low alloy chromium steels with a chromium content of 1-2% have shown excellent resistance to erosion corrosion in wet steam. - A thermally sprayed coating has shown good resistance to erosion corrosion in wet steam. In a few areas with restricted accessibility minor attacks have been found. A thermally sprayed aluminium oxide coating has given poor results. - Large areas in the moisture separator/reheater and in steam extraction no. 3 have been passivated by injection of 20 ppb hydrogen peroxide to the high pressure steam. In other inspected systems no significant effect was found. Measurements of the wall thickness in steam extraction no. 3 showed a reduced rate of attack. - The injection of 20 ppb hydrogen peroxide has not resulted in any significant reduction of the iron level result is contrary to that of earlier tests. An increase to 40 ppb resulted in a slight decrease of the iron level. - None of the feared disadvantages with hydrogen peroxide injection has been observed. The chromium and cobalt levels did not increase during the injection. Neither did the lifetime of the precoat condensate filters decrease. (author)

  4. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  5. Comparison of erosion and erosion control works in Macedonia, Serbia and Bulgaria

    Directory of Open Access Journals (Sweden)

    Ivan Blinkov

    2013-12-01

    Natural conditions in the Balkan countries contribute to the appearance of various erosion forms and the intensity of the erosion processes. Over the history of these countries, people who settled this region used the available natural resources to fill their needs (tree cutting, incorrect plugging, overgrazing, which contributed to soil erosion. Organized erosion control works in the Balkans started in the beginning of the 20th century (1905 in Bulgaria. The highest intensity of erosion control works were carried out during the period 1945 – 1990. Various erosion control works were launched. Bulgaria had a large anti-erosion afforestation, almost 1 million ha. Bulgaria's ecological river restoration approach has been in use for almost 50 years. Serbia contributed significant erosion and torrent control works on hilly agricultural areas. Specific screen barrages and afforestation on extremely dry areas are characteristic in Macedonia. A common characteristic for all countries is a high decrease in erosion control works in the last 20 years.

  6. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  7. The success of headwater rehabilitation towards gully erosion control

    Science.gov (United States)

    Frankl, Amaury; Poesen, Jean; Nyssen, Jan

    2017-04-01

    The ill-management of headwaters has frequently shown to have adverse effects on both humans and the environment. Historical examples often refer to altered hydrological conditions and stream incision resulting from deforestation. Agricultural expansion and intensification - often accompanied with land reforms in the 20th century - also showed to severely impact the fluvial environment, with stream incision and gully erosion hazards increasingly affecting many headwater areas around the world. To counter this, many regions have adopted improved management schemes aiming at restoring the physical, biological and hydrological integrity of the soil- and landscape. In terms of hydrogeomorpology, the objective was to minimize dynamics to a lower level so that runoff, sediment and pollutant transfers do not cause danger to human life, environmental/natural resources deterioration or economic stress. Therefore, much attention was given to the rehabilitation and re-naturalization of headwater streams and gullies, which are the conduits of these transfers. This is done in both indirect and direct ways, i.e. reducing the delivery of runoff and sediment to the gullies and interventions in the incised channels. Although much has been published on gully erosion development and control, few studies assess the success of gully rehabilitation on the mid- to long term or confront results against the gully life-cycle. The latter refers to the rate law in fluvial geomorphology, whereby gully morphological changes (increases in length, area, volume) are initially rapid, followed by a much slower development towards a new equilibrium state. Here, we present a review of headwater rehabilitation measures and their success towards gully erosion control. By confronting this to the life-cycle of a gully, we also want to shed light on our understanding of when and where gully erosion control needs to be applied; making land management more efficient and effective. Keywords: land

  8. Erosion of Brassica incana Genetic Resources: Causes and Effects

    Science.gov (United States)

    Muscolo, A.; Settineri, G.; Mallamaci, C.; Papalia, T.; Sidari, M.

    2017-07-01

    Brassica incana Ten., possessing a number of useful agronomic traits, represents a precious genetic resource to be used in plant breeding programs to broaden the genetic base in most Brassica crop species. B. incana that grows on limestone cliffs is at risk of genetic erosion for environmental constraints and human activities. We studied the pedological conditions of a Calabrian site where the B. incana grows, and we correlated the soil properties to the physiological and biochemical aspects of B. incana to identify the causes and effects of the genetic erosion of this species. Our results evidenced that physical soil conditions did not affect B. incana growth and nutraceutical properties; conversely, biological soil properties modified its properties. We identified leaf pigments and secondary metabolites that can be used routinely as early warning indicators of plant threat, to evaluate in a short term the dynamic behavior of plants leading to species extinction.

  9. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Directory of Open Access Journals (Sweden)

    K. Iyer

    2018-01-01

    Full Text Available Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene–Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary

  10. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Science.gov (United States)

    Iyer, Karthik; Svensen, Henrik; Schmid, Daniel W.

    2018-01-01

    Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene-Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM)-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC) content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary column through time and

  11. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  12. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  13. Resolution of persistent corneal erosion after administration of topical rebamipide

    Directory of Open Access Journals (Sweden)

    Kashima T

    2012-08-01

    Full Text Available Tomoyuki Kashima,1,2 Hideo Akiyama,1 Fumihide Miura,2 Shoji Kishi11Department of Ophthalmology, Gunma University School of Medicine, Maebashi, Japan; 2Department of Ophthalmology, Saku Central Hospital, Saku, JapanAbstract: Rebamipide is an antiulcer agent used to treat gastric ulcer and gastritis. Biological effects of rebamipide include cytoprotection, wound healing, and anti-inflammatory properties that are known to be universal for a variety of tissues in addition to gastrointestinal mucosa. The therapeutic effects of rebamipide eye drops are due to its ability to increase corneal and conjunctival mucin-like substances and improve corneal and conjunctival injury in vivo. In this paper, we report a case of Sjögren's syndrome with complete disappearance of corneal erosion after administration of rebamipide eye drops. This was observed even though corneal erosion had not improved for 6 months after punctal occlusion surgery. The patient was a 33-year-old female, diagnosed with Sjögren's syndrome by a salivary gland biopsy. The corneal and conjunctival surfaces were filled with dense erosions, which did not improve with topical drugs. Punctal plugs were applied several times; however, the plugs were repeatedly shed. All four puncta of both eyelids were surgically occluded, and both corneal and conjunctival erosion was clearly improved. However, the erosion in the inferior cornea of both eyes had not improved for 6 months after surgery. We used the newly approved topical rebamipide for treatment of this patient. The corneal erosion gradually improved and completely disappeared 4 weeks after administration of the drug. Dry eye sensation disappeared at the same time. Both membrane-associated mucin and secreted mucin in the ocular surface are thought to be essential for maintenance of the tear film. Induction of mucin from ocular surface epithelium could be an effective treatment in cases of dry eye caused by mucin deficiency. Through its various

  14. The comparison of various approach to evaluation erosion risks and design control erosion measures

    Science.gov (United States)

    Kapicka, Jiri

    2015-04-01

    In the present is in the Czech Republic one methodology how to compute and compare erosion risks. This methodology contain also method to design erosion control measures. The base of this methodology is Universal Soil Loss Equation (USLE) and their result long-term average annual rate of erosion (G). This methodology is used for landscape planners. Data and statistics from database of erosion events in the Czech Republic shows that many troubles and damages are from local episodes of erosion events. An extent of these events and theirs impact are conditional to local precipitation events, current plant phase and soil conditions. These erosion events can do troubles and damages on agriculture land, municipally property and hydro components and even in a location is from point of view long-term average annual rate of erosion in good conditions. Other way how to compute and compare erosion risks is episodes approach. In this paper is presented the compare of various approach to compute erosion risks. The comparison was computed to locality from database of erosion events on agricultural land in the Czech Republic where have been records two erosion events. The study area is a simple agriculture land without any barriers that can have high influence to water flow and soil sediment transport. The computation of erosion risks (for all methodology) was based on laboratory analysis of soil samples which was sampled on study area. Results of the methodology USLE, MUSLE and results from mathematical model Erosion 3D have been compared. Variances of the results in space distribution of the places with highest soil erosion where compared and discussed. Other part presents variances of design control erosion measures where their design was done on based different methodology. The results shows variance of computed erosion risks which was done by different methodology. These variances can start discussion about different approach how compute and evaluate erosion risks in areas

  15. Cavitation erosion - scale effect and model investigations

    Science.gov (United States)

    Geiger, F.; Rutschmann, P.

    2015-12-01

    The experimental works presented in here contribute to the clarification of erosive effects of hydrodynamic cavitation. Comprehensive cavitation erosion test series were conducted for transient cloud cavitation in the shear layer of prismatic bodies. The erosion pattern and erosion rates were determined with a mineral based volume loss technique and with a metal based pit count system competitively. The results clarified the underlying scale effects and revealed a strong non-linear material dependency, which indicated significantly different damage processes for both material types. Furthermore, the size and dynamics of the cavitation clouds have been assessed by optical detection. The fluctuations of the cloud sizes showed a maximum value for those cavitation numbers related to maximum erosive aggressiveness. The finding suggests the suitability of a model approach which relates the erosion process to cavitation cloud dynamics. An enhanced experimental setup is projected to further clarify these issues.

  16. Mapping monthly rainfall erosivity in Europe

    DEFF Research Database (Denmark)

    Ballabio, C; Meusburger, K; Klik, A

    2017-01-01

    to Eastern Europe. The maps also show a clear delineation of areas with different erosivity seasonal patterns, whose spatial outline was evidenced by cluster analysis. The monthly erosivity maps can be used to develop composite indicators that map both intra-annual variability and concentration of erosive...... and seasonal R-factor maps and assess rainfall erosivity both spatially and temporally. During winter months, significant rainfall erosivity is present only in part of the Mediterranean countries. A sudden increase of erosivity occurs in major part of European Union (except Mediterranean basin, western part...... selected among various statistical models to perform the spatial interpolation due to its excellent performance, ability to model non-linearity and interpretability. The monthly prediction is an order more difficult than the annual one as it is limited by the number of covariates and, for consistency...

  17. Erosion and sedimentation caused by watercourse regulation

    International Nuclear Information System (INIS)

    Dahl, T.E.; Godtland, K.

    1995-01-01

    This report describes the observations made by SINTEF NHL in 1993 - 1994 on the development of erosion in three regulated lakes in Norway: Devdesjavri, Store Maalvatn and Gjevilvatnet. Surveys, profile levelling, water sample analyses, aerial photography etc were all used. Erosion was dramatic in all three magazines the first year of regulation and then slowed down. It has since remained relatively stable. However, there is a risk of further strong erosion connected with flooding tributaries, notably at low water such as usually occurs in spring. This is true in particular of the main river discharging into Devdesjavri, which is subject to landslides, wave and river erosion. In addition, ground water erosion may occur if the magazine is drained too fast. The report is lavishly illustrated with colour pictures of the effects of erosion. 21 refs., 15 figs., 13 tabs

  18. Varioliform erosions in the stomach and duodenum

    Energy Technology Data Exchange (ETDEWEB)

    Lotz, W.; Schulz, D.; Munkel, G.

    1984-04-01

    One thousand five hundred and eighty-three patients who were x-rayed for dyspepsia showed varioliform erosions in 15.3%. Men had an incidence of 9.8%, almost twice as common as in women (5.5%). Mucosal polyps, usually of the hyperplastic type, occurred in 2.4%. 15% of patients with gastric ulcers and 16% of patients with duodenal ulcers had varioliform erosions. On the other hand, amongst patients with erosions, 11% had gastric ulcers and 8.3% duodenal ulcers. The definitions of erosion which have been given in the literature are partly contradictory, and are discussed. Varioliform erosions, also known as complete erosions, may be acute or chronic. They are the third most common cause of bleeding from the upper gastrointestinal tract. With modern radiological methods of examining the stomach, they are no longer a rare finding. 5 figs.

  19. Varioliform erosions in the stomach and duodenum

    International Nuclear Information System (INIS)

    Lotz, W.; Schulz, D.; Munkel, G.

    1984-01-01

    One thousand five hundred and eighty-three patients who were x-rayed for dyspepsia showed varioliform erosions in 15.3%. Men had an incidence of 9.8%, almost twice as common as in women (5.5%). Mucosal polyps, usually of the hyperplastic type, occurred in 2.4%. 15% of patients with gastric ulcers and 16% of patients with duodenal ulcers had varioliform erosions. On the other hand, amongst patients with erosions, 11% had gastric ulcers and 8.3% duodenal ulcers. The definitions of erosion which have been given in the literature are partly contradictory, and are discussed. Varioliform erosions, also known as complete erosions, may be acute or chronic. They are the third most common cause of bleeding from the upper gastrointestinal tract. With modern radiological methods of examining the stomach, they are no longer a rare finding. (orig.) [de

  20. Assessment and management of dental erosion.

    Science.gov (United States)

    Wang, Xiaojie; Lussi, Adrian

    2010-07-01

    Studies have shown a growing trend toward increasing prevalence of dental erosion, associated with the declining prevalence of caries disease in industrialized countries. Erosion is an irreversible chemical process that results in tooth substance loss and leaves teeth susceptible to damage as a result of wear over the course of an individual's lifetime. Therefore, early diagnosis and adequate prevention are essential to minimize the risk of tooth erosion. Clinical appearance is the most important sign to be used to diagnose erosion. The Basic Erosive Wear Examination (BEWE) is a simple method to fulfill this task. The determination of a variety of risk and protective factors (patient-dependent and nutrition-dependent factors) as well as their interplay are necessary to initiate preventive measures tailored to the individual. When tooth loss caused by erosive wear reaches a certain level, oral rehabilitation becomes necessary. Copyright 2010 Elsevier Inc. All rights reserved.

  1. DENTAL EROSION IN PRIMARY DENTITION- A REVIEW

    Directory of Open Access Journals (Sweden)

    Rafi Shaik

    2017-06-01

    Full Text Available BACKGROUND The pattern of oral diseases has been influenced by ever changing human lifestyle. Tooth wear especially dental erosion has drawn increasing attention as risk factor for tooth damage or loss in recent years. It is a common condition in primary dentition compared to permanent dentition due to thinner and less mineralised enamel. However, it is more worrying, when this condition is being found in an alarming proportion among children. The presence of dental erosion in children is likely to be associated with a number of general health and dietary factors, but it is also aggravated by the relatively more rapid progression of erosion in the deciduous teeth. An understanding of the aetiologies and risk factors for erosion is important for early recognition of dental erosion to prevent serious irreversible damage to the dentition. This paper discusses the erosion in children with regard to its epidemiology, prevalence, clinical features, measurement and prevention.

  2. PROBLEMS OF SOIL PROTECTION FROM EROSION

    OpenAIRE

    M. Voloshuk; Natalia Kiriak

    2007-01-01

    In this article the problems of soil protection from erosion in Moldova are considered. The history (evolution) of erosive processes is generalized, the first items of information on presence washed off soils are marked. Purposeful study of soil erosion, development of measures of struggle with it were begun in Moldova at the end of 40 years. In connection with transition to new economic methods of conducting economy (farmers, rent, privatization of land) before pedologist, the experts of des...

  3. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  4. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  5. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  7. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  8. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  9. Erosion products in disruption simulation experiments

    International Nuclear Information System (INIS)

    Safronov, V.; Arkhipov, N.; Bakhtin, V.; Barsuk, V.; Kurkin, S.; Mironova, E.; Toporkov, D.; Vasenin, S.; Zhitlukhin, A.; Arkhipov, I.; Werle, H.; Wuerz, H.

    1998-01-01

    Erosion of divertor materials under tokamak disruption event presents a serious problem of ITER technology. Erosion restricts the divertor lifetime and leads to production of redeposited layers of the material retaining large amount of tritium, which is a major safety issue for future fusion reactor. Since ITER disruptive heat loads are not achievable in existing tokamaks, material erosion is studied in special simulation experiments. Till now the simulation experiments have focused mainly on investigation of shielding effect and measurement of erosion rate. In the present work the properties of eroded and redeposited graphite are studied under condition typical for hard ITER disruption. (author)

  10. Reduction of surface erosion in fusion reactors

    International Nuclear Information System (INIS)

    Rossing, T.D.; Das, S.K.; Kaminsky, M.

    1976-01-01

    Some of the major processes leading to surface erosion in fusion reactors are reviewed briefly, including blistering by implanted gas, sputtering by ions, atoms, and neutrons, and vaporization by local heating. Surface erosion affects the structural integrity and limits the lifetime of reactor components exposed to plasma radiation. In addition, some of the processes leading to surface erosion also cause the release of plasma contaminants. Methods proposed to reduce surface erosion have included control of surface temperature, selection of materials with a favorable microstructure, chemical and mechanical treatment of surfaces, and employment of protective surface coatings, wall liners, and divertors. The advantages and disadvantages of some of these methods are discussed

  11. Erosive lichen planus: a therapeutic challenge.

    Science.gov (United States)

    Romero, Williams; Giesen, Laura; Navajas-Galimany, Lucas; Gonzalez, Sergio

    2016-01-01

    Erosive lichen planus is an uncommon variant of lichen planus. Chronic erosions of the soles, accompanied by intense and disabling pain, are some of its most characteristic manifestations. We present the case of a woman who developed oral and plantar erosive lichen planus associated with lichen planus pigmentosus and ungueal lichen planus that were diagnosed after several years. The patient failed to respond to multiple therapies requiring longstanding medication but remained refractory. Knowledge of the treatment options for erosive lichen planus is insufficient. Further research is required to clarify their effectiveness, ideally adopting an evidence-based methodology.

  12. Robotic weld overlay coatings for erosion control

    Science.gov (United States)

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB's.

  13. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. The influence of rill density on soil erosion against USLE-soil erosion methode

    OpenAIRE

    Rizalihadi, A.M.; Faimah, B.E.; Nazia, C.L.

    2013-01-01

    Land and water is one of the major natural resource which has an important role for human life. Exploitation of land in catchment areas that not correspond to its carrying capacity will cause damage. One of the effect is increassing the soil erosion. Continuous erosion will also lead to increased sediment transport in rivers that disrupt the ship navigation on estuary due sediment accumulation. At present, soil erosion is estimated using USLE method, which is only limited to the erosion in th...

  15. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  16. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  17. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  18. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  19. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  20. Quantifying accelerated soil erosion through ecological site-based assessments of wind and water erosion

    Science.gov (United States)

    This work explores how organising soil erosion assessments using established groupings of similar soils (ecological sites) can inform systems for managing accelerated soil erosion. We evaluated aeolian sediment transport and fluvial erosion rates for five ecological sites in southern New Mexico, USA...

  1. Farmers' identification of erosion indicators and related erosion damage in the Central Highlands of Kenya

    NARCIS (Netherlands)

    Sterk, G.; Okoba, B.O.

    2006-01-01

    Most soil and water conservation planning approaches rely on empirical assessment methods and hardly consider farmers' knowledge of soil erosion processes. Farmers' knowledge of on-site erosion indicators could be useful in assessing the site-specific erosion risk before planning any conservation

  2. Quantifying the erosion effect on current carbon budget of European agricultural soils at high spatial resolution.

    Science.gov (United States)

    Lugato, Emanuele; Paustian, Keith; Panagos, Panos; Jones, Arwyn; Borrelli, Pasquale

    2016-05-01

    The idea of offsetting anthropogenic CO2 emissions by increasing global soil organic carbon (SOC), as recently proposed by French authorities ahead of COP21 in the 'four per mil' initiative, is notable. However, a high uncertainty still exits on land C balance components. In particular, the role of erosion in the global C cycle is not totally disentangled, leading to disagreement whether this process induces lands to be a source or sink of CO2. To investigate this issue, we coupled soil erosion into a biogeochemistry model, running at 1 km(2) resolution across the agricultural soils of the European Union (EU). Based on data-driven assumptions, the simulation took into account also soil deposition within grid cells and the potential C export to riverine systems, in a way to be conservative in a mass balance. We estimated that 143 of 187 Mha have C erosion rates 0.45 Mg C ha(-1) yr(-1). In comparison with a baseline without erosion, the model suggested an erosion-induced sink of atmospheric C consistent with previous empirical-based studies. Integrating all C fluxes for the EU agricultural soils, we estimated a net C loss or gain of -2.28 and +0.79 Tg yr(-1) of CO2 eq, respectively, depending on the value for the short-term enhancement of soil C mineralization due to soil disruption and displacement/transport with erosion. We concluded that erosion fluxes were in the same order of current carbon gains from improved management. Even if erosion could potentially induce a sink for atmospheric CO2, strong agricultural policies are needed to prevent or reduce soil erosion, in order to maintain soil health and productivity. © 2015 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  3. Monthly Rainfall Erosivity Assessment for Switzerland

    Science.gov (United States)

    Schmidt, Simon; Meusburger, Katrin; Alewell, Christine

    2016-04-01

    Water erosion is crucially controlled by rainfall erosivity, which is quantified out of the kinetic energy of raindrop impact and associated surface runoff. Rainfall erosivity is often expressed as the R-factor in soil erosion risk models like the Universal Soil Loss Equation (USLE) and its revised version (RUSLE). Just like precipitation, the rainfall erosivity of Switzerland has a characteristic seasonal dynamic throughout the year. This inter-annual variability is to be assessed by a monthly and seasonal modelling approach. We used a network of 86 precipitation gauging stations with a 10-minute temporal resolution to calculate long-term average monthly R-factors. Stepwise regression and Monte Carlo Cross Validation (MCCV) was used to select spatial covariates to explain the spatial pattern of R-factor for each month across Switzerland. The regionalized monthly R-factor is mapped by its individual regression equation and the ordinary kriging interpolation of its residuals (Regression-Kriging). As covariates, a variety of precipitation indicator data has been included like snow height, a combination of hourly gauging measurements and radar observations (CombiPrecip), mean monthly alpine precipitation (EURO4M-APGD) and monthly precipitation sums (Rhires). Topographic parameters were also significant explanatory variables for single months. The comparison of all 12 monthly rainfall erosivity maps showed seasonality with highest rainfall erosivity in summer (June, July, and August) and lowest rainfall erosivity in winter months. Besides the inter-annual temporal regime, a seasonal spatial variability was detectable. Spatial maps of monthly rainfall erosivity are presented for the first time for Switzerland. The assessment of the spatial and temporal dynamic behaviour of the R-factor is valuable for the identification of more susceptible seasons and regions as well as for the application of selective erosion control measures. A combination with monthly vegetation

  4. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  5. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  6. Rainfall erosivity in Brazil: A Review

    Science.gov (United States)

    In this paper, we review the erosivity studies conducted in Brazil to verify the quality and representativeness of the results generated and to provide a greater understanding of the rainfall erosivity (R-factor) in Brazil. We searched the ISI Web of Science, Scopus, SciELO, and Google Scholar datab...

  7. Interrill soil erosion processes on steep slopes

    Science.gov (United States)

    To date interrill erosion processes and regimes are not fully understood. The objectives are to 1) identify the erosion regimes and limiting processes between detachment and transport on steep slopes, 2) characterize the interactive effects between rainfall intensity and flow depth on sediment trans...

  8. Soil erosion dynamics response to landscape pattern

    NARCIS (Netherlands)

    Ouyang, W.; Skidmore, A.K.; Hao, F.; Wang, T.

    2010-01-01

    Simulating soil erosion variation with a temporal land use database reveals long-term fluctuations in landscape patterns, as well as priority needs for soil erosion conservation. The application of a multi-year land use database in support of a Soil Water Assessment Tool (SWAT) led to an accurate

  9. Wind erosion modelling in a Sahelian environment

    NARCIS (Netherlands)

    Faye-Visser, S.M.; Sterk, G.; Karssenberg, D.

    2005-01-01

    In the Sahel field observations of wind-blown mass transport often show considerable spatial variation related to the spatial variation of the wind erosion controlling parameters, e.g. soil crust and vegetation cover. A model, used to predict spatial variation in wind erosion and deposition is a

  10. Reduction of soil erosion on forest roads

    Science.gov (United States)

    Edward R. Burroughs; John G. King

    1989-01-01

    Presents the expected reduction in surface erosion from selected treatments applied to forest road traveledways, cutslopes, fillslopes, and ditches. Estimated erosion reduction is expressed as functions of ground cover, slope gradient, and soil properties whenever possible. A procedure is provided to select rock riprap size for protection of the road ditch.

  11. Forest road erosion control using multiobjective optimization

    Science.gov (United States)

    Matthew Thompson; John Sessions; Kevin Boston; Arne Skaugset; David Tomberlin

    2010-01-01

    Forest roads are associated with accelerated erosion and can be a major source of sediment delivery to streams, which can degrade aquatic habitat. Controlling road-related erosion therefore remains an important issue for forest stewardship. Managers are faced with the task to develop efficient road management strategies to achieve conflicting environmental and economic...

  12. Past, Present, Future Erosion at Locke Island

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, Bruce N.

    2006-08-08

    This report describes and documents the erosion that has occurred along the northeast side of Locke Island over the last 10 to 20 years. The principal cause of this erosion is the massive Locke Island landslide complex opposite the Columbia River along the White Bluffs, which constricts the flow of the river and deflects the river's thalweg southward against the island.

  13. Tools for Ephemeral Gully Erosion Process Research

    Science.gov (United States)

    Techniques to quantify ephemeral gully erosion have been identified by USDA Natural Resources Conservation Service (NRCS) as one of gaps in current erosion assessment tools. One reason that may have contributed to this technology gap is the difficulty to quantify changes in channel geometry to asses...

  14. Developing empirical relationship between interrill erosion, rainfall ...

    African Journals Online (AJOL)

    In order to develop an empirical relationship for interrill erosion based on rainfall intensity, slope steepness and soil types, an interrill erosion experiment was conducted using laboratory rainfall simulator on three soil types (Vertisols, Cambisols and Leptosols) for the highlands of North Shewa Zone of Oromia Region.

  15. Rethinking erosion on Java: a reaction

    NARCIS (Netherlands)

    Graaff, de J.; Wiersum, K.F.

    1992-01-01

    In a recent article (Diemont et al., 1991) about erosion on Java, it has been postulated that low inputs, not surface erosion, is the main cause of low productivity of upland food crops on this island. In this article it is argued that this hypothesis is too simple. An analysis of empirical field

  16. The erosive potential of candy sprays

    NARCIS (Netherlands)

    Gambon, D.L.; Brand, H.S.; Nieuw Amerongen, A.V.

    2009-01-01

    Objective To determine the erosive potential of seven different commercially available candy sprays in vitro and in vivo. Material and methods The erosive potential was determined in vitro by measuring the pH and neutralisable acidity. The salivary pH and flow rate were measured in healthy

  17. Dental erosion: prevalence, incidence, and distribution

    NARCIS (Netherlands)

    Jager, D.H.J.; Amaechi, B.T.

    2015-01-01

    Dental erosion is one of the most common dental diseases and it is a growing problem. Numerous epidemiological studies have investigated the prevalence of dental erosion. For these studies different cross sections of the population are investigated. Large differences were found between countries,

  18. Backward erosion piping : Initiation and progression

    NARCIS (Netherlands)

    Van Beek, V.M.

    2015-01-01

    Backward erosion piping is an internal erosion mechanism during which shallow pipes are formed in the direction opposite to the flow underneath water-retaining structures as a result of the gradual removal of sandy material by the action of water. It is an important failure mechanism in both dikes

  19. Regionalization of monthly rainfall erosivity patternsin Switzerland

    Science.gov (United States)

    Schmidt, Simon; Alewell, Christine; Panagos, Panos; Meusburger, Katrin

    2016-10-01

    One major controlling factor of water erosion is rainfall erosivity, which is quantified as the product of total storm energy and a maximum 30 min intensity (I30). Rainfall erosivity is often expressed as R-factor in soil erosion risk models like the Universal Soil Loss Equation (USLE) and its revised version (RUSLE). As rainfall erosivity is closely correlated with rainfall amount and intensity, the rainfall erosivity of Switzerland can be expected to have a regional characteristic and seasonal dynamic throughout the year. This intra-annual variability was mapped by a monthly modeling approach to assess simultaneously spatial and monthly patterns of rainfall erosivity. So far only national seasonal means and regional annual means exist for Switzerland. We used a network of 87 precipitation gauging stations with a 10 min temporal resolution to calculate long-term monthly mean R-factors. Stepwise generalized linear regression (GLM) and leave-one-out cross-validation (LOOCV) were used to select spatial covariates which explain the spatial and temporal patterns of the R-factor for each month across Switzerland. The monthly R-factor is mapped by summarizing the predicted R-factor of the regression equation and the corresponding residues of the regression, which are interpolated by ordinary kriging (regression-kriging). As spatial covariates, a variety of precipitation indicator data has been included such as snow depths, a combination product of hourly precipitation measurements and radar observations (CombiPrecip), daily Alpine precipitation (EURO4M-APGD), and monthly precipitation sums (RhiresM). Topographic parameters (elevation, slope) were also significant explanatory variables for single months. The comparison of the 12 monthly rainfall erosivity maps showed a distinct seasonality with the highest rainfall erosivity in summer (June, July, and August) influenced by intense rainfall events. Winter months have the lowest rainfall erosivity. A proportion of 62 % of

  20. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms.

    Science.gov (United States)

    Dreano, Denis; Raitsos, Dionysios E; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2016-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  1. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis; Raitsos, Dionysios E.; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2017-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  2. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis

    2017-01-09

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  3. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  4. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  5. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  6. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  7. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  8. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  9. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  10. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  11. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  12. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  13. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  14. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  15. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  16. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  17. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  18. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  19. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  20. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  1. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  2. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  3. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  4. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  5. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  6. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  7. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  8. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  9. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  10. Erosion testing of hard materials and coatings

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Jeffrey A.

    2005-04-29

    Erosion is the process by which unconstrained particles, usually hard, impact a surface, creating damage that leads to material removal and component failure. These particles are usually very small and entrained in fluid of some type, typically air. The damage that occurs as a result of erosion depends on the size of the particles, their physical characteristics, the velocity of the particle/fluid stream, and their angle of impact on the surface of interest. This talk will discuss the basics of jet erosion testing of hard materials, composites and coatings. The standard test methods will be discussed as well as alternative approaches to determining the erosion rate of materials. The damage that occurs will be characterized in genera1 terms, and examples will be presented for the erosion behavior of hard materials and coatings (both thick and thin).

  11. Modelling rainfall erosion resulting from climate change

    Science.gov (United States)

    Kinnell, Peter

    2016-04-01

    It is well known that soil erosion leads to agricultural productivity decline and contributes to water quality decline. The current widely used models for determining soil erosion for management purposes in agriculture focus on long term (~20 years) average annual soil loss and are not well suited to determining variations that occur over short timespans and as a result of climate change. Soil loss resulting from rainfall erosion is directly dependent on the product of runoff and sediment concentration both of which are likely to be influenced by climate change. This presentation demonstrates the capacity of models like the USLE, USLE-M and WEPP to predict variations in runoff and erosion associated with rainfall events eroding bare fallow plots in the USA with a view to modelling rainfall erosion in areas subject to climate change.

  12. Erosion Pressure on the Danish Coasts

    DEFF Research Database (Denmark)

    Sørensen, Carlo Sass; Sørensen, Per; Kroon, Aart

    Coastlines around the world are receding due to coastal erosion.With rising sea levels and a potential climatic deterioration due to climate change, erosion rates are likely to increase at many locations in the future.Together with the current preference of people to settle near or directly...... by the ocean, coastal erosion issues become increasingly more important to the human values at risk. Along many Danish coastlines, hard structures already act as coastal protection in the form of groins, breakwaters, revetments etc. These eroding coasts however still lack sand and where the public, in general......, neglects the need for sand replenishment i.e. in the form of repeated sand nourishments. Here we present a conceptual model and method for dividing coastal erosion into acute and chronic erosion pressure, respectively. We focus on the model use for management and climate change adaptation purposes...

  13. Dietary assessment and counseling for dental erosion.

    Science.gov (United States)

    Marshall, Teresa A

    2018-02-01

    Dental erosion occurs after exposure to intrinsic or extrinsic acids. Exposure to intrinsic gastrointestinal acids is associated with anorexia nervosa, bulimia nervosa, rumination syndrome, or gastroesophageal reflux. Extrinsic dietary acids from foods or beverages also can cause erosion, particularly when exposure is prolonged by holding or swishing behaviors. Clinicians should screen patients exhibiting dental erosion for anorexia nervosa, bulimia nervosa, rumination syndrome, and gastroesophageal reflux disease. Clinicians should screen patients without a medical explanation for their erosion for exposure to acidic foods and beverages, particularly for habits that prolong exposure. Identification of intrinsic and extrinsic acid exposures and recommendations to minimize exposures are important to prevent erosion and maintain oral health. Copyright © 2018 American Dental Association. Published by Elsevier Inc. All rights reserved.

  14. Medication-related dental erosion: a review.

    Science.gov (United States)

    Thomas, Manuel S; Vivekananda Pai, A R; Yadav, Amit

    2015-10-01

    Dental erosion has become a major problem that affects the long-term health of the dentition. Among the various potential causes for erosive tooth wear, the different drugs prescribed for patients may be overlooked. Several therapeutic medications can directly or indirectly be associated with dental erosion. It is the responsibility of oral health providers to make both patients and colleagues aware of drugs that may contribute to this condition. Therefore, the purpose of this discussion is to provide an overview of the various therapeutic medications that can be related to tooth erosion. The authors also include precautionary measures-summarized as The 9 Rs-to avoid or at least reduce medication-induced erosion.

  15. Soil erosion processes on sloping land using REE tracer

    International Nuclear Information System (INIS)

    Shen Zhenzhou; Liu Puling; Yang Mingyi; Lian Zhenlong; Ju Tongjun; Yao Wenyi; Li Mian

    2007-01-01

    Sheet erosion is the main performance in the slope soil erosion process at the primary stage of natural rainfall. For three times of rainfall during experiment, the ratios of sheet erosion to total erosion account for 71%, 48% and 49% respectively, which showed that the sloping erosion was still at the primary stage from sheet erosion to rill erosion. With the rainfall going, the rill erosion amount increase. It showed that soil erosion was changing from sheet erosion to rill erosion. The sources of sediment from different sections of the plot were analyzed, and the results indicated that whatever the sheet erosion changed, the ratio erosion of upper part of surface soil was always lower than 10%. Sheet erosion came mainly from the lower section of surface soil. With the ratios to the amount of total rill erosion changes, the rill erosion amount of each section regularly changes too. The general conclusion is that when the rainfall ends, relative erosion of different slope element to the foot of slope is: 1 meter away accounts for 16%, 2-4 meters away is 6% and 5-9 meters away is 3%. The ratio of rill erosion amount of these three slope element is 5:2:1, which shows the rill erosion amount are mainly from the slope element of 4 meters from the foot of slope. (authors)

  16. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  17. Erosion resistance comparison of alternative surface treatments

    Science.gov (United States)

    Česánek, Z.; Schubert, J.; Houdková, Š.

    2017-05-01

    Erosion is a process characterized by the particle separation and the damage of component functional surfaces. Thermal spraying technology HP/HVOF (High Pressure / High Velocity Oxygen Fuel) is commonly used for protection of component surfaces against erosive wear. Alloy as well as cermet based coatings meet the requirements for high erosion resistance. Wear resistance is in many cases the determining property of required component functioning. The application suitability of coating materials is particularly influenced by different hardness. This paper therefore presents an erosion resistance comparison of alloy and cermet based coatings. The coatings were applied on steel substrates and were subjected to the erosive test using the device for evaluation of material erosion resistance working on the principle of centrifugal erodent flow. Abrasive sand Al2O3 with grain size 212-250 μm was selected as an erosive material. For this purpose, the specimens were prepared by thermal spraying technology HP/HVOF using commercially available powders Stellite 6, NiCrBSi, Cr3C2-25%NiCr, Cr3C2-25%CoNiCrAlY, Hastelloy C-276 and experimental coating TiMoCN-29% Ni. Erosion resistance of evaluated coatings was compared with erosive resistance of 1.4923 high alloyed steel without nitridation and in nitrided state and further with surface treatment using technology PVD. According to the evaluation, the resulting erosive resistance depends not only on the selected erodent and surface protection, but also on the erodent impact angle.

  18. Dynamic Analysis of Soil Erosion in Songhua River Watershed

    Science.gov (United States)

    Zhang, Yujuan; Li, Xiuhai; Wang, Qiang; Liu, Jiang; Liang, Xin; Li, Dan; Ni, Chundi; Liu, Yan

    2018-01-01

    In this paper, based on RS and GIS technology and Revised Universal Soil Loss Equation (RUSLE), the soil erosion dynamic changes during the two periods of 1990 and 2010 in Bin County was analyzed by using the Landsat TM data of the two periods, so as to reveal the soil erosion spatial distribution pattern and spatial and temporal dynamic evolution rule in the region. The results showed that: the overall patterns of soil erosion were basically the same in both periods, mainly featuring slight erosion and mild erosion, with the area proportions of 80.68% and 74.71% respectively. The slight and extremely intensive erosion changing rates showed a narrowing trend; mild, moderate and intensive erosion was increasing, with a trend of increased soil erosion; mild and intensive erosion were developing towards moderate erosion and moderate and extremely intensive erosion were progressing towards intensive erosion.

  19. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  20. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  1. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  2. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  3. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  4. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  5. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  6. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  7. Mapping monthly rainfall erosivity in Europe.

    Science.gov (United States)

    Ballabio, Cristiano; Borrelli, Pasquale; Spinoni, Jonathan; Meusburger, Katrin; Michaelides, Silas; Beguería, Santiago; Klik, Andreas; Petan, Sašo; Janeček, Miloslav; Olsen, Preben; Aalto, Juha; Lakatos, Mónika; Rymszewicz, Anna; Dumitrescu, Alexandru; Tadić, Melita Perčec; Diodato, Nazzareno; Kostalova, Julia; Rousseva, Svetla; Banasik, Kazimierz; Alewell, Christine; Panagos, Panos

    2017-02-01

    Rainfall erosivity as a dynamic factor of soil loss by water erosion is modelled intra-annually for the first time at European scale. The development of Rainfall Erosivity Database at European Scale (REDES) and its 2015 update with the extension to monthly component allowed to develop monthly and seasonal R-factor maps and assess rainfall erosivity both spatially and temporally. During winter months, significant rainfall erosivity is present only in part of the Mediterranean countries. A sudden increase of erosivity occurs in major part of European Union (except Mediterranean basin, western part of Britain and Ireland) in May and the highest values are registered during summer months. Starting from September, R-factor has a decreasing trend. The mean rainfall erosivity in summer is almost 4 times higher (315MJmmha -1 h -1 ) compared to winter (87MJmmha -1 h -1 ). The Cubist model has been selected among various statistical models to perform the spatial interpolation due to its excellent performance, ability to model non-linearity and interpretability. The monthly prediction is an order more difficult than the annual one as it is limited by the number of covariates and, for consistency, the sum of all months has to be close to annual erosivity. The performance of the Cubist models proved to be generally high, resulting in R 2 values between 0.40 and 0.64 in cross-validation. The obtained months show an increasing trend of erosivity occurring from winter to summer starting from western to Eastern Europe. The maps also show a clear delineation of areas with different erosivity seasonal patterns, whose spatial outline was evidenced by cluster analysis. The monthly erosivity maps can be used to develop composite indicators that map both intra-annual variability and concentration of erosive events. Consequently, spatio-temporal mapping of rainfall erosivity permits to identify the months and the areas with highest risk of soil loss where conservation measures should be

  8. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  9. Coupled Wave Energy and Erosion Dynamics along a Salt Marsh Boundary, Hog Island Bay, Virginia, USA

    Directory of Open Access Journals (Sweden)

    Anthony M. Priestas

    2015-09-01

    Full Text Available The relationship between lateral erosion of salt marshes and wind waves is studied in Hog Island Bay, Virginia USA, with high-resolution field measurements and aerial photographs. Marsh retreat is compared to wave climate calculated in the bay using the spectral wave-model Simulating Waves Nearshore (SWAN. We confirm the existence of a linear relationship between long-term salt marsh erosion and wave energy, and show that wave power can serve as a good proxy for average salt-marsh erosion rates. At each site, erosion rates are consistent across several temporal scales, ranging from months to decades, and are strongly related to wave power. On the contrary, erosion rates vary in space and weakly depend on the spatial distribution of wave energy. We ascribe this variability to spatial variations in geotechnical, biological, and morphological marsh attributes. Our detailed field measurements indicate that at a small spatial scale (tens of meters, a positive feedback between salt marsh geometry and wave action causes erosion rates to increase with boundary sinuosity. However, at the scale of the entire marsh boundary (hundreds of meters, this relationship is reversed: those sites that are more rapidly eroding have a marsh boundary which is significantly smoother than the marsh boundary of sheltered and slowly eroding marshes.

  10. Model based estimation of sediment erosion in groyne fields along the River Elbe

    International Nuclear Information System (INIS)

    Prohaska, Sandra; Jancke, Thomas; Westrich, Bernhard

    2008-01-01

    River water quality is still a vital environmental issue, even though ongoing emissions of contaminants are being reduced in several European rivers. The mobility of historically contaminated deposits is key issue in sediment management strategy and remediation planning. Resuspension of contaminated sediments impacts the water quality and thus, it is important for river engineering and ecological rehabilitation. The erodibility of the sediments and associated contaminants is difficult to predict due to complex time depended physical, chemical, and biological processes, as well as due to the lack of information. Therefore, in engineering practice the values for erosion parameters are usually assumed to be constant despite their high spatial and temporal variability, which leads to a large uncertainty of the erosion parameters. The goal of presented study is to compare the deterministic approach assuming constant critical erosion shear stress and an innovative approach which takes the critical erosion shear stress as a random variable. Furthermore, quantification of the effective value of the critical erosion shear stress, its applicability in numerical models, and erosion probability will be estimated. The results presented here are based on field measurements and numerical modelling of the River Elbe groyne fields.

  11. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  12. Lithosphere erosion atop mantle plumes

    Science.gov (United States)

    Agrusta, R.; Arcay, D.; Tommasi, A.

    2012-12-01

    Mantle plumes are traditionally proposed to play an important role in lithosphere erosion. Seismic images beneath Hawaii and Cape Verde show a lithosphere-asthenosphere-boundary (LAB) up to 50 km shallower than the surroundings. However, numerical models show that unless the plate is stationary the thermo-mechanical erosion of the lithosphere does not exceed 30 km. We use 2D petrological-thermo-mechanical numerical models based on a finite-difference method on a staggered grid and marker in cell method to study the role of partial melting on the plume-lithosphere interaction. A homogeneous peridotite composition with a Newtonian temperature- and pressure-dependent viscosity is used to simulate both the plate and the convective mantle. A constant velocity, ranging from 5 to 12.5 cm/yr, is imposed at the top of the plate. Plumes are created by imposing a thermal anomaly of 150 to 350 K on a 50 km wide domain at the base of the model (700 km depth); the plate right above the thermal anomaly is 40 Myr old. Partial melting is modeled using batch-melting solidus and liquidus in anhydrous conditions. We model the progressive depletion of peridotite and its effect on partial melting by assuming that the melting degree only strictly increases through time. Melt is accumulated until a porosity threshold is reached and the melt in excess is then extracted. The rheology of the partially molten peridotite is determined using viscous constitutive relationship based on a contiguity model, which enables to take into account the effects of grain-scale melt distribution. Above a threshold of 1%, melt is instantaneously extracted. The density varies as a function of partial melting degree and extraction. Besides, we analyze the kinematics of the plume as it impacts a moving plate, the dynamics of time-dependent small-scale convection (SSC) instabilities developing in the low-viscosity layer formed by spreading of hot plume material at the lithosphere base, and the resulting thermal

  13. X-ray diagnosis of erosive gastritis

    International Nuclear Information System (INIS)

    Taskov, A.; Krastin, A.

    1993-01-01

    A series of 602 patients are studied according to a standard protocol including double contrast examination, taking films with dosed compression and complete filling (accordingly 3+3+1 radiographs). A barium suspension at concentration 200.0 BaSO 4 in 100 ml water is used as a positive contrast medium, and effervescent powder or pills - as a negative contrast. Erosive gastritis is diagnosed in 48 patients (7.9%) of which 38 present complete erosions (79.2%), 6 (12.6%) - incomplete, and 4 (8.3%) - mixed erosions. In 35 cases (72.9%) erosions are differentiated in double-contrast films, while in 21 (43.8%) - in those with compression. The advantage of the double contrast technique consists in visualization of erosions of the body of the stomach and discovering of incomplete erosions. In 483 patients a comparative assessment is done of the X-ray and endoscopic findings. There are recorded 5 false-positive and 25 false-negative radiological results. The sensitivity of the X-ray study in terms of erosive gastritis amounts to 59.7%. 15 refs., 4 figs. (orig.)

  14. Erosion and stability of a mine soil

    International Nuclear Information System (INIS)

    Wu, T.H.; Stadler, A.T.; Low, C.

    1996-01-01

    Mine soils developed from mine spoils commonly have a wide range of particle size. The slopes of old spoil piles usually are marked by gullies due to years of uncontrolled erosion. These characteristics raise questions about applicability of available theories and models for estimating runoff and erosion. An investigation was made to determine whether available erosion models can work for mine soils and can account for gully erosion. The investigation at an abandoned surface mine consisted of measurement of soil and sediment properties, measurement of runoff and erosion, observations of armor by rock fragments on gully floor, and calculations with available theories of sediment transport and slope stability. The results at this site suggest that (1) predictions with the ANSWERS model have about the same accuracy as those made for agricultural lands; (2) armor provided by rock fragments are temporary as they are periodically removed by debris flows; (3) detachment by rainfall impact is the primary cause of erosion on short steep slopes; and (4) a simplified method can be used for estimating erosion on such slopes

  15. Soft drinks and in vitro dental erosion.

    Science.gov (United States)

    Gravelle, Brent L; Hagen Ii, Ted W; Mayhew, Susan L; Crumpton, Brooks; Sanders, Tyler; Horne, Victoria

    2015-01-01

    The purpose of this investigation was to determine to what extent the in vitro exposure of healthy teeth to various commonly consumed carbonated soft drinks may precipitate dental erosion. Forty-two healthy, extracted, previously unerupted human molars were weighed prior to, during, and after suspension in various sugared and diet or zero-calorie carbonated beverages for 20 days; the specimens were stored at room temperature while being stirred at 275 rpm. The percentage decrease in tooth weight from before to after exposure represented the weight loss due to enamel erosion; values in the experimental groups varied from 3.22% to 44.52% after 20 days' exposure. Data were subjected to analysis of variance and post hoc Scheffe testing at a level of α = 0.05. Nonsugared drinks (diet and zero-calorie) as a whole were more erosive than sugared beverages. A significant positive correlation was found between the amount of titratable acid and percentage of tooth erosion, while a significant negative correlation was revealed between the beverage pH and percentage of tooth erosion. No significant correlations were found between calcium or phosphate ion concentrations and the amount of erosion. It appears that enamel erosion is dependent on not only the beverage flow rate, pH, and amount of titratable acid, but also whether the soft drink is of the diet or zero-calorie variety, which reflects the type of artificial sweetener present.

  16. Estimating surface soil erosion losses and mapping erosion risk for Yusufeli micro-catchment (Artvin

    Directory of Open Access Journals (Sweden)

    Mustafa Tüfekçioğlu

    2016-10-01

    Full Text Available Sheet erosion, one of the most important types of water erosion, takes place on the top soil as tiny soil layer movement that affects lake and stream ecosystem. This type of erosion is very important because the productive soil layer on the top soil can be lost in a very short period of time. The goal of this study was to quantify the amount of surface (sheet and rill soil erosion, and to identify areas under high erosion risk within the study area at Yusufeli province in Artvin by using RUSLE erosion methodology. As a result of the study it was found that the average annual potential soil loss by surface erosion was 3.6 ton ha-1yr-1. Additionally, the maps produced and conclusions reached by the study revealed that the areas of high erosion risk were identified spatially and measures to control erosion on some of these high risk areas can be possible with appropriate erosion control techniques.

  17. Erosion by rain in the western Congo

    International Nuclear Information System (INIS)

    Ploey, J. de

    1967-01-01

    Vast expanses of the western part of central and southern Africa are covered with uniform, sandy formations of the Kalahari type. The topography of these areas and their present morphological characteristics are mainly the result of erosion by rain. Information on the hydrology of the surface waters in these areas is fairly limited and is insufficient to permit any conclusions regarding the way in which erosion by rain takes place. To obtain a better understanding of these phenomena, the author devised a series of experiments based on the use of 46 Sc-labelled radioactive sand. These experiments began at the beginning of the 1964/65 rainy season and are continuing. The experimental plot corresponds to convex and rectilinear portions of a hillside with a slope varying between 0 and 12 degrees. The vegetation consists of grassy savannah of substeppe appearance and secondary forests. Series of labelled samples were placed successively on the surface of the experimental plot and the erosive effect of rain was determined by measuring the residual concentrations after rainfall. Some samples were placed below a shield so as to eliminate the effects of splash and reveal the part played by runoff. Radiographic films were used to study the dispersion of labelled particles in the surrounding area. This radiographic method made it possible to determine the scale of erosion by splash for different rainfall conditions. The erosion diagrams obtained from these experiments show the correlations that exist between the intensity and duration of the rainfall and the erosion of the soil. Examination of the erosion diagrams and the shielded samples and analysis of the radiographs showed that erosion by rain on Kalahari ground covered with substeppe savannah is caused mainly by splash erosion and by dispersed, intermittent runoff. Sheet wash plays no part if the slope is less than 12 degrees. (author) [fr

  18. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  19. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  20. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  1. Modeling Megacusps and Dune Erosion

    Science.gov (United States)

    Orzech, M.; Reniers, A. J.; Thornton, E. B.

    2009-12-01

    Megacusps are large, concave, erosional features of beaches, of O(200m) alongshore wavelength, which sometimes occur when rip channel bathymetry is present. It is commonly hypothesized that erosion of the dune and back beach will be greater at the alongshore locations of the megacusp embayments, principally because the beach width is narrower there and larger waves can more easily reach the dune toe (e.g., Short, J. Geol., 1979, Thornton, et al., Mar. Geol., 2007). At present, available field data in southern Monterey Bay provide some support for this hypothesis, but not enough to fully confirm or refute it. This analysis utilizes XBeach, a 2DH nearshore sediment transport model, to test the above hypothesis under a range of wave conditions over several idealized rip-megacusp bathymetries backed by dunes. Model results suggest that while specific wave conditions may result in erosional hot spots at megacusp embayments, other factors such as tides, wave direction, and surf zone bathymetry can often play an equal or stronger role.

  2. [Gastric band erosion: Alternative management].

    Science.gov (United States)

    Echaverry-Navarrete, Denis José; Maldonado-Vázquez, Angélica; Cortes-Romano, Pablo; Cabrera-Jardines, Ricardo; Mondragón-Pinzón, Erwin Eduardo; Castillo-González, Federico Armando

    2015-01-01

    Obesity is a public health problem, for which the prevalence has increased worldwide at an alarming rate, affecting 1.7 billion people in the world. To describe the technique employed in incomplete penetration of gastric band where endoscopic management and/or primary closure is not feasible. Laparoscopic removal of gastric band was performed in five patients with incomplete penetrance using Foley catheterization in the perforation site that could lead to the development of a gastro-cutaneous fistula. The cases presented include a leak that required surgical lavage with satisfactory outcome, and one patient developed stenosis 3 years after surgical management, which was resolved endoscopically. In all cases, the penetration site closed spontaneously. Gastric band erosion has been reported in 3.4% of cases. The reason for inserting a catheter is to create a controlled gastro-cutaneous fistula, allowing spontaneous closure. Various techniques have been described: the totally endoscopic, hybrid techniques (endoscopic/laparoscopic) and completely laparoscopic. A technique is described here that is useful and successful in cases where the above-described treatments are not viable. Copyright © 2015. Published by Masson Doyma México S.A.

  3. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  4. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  5. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  6. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  7. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  8. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  9. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  10. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  11. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  13. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  14. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  15. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  16. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  17. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  18. Compressor Impeller Erosion Resistant Surface Treatment

    National Research Council Canada - National Science Library

    Riley, Michael

    2000-01-01

    ...). Coatings based on tungsten carbide tantalum carbide. titanium carbide all with a cobalt matrix were evaluated for high velocity particle erosion in conventional wear test studies as well as wind tunnel testing...

  19. Puerto Rico Relative Vulnerability to Erosion

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Physical factors, such as the slope of the land, the texture of the soil, and the precipitation regime influence erosion in an area. Parts of Puerto Rico are very...

  20. Paradiaphyseal calcific tendinitis with cortical bone erosion.

    Science.gov (United States)

    Fritz, P; Bardin, T; Laredo, J D; Ziza, J M; D'Anglejan, G; Lansaman, J; Bucki, B; Forest, M; Kuntz, D

    1994-05-01

    To determine the clinical, radiologic, and histologic features of calcific tendinitis with cortical bone erosion. The records of 6 patients with paradiaphyseal calcific tendinitis and adjacent bone cortex erosion were reviewed. Calcific tendinitis involved the linea aspera in 4 patients, the bicipital groove in 1 patient, and the deltoid insertion in another. Calcium deposits were associated with cortical bone erosions, revealed on plain radiographs in 4 patients and computed tomography scans in 2. Bone scans were performed in 2 patients and showed local hyperfixation of the isotope. In 4 patients, suspicion of a neoplasm led to a biopsy. Calcium deposits appeared to be surrounded by a foreign body reaction with numerous giant cells. Apatite crystals were identified by transmission electron microscopy and elemental analysis in 1 surgical sample. Paradiaphyseal calcific tendinitis with cortical bone erosion is an uncommon presentation of apatite deposition disease.

  1. Emission Facilities - Erosion & Sediment Control Facilities

    Data.gov (United States)

    NSGIC Education | GIS Inventory — An Erosion and Sediment Control Facility is a DEP primary facility type related to the Water Pollution Control program. The following sub-facility types related to...

  2. Understanding and Predicting Gun Barrel Erosion

    National Research Council Canada - National Science Library

    Johnston, Ian A

    2005-01-01

    The Australian Defence Force will soon have to contend with gun barrel erosion issues arising from the use of new low-vulnerability gun propellants, the acquisition of new ammunition and gun systems...

  3. Puerto Rico Relative Erosion Potential (REP) - 2000

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The relative erosion potential is an indicator of sediment and pollution runoff from land based on slope, soil type, land cover (circa 2000) and (maximum monthly)...

  4. Puerto Rico Relative Erosion Potential (REP) - 1990

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The relative erosion potential is an indicator of sediment and pollution runoff from land based on slope, soil type, land cover (circa 1990) and (maximum monthly)...

  5. Definition of tolerable soil erosion values

    Directory of Open Access Journals (Sweden)

    G. Sparovek

    1997-09-01

    Full Text Available Although the criteria for defining erosion tolerance are well established, the limits generally used are not consistent with natural, economical and technological conditions. Rates greater than soil formation can be accepted only until a minimum of soil depth is reached, provided that they are not associated with environmental hazard or productivity losses. A sequence of equations is presented to calculate erosion tolerance rates through time. The selection of equation parameters permits the definition of erosion tolerance rates in agreement with environmental, social and technical needs. The soil depth change that is related to irreversible soil degradation can be calculated. The definition of soil erosion tolerance according to these equations can be used as a guideline for sustainable land use planning and is compatible with expert systems.

  6. PROBLEMS OF SOIL PROTECTION FROM EROSION

    Directory of Open Access Journals (Sweden)

    M. Voloshuk

    2007-10-01

    Full Text Available In this article the problems of soil protection from erosion in Moldova are considered. The history (evolution of erosive processes is generalized, the first items of information on presence washed off soils are marked. Purposeful study of soil erosion, development of measures of struggle with it were begun in Moldova at the end of 40 years. In connection with transition to new economic methods of conducting economy (farmers, rent, privatization of land before pedologist, the experts of design organizations put forward the new requirements to study of erosive processes, development of soil protection, ecologo-adaptive systems of landscape agriculture. The tasks for improvement of a soil cover, restoration of fertility soil and their protection are put forward which are necessary for deciding in a near future.

  7. Rain Erosion/Measurement Impact Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The FARM Rain Erosion/Impact Measurement Lab develops solutions for deficiencies in the ability of materials, coatings and designs to withstand a severe operational...

  8. Soil erosion assessment - Mind the gap

    Science.gov (United States)

    Kim, Jongho; Ivanov, Valeriy Y.; Fatichi, Simone

    2016-12-01

    Accurate assessment of erosion rates remains an elusive problem because soil loss is strongly nonunique with respect to the main drivers. In addressing the mechanistic causes of erosion responses, we discriminate between macroscale effects of external factors - long studied and referred to as "geomorphic external variability", and microscale effects, introduced as "geomorphic internal variability." The latter source of erosion variations represents the knowledge gap, an overlooked but vital element of geomorphic response, significantly impacting the low predictability skill of deterministic models at field-catchment scales. This is corroborated with experiments using a comprehensive physical model that dynamically updates the soil mass and particle composition. As complete knowledge of microscale conditions for arbitrary location and time is infeasible, we propose that new predictive frameworks of soil erosion should embed stochastic components in deterministic assessments of external and internal types of geomorphic variability.

  9. MALIGNANT TRANSFORMATION OF EROSIVE ORAL LICHEN PLANUS

    Directory of Open Access Journals (Sweden)

    Siti Chumaeroh

    2006-04-01

    Full Text Available Lichen planus is a relatively common inflammatory disorder which may have cutaneous and or mucosal manifestation. The malignant potential of oral lichen planus is still debatable. Some authors are sceptical about the premalignant nature of the disease, while other investigators have reported that malignant transformations occur in 1-10% of the cases. The aim of this study is to report a case of erosive lichen plans which shows malignant transformation of histopathologic examination. A man of 39 years old visited the Dental Department or Kajradi's Hospital with pain symptoms of the palate, buccal and gingival mucosa on both sides for 6 months. The physical examination shows the white lesion with striae configuration and pain, red erosive area inside the palate extends to the buccal mucosa and the gingival mucosa. The suspect diagnosis is erosive lichen planus, but the histopathologic examination shows epidermoid carcinoma. It is concluded that erosive oral lichen planus has the potential to transform into epidermoid carcinoma.

  10. Dental erosion: understanding this pervasive condition.

    Science.gov (United States)

    Almeida e Silva, Júnio S; Baratieri, Luiz Narciso; Araujo, Edson; Widmer, Nicolas

    2011-08-01

    Dental erosion is a contemporary disease, mostly because of the change of the eating patterns that currently exist in society. It is a "silent" and multifactorial disease, and is highly influenced by habits and lifestyles. The prevalence of dental erosion has considerably increased, with this condition currently standing as a great challenge for the clinician, regarding the diagnosis, identification of the etiological factors, prevention, and execution of an adequate treatment. This article presents a dental erosion review and a case report of a restorative treatment of dental erosion lesions using a combination of bonded ceramic overlays to reestablish vertical dimension and composite resin to restore the worn palatal and incisal surfaces of the anterior upper teeth. Adequate function and esthetics can be achieved with this approach. © 2011 Wiley Periodicals, Inc.

  11. Numerical and experimental investigations on cavitation erosion

    Science.gov (United States)

    Fortes Patella, R.; Archer, A.; Flageul, C.

    2012-11-01

    A method is proposed to predict cavitation damage from cavitating flow simulations. For this purpose, a numerical process coupling cavitating flow simulations and erosion models was developed and applied to a two-dimensional (2D) hydrofoil tested at TUD (Darmstadt University of Technology, Germany) [1] and to a NACA 65012 tested at LMH-EPFL (Lausanne Polytechnic School) [2]. Cavitation erosion tests (pitting tests) were carried out and a 3D laser profilometry was used to analyze surfaces damaged by cavitation [3]. The method allows evaluating the pit characteristics, and mainly the volume damage rates. The paper describes the developed erosion model, the technique of cavitation damage measurement and presents some comparisons between experimental results and numerical damage predictions. The extent of cavitation erosion was correctly estimated in both hydrofoil geometries. The simulated qualitative influence of flow velocity, sigma value and gas content on cavitation damage agreed well with experimental observations.

  12. Erosion and Accretion on a Mudflat: The Importance of Very Shallow-Water Effects

    Science.gov (United States)

    Shi, Benwei; Cooper, James R.; Pratolongo, Paula D.; Gao, Shu; Bouma, T. J.; Li, Gaocong; Li, Chunyan; Yang, S. L.; Wang, Ya Ping

    2017-12-01

    Understanding erosion and accretion dynamics during an entire tidal cycle is important for assessing their impacts on the habitats of biological communities and the long-term morphological evolution of intertidal mudflats. However, previous studies often omitted erosion and accretion during very shallow-water stages (VSWS, water depths 0.2 m (i.e., probe submerged) are considered. These findings suggest that the magnitude of bed-level changes during VSWS should not be neglected when modeling morphodynamic processes. Our results are useful in understanding the mechanisms of micro-topography formation and destruction that often occur at VSWS, and also improve our understanding and modeling ability of coastal morphological changes.

  13. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  14. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  15. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  16. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  17. Soil erosion - a local and national problem

    Science.gov (United States)

    C.G. Bates; O.R. Zeasman

    1930-01-01

    The erosion of soils through the action of rain water and that from melting snow is almost universal in its occurrence. The gradual erosion and levelling of any country is inevitable, being a process which has gone on as long as there has been free water on the face of the earth. Nevertheless, this process is an extremely slow one where the landscape is naturally well...

  18. Natural and anthropogenic rates of soil erosion

    Directory of Open Access Journals (Sweden)

    Mark A. Nearing

    2017-06-01

    Full Text Available Regions of land that are brought into crop production from native vegetation typically undergo a period of soil erosion instability, and long term erosion rates are greater than for natural lands as long as the land continues being used for crop production. Average rates of soil erosion under natural, non-cropped conditions have been documented to be less than 2 Mg ha−1 yr−1. On-site rates of erosion of lands under cultivation over large cropland areas, such as in the United States, have been documented to be on the order of 6 Mg ha−1 yr−1 or more. In northeastern China, lands that were brought into production during the last century are thought to have average rates of erosion over this large area of as much as 15 Mg ha−1 yr−1 or more. Broadly applied soil conservation practices, and in particular conservation tillage and no-till cropping, have been found to be effective in reducing rates of erosion, as was seen in the United States when the average rates of erosion on cropped lands decreased from on the order of 9 Mg ha−1 yr−1 to 6 or 7 Mg ha−1 yr−1 between 1982 and 2002, coincident with the widespread adoption of new conservation tillage and residue management practices. Taking cropped lands out of production and restoring them to perennial plant cover, as was done in areas of the United States under the Conservation Reserve Program, is thought to reduce average erosion rates to approximately 1 Mg ha−1 yr−1 or less on those lands.

  19. Determining Wind Erosion in the Great Plains

    OpenAIRE

    Elwin G. Smith; Burton C. English

    1982-01-01

    Wind erosion is defined as the movement of soil particles resulting from strong turbulent winds. The movement of soil particles can be categorized as suspension, saltation, or surface creep. Fine soil particles can be suspended in the atmosphere and carried for great distances. Particles too large to be suspended move in a jumping action along the soil surface, known as saltation. Heavier particles have a rolling movement along the surface and this type of erosion is surface creep.

  20. Divertor erosion in DIII-D

    International Nuclear Information System (INIS)

    Whyte, D.G.; Bastasz, R.; Wampler, W.R.; Brooks, J.N.; West, W.P.; Wong, C.P.C.; Buzhinskij, O.I.; Opimach, I.V.

    1998-08-01

    Net erosion rates of carbon target plates have been measured in situ for the DIII-D lower divertor. The principal method of obtaining this data is the DiMES sample probe. Recent experiments have focused on erosion at the outer strike-point (OSP) of two divertor plasma conditions: attached (T e > 40 eV) ELMing plasmas, and detached (T e 2 . In this case, measurements and modeling agree for both gross and net carbon erosion, showing the near-surface transport and redeposition of the carbon is well understood. In the attached cases, physical sputtering (with enhancement from self-sputtering and oblique incidence) is dominant, and the effective sputtering yield, Y, is greater than 10%. In ELM-free discharges, the total OSP net erosion rate is equal to the rate of carbon accumulation in the core plasma. For the detached divertor cases, the cold incident plasma eliminates physical sputtering. Attempts to measure chemically eroded hydrocarbon molecules spectroscopically indicate an upper limit of Y ≤ 0.1% for the chemical sputtering yield. Net erosion is suppressed at the outer strike-point, which becomes a region of net redeposition (∼ 4 cm/exposure-year). The private flux wall is measured to be a region of net redeposition with dense, high neutral pressure, attached divertor plasmas. Leading edges intercepting parallel heat flux (∼ 50 MW/m 2 ) have very high net erosion rates at the OSP of an attached plasma (∼ 10 microm/s > 1,000x erosion rate of aligned surfaces). Leading edge erosion, and subsequent carbon redeposition, caused by tile gaps can account for half of the deuterium codeposition in the DIII-D divertor

  1. Airphoto analysis of erosion control practices

    Science.gov (United States)

    Morgan, K. M.; Morris-Jones, D. R.; Lee, G. B.; Kiefer, R. W.

    1980-01-01

    The Universal Soil Loss Equation (USLE) is a widely accepted tool for erosion prediction and conservation planning. In this study, airphoto analysis of color and color infrared 70 mm photography at a scale of 1:60,000 was used to determine the erosion control practice factor in the USLE. Information about contour tillage, contour strip cropping, and grass waterways was obtained from aerial photography for Pheasant Branch Creek watershed in Dane County, Wisconsin.

  2. Divertor erosion in DIII-D

    International Nuclear Information System (INIS)

    Whyte, D.G.; Bastasz, R.; Wampler, W.R.; Brooks, J.N.; West, W.P.; Wong, C.P.C.

    1998-05-01

    Net erosion rates of carbon target plates have been measured in situ for the DIII-D lower divertor. The principal method of obtaining this data is the DiMES sample probe. Recent experiments have focused on erosion at the outer strike-point of two divertor plasma conditions: (1) attached (Te > 40 eV) ELMing plasmas and (2) detached (Te 10 cm/year, even with incident heat flux 2 . In this case, measurements and modeling agree for both gross and net carbon erosion, showing the near-surface transport and redeposition of the carbon is well understood and that effective sputtering yields are > 10%. In ELM-free discharges, this erosion rate can account for the rate of carbon accumulation in the core plasma. Divertor plasma detachment eliminates physical sputtering, while spectroscopically measured chemical erosion yields are also found to be low (Y(C/D + ) ≤ 2.0 x 10 -3 ). This leads to suppression of net erosion at the outer strike-point, which becomes a region of net redeposition (∼ 4 cm/year). The private flux wall is measured to be a region of net redeposition with dense, high neutral pressure, attached divertor plasmas. Leading edges intercepting parallel heat flux (∼ 50 MW/m 2 ) have very high net erosion rates (∼ 10 microm/s) at the OSP of an attached plasma. Leading edge erosion, and subsequent carbon redeposition, caused by tile gaps can account for half of the deuterium codeposition in the DIII-D divertor

  3. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  4. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  5. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  6. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  7. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  8. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  9. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  10. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  11. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  12. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  13. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  14. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  15. Susceptibility of bovine dental enamel with initial erosion lesion to new erosive challenges.

    Directory of Open Access Journals (Sweden)

    Gabriela Cristina de Oliveira

    Full Text Available This in vitro study evaluated the impact of initial erosion on the susceptibility of enamel to further erosive challenge. Thirty bovine enamel blocks were selected by surface hardness and randomized into two groups (n = 15: GC- group composed by enamel blocks without erosion lesion and GT- group composed by enamel blocks with initial erosion lesion. The baseline profile of each block was determined using the profilometer. The initial erosion was produced by immersing the blocks into HCl 0.01 M, pH 2.3 for 30 seconds, under stirring. The erosive cycling consisted of blocks immersion in hydrochloric acid (0.01 M, pH 2.3 for 2 minutes, followed by immersion in artificial saliva for 120 minutes. This procedure was repeated 4 times a day for 5 days, and the blocks were kept in artificial saliva overnight. After erosive cycling, final profile measurement was performed. Profilometry measured the enamel loss by the superposition of initial and final profiles. Data were analyzed by t-test (p<0.05. The result showed no statistically significant difference between groups (GS = 14.60±2.86 and GE = .14.69±2.21 μm. The presence of initial erosion on bovine dental enamel does not enhance its susceptibility to new erosive challenges.

  16. Low cost sic coated erosion resistant graphite

    International Nuclear Information System (INIS)

    Zafar, M.F.; Nicholls, J.R.

    2007-01-01

    The development of materials with unique and improved properties using low cost processes is essential to increase performance and reduce cost of the solid rocket motors. Specifically advancements are needed for boost phase nozzle. As these motors operate at very high pressure and temperatures, the nozzle must survive high thermal stresses with minimal erosion to maintain performance. Currently three material choices are being exploited; which are refractory metals, graphite and carbon-carbon composites. Of these three materials graphite is the most attractive choice because of its low cost, light weight, and easy forming. However graphite is prone to erosion, both chemical and mechanical, which may affect the ballistic conditions and mechanical properties of the nozzle. To minimize this erosion high density graphite is usually preferred; which is again very expensive. Another technique used to minimize the erosion is Pyrolytic Graphite (PG) coating inside the nozzle. However PG coating is prone to cracking and spallation along with very cumbersome deposition process. Another possible methodology to avoid this erosion is to convert the inside surface of the rocket nozzle to Silicon Carbide (SiC), which is very erosion resistant and have much better thermal stability compared to graphite and even PG. Due to its functionally gradient nature such a layer will be very adherent and resistant to spallation. The current research is focused on synthesizing, characterizing and oxidation testing of such a converted SiC layer on commercial grade graphite. (author)

  17. Erosion of Earthen Levees by Wave Action

    Science.gov (United States)

    Ozeren, Y.; Wren, D. G.; Reba, M. L.

    2016-02-01

    Earthen levees of aquaculture and irrigation reservoirs in the United States often experience significant erosion due to wind-generated waves. Typically constructed using local soils, unprotected levees are subjected to rapid erosion and retreat due to wind generated waves and surface runoff. Only a limited amount of published work addresses the erosion rates for unprotected levees, and producers who rely on irrigation reservoirs need an economic basis for selecting a protection method for vulnerable levees. This, in turn, means that a relationship between wave energy and erosion of cohesive soils is needed. In this study, laboratory experiments were carried out in order to quantify wave induced levee erosion and retreat. A model erodible bank was packed using a soil consisting of approximately 14% sand, 73% silt, and 13% clay in a 20.6 m long 0.7 m wide and 1.2 m deep wave tank at the USDA-ARS, National Sedimentation Laboratory in Oxford MS. The geometry of the levee face was monitored by digital camera and the waves were measured by means of 6 capacitance wave staffs. Relationships were established between levee erosion, edge and retreat rates, and incident wave energy.

  18. Satellite-based estimation of rainfall erosivity for Africa

    NARCIS (Netherlands)

    Vrieling, A.; Sterk, G.; Jong, S.M. de

    2010-01-01

    Rainfall erosivity is a measure for the erosive force of rainfall. Rainfall kinetic energy determines the erosivity and is in turn greatly dependent on rainfall intensity. Attempts for its large-scale mapping are rare. Most are based on interpolation of erosivity values derived from rain gauge

  19. Soil erosion as a driver of land-use change

    NARCIS (Netherlands)

    Bakker, M.M.; Govers, G.; Kosmas, C.; VanAcker, H.; Oost, van K.; Rounsevell, M.

    2005-01-01

    Although much research has been carried out on the crop productivity response to soil erosion, little is known about the role of soil erosion as a driver of land-use change. Given, however, the some-times large erosion-induced reductions in crop yields, it appears likely that erosion has a strong

  20. Erosivity, surface runoff, and soil erosion estimation using GIS-coupled runoff-erosion model in the Mamuaba catchment, Brazil.

    Science.gov (United States)

    Marques da Silva, Richarde; Guimarães Santos, Celso Augusto; Carneiro de Lima Silva, Valeriano; Pereira e Silva, Leonardo

    2013-11-01

    This study evaluates erosivity, surface runoff generation, and soil erosion rates for Mamuaba catchment, sub-catchment of Gramame River basin (Brazil) by using the ArcView Soil and Water Assessment Tool (AvSWAT) model. Calibration and validation of the model was performed on monthly basis, and it could simulate surface runoff and soil erosion to a good level of accuracy. Daily rainfall data between 1969 and 1989 from six rain gauges were used, and the monthly rainfall erosivity of each station was computed for all the studied years. In order to evaluate the calibration and validation of the model, monthly runoff data between January 1978 and April 1982 from one runoff gauge were used as well. The estimated soil loss rates were also realistic when compared to what can be observed in the field and to results from previous studies around of catchment. The long-term average soil loss was estimated at 9.4 t ha(-1) year(-1); most of the area of the catchment (60%) was predicted to suffer from a low- to moderate-erosion risk (soil erosion was estimated to exceed > 12 t ha(-1) year(-1). Expectedly, estimated soil loss was significantly correlated with measured rainfall and simulated surface runoff. Based on the estimated soil loss rates, the catchment was divided into four priority categories (low, moderate, high and very high) for conservation intervention. The study demonstrates that the AvSWAT model provides a useful tool for soil erosion assessment from catchments and facilitates the planning for a sustainable land management in northeastern Brazil.

  1. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  2. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  3. Restorative Rehabilitation of a Patient with Dental Erosion

    OpenAIRE

    AlShahrani, Mohammed Thamer; Haralur, Satheesh B.; Alqarni, Mohammed

    2017-01-01

    Dental erosion is the chemical dissolution of the tooth structure. Factors like eating disorders and gastrointestinal diseases are recognized as intrinsic factors for dental erosion. Advanced stages of dental erosion extensively damage the tooth morphology, consequently affecting both esthetics and functions. Reports indicate the growing prevalence of erosion, and hence knowledge of restorative rehabilitation of tooth erosion is an integral part of the contemporary dental practice. This clini...

  4. Polymers Erosion and Contamination Experiment Being Developed

    Science.gov (United States)

    deGroh, Kim K.; Banks, Bruce A.; Barney-Barton, Elyse A.; Sechkar, Edward; Hunt, Patricia

    1999-01-01

    The Polymers Erosion and Contamination Experiment (PEACE) is currently being developed at the NASA Lewis Research Center by the Electro-Physics Branch in conjunction with students and faculty from Hathaway Brown School in Cleveland. The experiment is a Get Away Special Canister shuttle flight experiment sponsored by the American Chemical Society. The two goals of this experiment are (1) to measure ram atomic oxygen erosion rates of approximately 40 polymers that have potential use in space applications and (2) to validate a method for identifying sources of silicone contamination that occur in the shuttle bay. Equipment to be used in this flight experiment is shown in the schematic diagram. Spacecraft materials subjected to attack by atomic oxygen in the space environment experience significant degradation over the span of a typical mission. Therefore, learning the rates of atomic oxygen erosion of a wide variety of polymers would be of great benefit to future missions. PEACE will use two independent techniques to determine the atomic oxygen erosion rates of polymers. Large (1-in.-diameter) samples will be used for obtaining mass loss. Preflight and postflight dehydrated masses will be obtained, and the mass lost during flight will be determined. Small (0.5-in.-diameter) samples will be protected with isolated particles (such as NaCl crystals) and then exposed to the space environment. After flight, the protective particles will be removed (washed off) and atomic force microscopy (AFM) will be used to measure the erosion depth from protected mesas. Erosion depth measurements are more sensitive than traditional mass measurements and are very useful for materials with low erosion yields or with very low fluence missions.

  5. IN SITU MEASUREMENT OF BEDROCK EROSION

    Directory of Open Access Journals (Sweden)

    D. H. Rieke-Zapp

    2012-07-01

    Full Text Available While long term erosion rates of bedrock material may be estimated by dating methods, current day erosion rates are – if at all available – based on rough estimates or on point measurements. Precise quantification of short term erosion rates are required to improve our understanding of short term processes, for input in landscape evolution models, as well as for studying the mechanics and efficiency of different erosion processes in varying geomorphological settings. Typical current day erosion rates in the European Alps range from sub-millimetre to several millimetres per year depending on the dominant erosion processes. The level of surveying accuracy required for recurring sub-millimetre to millimetre measurements in the field is demanding. A novel surveying setup for in-situ measurement of bedrock erosion was tested recently in three different locations in Switzerland. Natural bedrock was investigated in the Gornera gorge close to Zermatt. Further on, bedrock samples were installed in exposed locations in the Erlenbach research watershed close to Einsiedeln, and in the Illgraben debris flow channel, located in the Canton Schwyz and Valais, respectively. A twofold measurement approach was chosen for all locations. For the first setup control points providing an absolute reference frame for recurrent measurements were embedded close to the area of interest. Close range photogrammetry was applied to measure surface changes on the bedrock samples. The precision for surface measurements in the field was 0.1 mm (1 σ and thus suitable for the application. The equipment needed for the surveys can easily be carried to the field. At one field site a structured light scanner was used along with the photogrammetric setup. Although the current generation of structured light scanners appeared less suitable for field application, data acquisition was much faster and checking the data for completeness in the field was straight forward. The latest

  6. In Situ Measurement of Bedrock Erosion

    Science.gov (United States)

    Rieke-Zapp, D. H.; Beer, A.; Turowski, J. M.; Campana, L.

    2012-07-01

    While long term erosion rates of bedrock material may be estimated by dating methods, current day erosion rates are - if at all available - based on rough estimates or on point measurements. Precise quantification of short term erosion rates are required to improve our understanding of short term processes, for input in landscape evolution models, as well as for studying the mechanics and efficiency of different erosion processes in varying geomorphological settings. Typical current day erosion rates in the European Alps range from sub-millimetre to several millimetres per year depending on the dominant erosion processes. The level of surveying accuracy required for recurring sub-millimetre to millimetre measurements in the field is demanding. A novel surveying setup for in-situ measurement of bedrock erosion was tested recently in three different locations in Switzerland. Natural bedrock was investigated in the Gornera gorge close to Zermatt. Further on, bedrock samples were installed in exposed locations in the Erlenbach research watershed close to Einsiedeln, and in the Illgraben debris flow channel, located in the Canton Schwyz and Valais, respectively. A twofold measurement approach was chosen for all locations. For the first setup control points providing an absolute reference frame for recurrent measurements were embedded close to the area of interest. Close range photogrammetry was applied to measure surface changes on the bedrock samples. The precision for surface measurements in the field was 0.1 mm (1 σ) and thus suitable for the application. The equipment needed for the surveys can easily be carried to the field. At one field site a structured light scanner was used along with the photogrammetric setup. Although the current generation of structured light scanners appeared less suitable for field application, data acquisition was much faster and checking the data for completeness in the field was straight forward. The latest generation of compact

  7. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  8. Soil carbon and nitrogen erosion in forested catchments: implications for erosion-induced terrestrial carbon sequestration

    Science.gov (United States)

    E. M. Stacy; S. C. Hart; C. T. Hunsaker; D. W. Johnson; A. A. Berhe

    2015-01-01

    Lateral movement of organic matter (OM) due to erosion is now considered an important flux term in terrestrial carbon (C) and nitrogen (N) budgets, yet most published studies on the role of erosion focus on agricultural or grassland ecosystems. To date, little information is available on the rate and nature of OM eroded from forest ecosystems. We present annual...

  9. Probabilistic soil erosion modeling using the Erosion Risk Management Tool (ERMIT) after wildfires

    Science.gov (United States)

    P. R. Robichaud; W. J. Elliot; J. W. Wagenbrenner

    2011-01-01

    The decision of whether or not to apply post-fire hillslope erosion mitigation treatments, and if so, where these treatments are most needed, is a multi-step process. Land managers must assess the risk of damaging runoff and sediment delivery events occurring on the unrecovered burned hillslope. We developed the Erosion Risk Management Tool (ERMiT) to address this need...

  10. Predicting of soil erosion with regarding to rainfall erosivity and soil erodibility

    Science.gov (United States)

    Suif, Zuliziana; Razak, Mohd Amirun Anis Ab; Ahmad, Nordila

    2018-02-01

    The soil along the hill and slope are wearing away due to erosion and it can take place due to occurrence of weak and heavy rainfall. The aim of this study is to predict the soil erosion degree in Universiti Pertahanan Nasional Malaysia (UPNM) area focused on two major factor which is soil erodibility and rainfall erosivity. Soil erodibility is the possibilities of soil to detach and carried away during rainfall and runoff. The "ROM" scale was used in this study to determine the degree of soil erodibility, namely low, moderate, high, and very high. As for rainfall erosivity, the erosive power caused by rainfall that cause soil loss. A daily rainfall data collected from January to April was analyzed by using ROSE index classification to identify the potential risk of soil erosion. The result shows that the soil erodibilty are moderate at MTD`s hill, high at behind of block Lestari and Landslide MTD hill, and critical at behind the mess cadet. While, the highest rainfall erosivity was recorded in March and April. Overall, this study would benefit the organization greatly in saving cost in landslide protection as relevant authorities can take early measures repairing the most affected area of soil erosion.

  11. Does a more sophisticated storm erosion model improve probabilistic erosion estimates?

    NARCIS (Netherlands)

    Ranasinghe, R.W.M.R.J.B.; Callaghan, D.; Roelvink, D.

    2013-01-01

    The dependency between the accuracy/uncertainty of storm erosion exceedance estimates obtained via a probabilistic model and the level of sophistication of the structural function (storm erosion model) embedded in the probabilistic model is assessed via the application of Callaghan et al.'s (2008)

  12. Susceptibility of bovine dental enamel with initial erosion lesion to new erosive challenges.

    Science.gov (United States)

    Oliveira, Gabriela Cristina de; Tereza, Guida Paola Genovez; Boteon, Ana Paula; Ferrairo, Brunna Mota; Gonçalves, Priscilla Santana Pinto; Silva, Thiago Cruvinel da; Honório, Heitor Marques; Rios, Daniela

    2017-01-01

    This in vitro study evaluated the impact of initial erosion on the susceptibility of enamel to further erosive challenge. Thirty bovine enamel blocks were selected by surface hardness and randomized into two groups (n = 15): GC- group composed by enamel blocks without erosion lesion and GT- group composed by enamel blocks with initial erosion lesion. The baseline profile of each block was determined using the profilometer. The initial erosion was produced by immersing the blocks into HCl 0.01 M, pH 2.3 for 30 seconds, under stirring. The erosive cycling consisted of blocks immersion in hydrochloric acid (0.01 M, pH 2.3) for 2 minutes, followed by immersion in artificial saliva for 120 minutes. This procedure was repeated 4 times a day for 5 days, and the blocks were kept in artificial saliva overnight. After erosive cycling, final profile measurement was performed. Profilometry measured the enamel loss by the superposition of initial and final profiles. Data were analyzed by t-test (perosion on bovine dental enamel does not enhance its susceptibility to new erosive challenges.

  13. Regional soil erosion assessment based on a sample survey and geostatistics

    Directory of Open Access Journals (Sweden)

    S. Yin

    2018-03-01

    Full Text Available Soil erosion is one of the most significant environmental problems in China. From 2010 to 2012, the fourth national census for soil erosion sampled 32 364 PSUs (Primary Sampling Units, small watersheds with the areas of 0.2–3 km2. Land use and soil erosion controlling factors including rainfall erosivity, soil erodibility, slope length, slope steepness, biological practice, engineering practice, and tillage practice for the PSUs were surveyed, and the soil loss rate for each land use in the PSUs was estimated using an empirical model, the Chinese Soil Loss Equation (CSLE. Though the information collected from the sample units can be aggregated to estimate soil erosion conditions on a large scale; the problem of estimating soil erosion condition on a regional scale has not been addressed well. The aim of this study is to introduce a new model-based regional soil erosion assessment method combining a sample survey and geostatistics. We compared seven spatial interpolation models based on the bivariate penalized spline over triangulation (BPST method to generate a regional soil erosion assessment from the PSUs. Shaanxi Province (3116 PSUs in China was selected for the comparison and assessment as it is one of the areas with the most serious erosion problem. Ten-fold cross-validation based on the PSU data showed the model assisted by the land use, rainfall erosivity factor (R, soil erodibility factor (K, slope steepness factor (S, and slope length factor (L derived from a 1 : 10 000 topography map is the best one, with the model efficiency coefficient (ME being 0.75 and the MSE being 55.8 % of that for the model assisted by the land use alone. Among four erosion factors as the covariates, the S factor contributed the most information, followed by K and L factors, and R factor made almost no contribution to the spatial estimation of soil loss. The LS factor derived from 30 or 90 m Shuttle Radar Topography Mission

  14. Regional soil erosion assessment based on a sample survey and geostatistics

    Science.gov (United States)

    Yin, Shuiqing; Zhu, Zhengyuan; Wang, Li; Liu, Baoyuan; Xie, Yun; Wang, Guannan; Li, Yishan

    2018-03-01

    Soil erosion is one of the most significant environmental problems in China. From 2010 to 2012, the fourth national census for soil erosion sampled 32 364 PSUs (Primary Sampling Units, small watersheds) with the areas of 0.2-3 km2. Land use and soil erosion controlling factors including rainfall erosivity, soil erodibility, slope length, slope steepness, biological practice, engineering practice, and tillage practice for the PSUs were surveyed, and the soil loss rate for each land use in the PSUs was estimated using an empirical model, the Chinese Soil Loss Equation (CSLE). Though the information collected from the sample units can be aggregated to estimate soil erosion conditions on a large scale; the problem of estimating soil erosion condition on a regional scale has not been addressed well. The aim of this study is to introduce a new model-based regional soil erosion assessment method combining a sample survey and geostatistics. We compared seven spatial interpolation models based on the bivariate penalized spline over triangulation (BPST) method to generate a regional soil erosion assessment from the PSUs. Shaanxi Province (3116 PSUs) in China was selected for the comparison and assessment as it is one of the areas with the most serious erosion problem. Ten-fold cross-validation based on the PSU data showed the model assisted by the land use, rainfall erosivity factor (R), soil erodibility factor (K), slope steepness factor (S), and slope length factor (L) derived from a 1 : 10 000 topography map is the best one, with the model efficiency coefficient (ME) being 0.75 and the MSE being 55.8 % of that for the model assisted by the land use alone. Among four erosion factors as the covariates, the S factor contributed the most information, followed by K and L factors, and R factor made almost no contribution to the spatial estimation of soil loss. The LS factor derived from 30 or 90 m Shuttle Radar Topography Mission (SRTM) digital elevation model (DEM) data

  15. Erosion and the limits to planetesimal growth

    Science.gov (United States)

    Krijt, S.; Ormel, C. W.; Dominik, C.; Tielens, A. G. G. M.

    2015-02-01

    Context. The coagulation of microscopic dust into planetesimals is the first step towards the formation of planets. The composition, size, and shape of the growing aggregates determine the efficiency of this early growth. In particular, it has been proposed that fluffy ice aggregates can grow very efficiently in protoplanetary disks, suffering less from the bouncing and radial drift barriers. Aims: While the collision velocity between icy aggregates of similar size is thought to stay below the fragmentation threshold, they may nonetheless lose mass from collisions with much smaller projectiles. As a result, erosive collisions have the potential to terminate the growth of pre-planetesimal bodies. We investigate the effect of these erosive collisions on the ability of porous ice aggregates to cross the radial drift barrier. Methods: We develop a Monte Carlo code that calculates the evolution of the masses and porosities of growing aggregates, while resolving the entire mass distribution at all times. The aggregate's porosity is treated independently of its mass, and is determined by collisional compaction, gas compaction, and eventually self-gravity compaction. We include erosive collisions and study the effect of the erosion threshold velocity on aggregate growth. Results: For erosion threshold velocities of 20-40 m s-1, high-velocity collisions with small projectiles prevent the largest aggregates from growing when they start to drift. In these cases, our local simulations result in a steady-state distribution, with most of the dust mass in particles with Stokes numbers close to unity. Only for the highest erosion threshold considered (60 m s-1) do porous aggregates manage to cross the radial drift barrier in the inner 10 AU of MMSN-like disks. Conclusions: Erosive collisions are more effective in limiting the growth than fragmentary collisions between similar-size particles. Conceivably, erosion limits the growth before the radial drift barrier, although the

  16. MISSE PEACE Polymers Atomic Oxygen Erosion Results

    Science.gov (United States)

    deGroh, Kim, K.; Banks, Bruce A.; McCarthy, Catherine E.; Rucker, Rochelle N.; Roberts, Lily M.; Berger, Lauren A.

    2006-01-01

    Forty-one different polymer samples, collectively called the Polymer Erosion and Contamination Experiment (PEACE) Polymers, have been exposed to the low Earth orbit (LEO) environment on the exterior of the International Space Station (ISS) for nearly 4 years as part of Materials International Space Station Experiment 2 (MISSE 2). The objective of the PEACE Polymers experiment was to determine the atomic oxygen erosion yield of a wide variety of polymeric materials after long term exposure to the space environment. The polymers range from those commonly used for spacecraft applications, such as Teflon (DuPont) FEP, to more recently developed polymers, such as high temperature polyimide PMR (polymerization of monomer reactants). Additional polymers were included to explore erosion yield dependence upon chemical composition. The MISSE PEACE Polymers experiment was flown in MISSE Passive Experiment Carrier 2 (PEC 2), tray 1, on the exterior of the ISS Quest Airlock and was exposed to atomic oxygen along with solar and charged particle radiation. MISSE 2 was successfully retrieved during a space walk on July 30, 2005, during Discovery s STS-114 Return to Flight mission. Details on the specific polymers flown, flight sample fabrication, pre-flight and post-flight characterization techniques, and atomic oxygen fluence calculations are discussed along with a summary of the atomic oxygen erosion yield results. The MISSE 2 PEACE Polymers experiment is unique because it has the widest variety of polymers flown in LEO for a long duration and provides extremely valuable erosion yield data for spacecraft design purposes.

  17. Mechanisms of erosion of atherosclerotic plaques.

    Science.gov (United States)

    Quillard, Thibaut; Franck, Grégory; Mawson, Thomas; Folco, Eduardo; Libby, Peter

    2017-10-01

    The present review explores the mechanisms of superficial intimal erosion, a common cause of thrombotic complications of atherosclerosis. Human coronary artery atheroma that give rise to thrombosis because of erosion differ diametrically from those associated with fibrous cap rupture. Eroded lesions characteristically contain few inflammatory cells, abundant extracellular matrix, and neutrophil extracellular traps (NETs). Innate immune mechanisms such as engagement of Toll-like receptor 2 (TLR2) on cultured endothelial cells can impair their viability, attachment, and ability to recover a wound. Hyaluronan fragments may serve as endogenous TLR2 ligands. Mouse experiments demonstrate that flow disturbance in arteries with neointimas tailored to resemble features of human eroded plaques disturbs endothelial cell barrier function, impairs endothelial cell viability, recruits neutrophils, and provokes endothelial cells desquamation, NET formation, and thrombosis in a TLR2-dependent manner. Mechanisms of erosion have received much less attention than those that provoke plaque rupture. Intensive statin treatment changes the characteristic of plaques that render them less susceptible to rupture. Thus, erosion may contribute importantly to the current residual burden of risk. Understanding the mechanisms of erosion may inform the development and deployment of novel therapies to combat the remaining atherothrombotic risk in the statin era.

  18. Solid particle erosion of polymers and composites

    Science.gov (United States)

    Friedrich, K.; Almajid, A. A.

    2014-05-01

    After a general introduction to the subject of solid particle erosion of polymers and composites, the presentation focusses more specifically on the behavior of unidirectional carbon fiber (CF) reinforced polyetheretherketone (PEEK) composites under such loadings, using different impact conditions and erodents. The data were analyzed on the basis of a newly defined specific erosive wear rate, allowing a better comparison of erosion data achieved under various testing conditions. Characteristic wear mechanisms of the CF/PEEK composites consisted of fiber fracture, matrix cutting and plastic matrix deformation, the relative contribution of which depended on the impingement angles and the CF orientation. The highest wear rates were measured for impingement angles between 45 and 60°. Using abrasion resistant neat polymer films (in this case PEEK or thermoplastic polyurethane (TPU) ones) on the surface of a harder substrate (e.g. a CF/PEEK composite plate) resulted in much lower specific erosive wear rates. The use of such polymeric films can be considered as a possible method to protect composite surfaces from damage caused by minor impacts and erosion. In fact, they are nowadays already successfully applied as protections for wind energy rotor blades.

  19. Water erosion risk prediction in eucalyptus plantations

    Directory of Open Access Journals (Sweden)

    Mayesse Aparecida da Silva

    2014-04-01

    Full Text Available Eucalyptus plantations are normally found in vulnerable ecosystems such as steep slope, soil with low natural fertility and lands that were degraded by agriculture. The objective of this study was to obtain Universal Soil Loss Equation (USLE factors and use them to estimate water erosion risk in regions with eucalyptus planted. The USLE factors were obtained in field plots under natural rainfall in the Rio Doce Basin, MG, Brazil, and the model applied to assess erosion risk using USLE in a Geographic Information System. The study area showed rainfall-runoff erosivity values from 10,721 to 10,642 MJ mm ha-1 h-1 yr-1. Some soils (Latosols had very low erodibility values (2.0 x 10-4 and 1.0 x 10-4t h MJ-1 mm-1, the topographic factor ranged from 0.03 to 10.57 and crop and management factor values obtained for native forest, eucalyptus and planted pasture were 0.09, 0.12 and 0.22, respectively. Water erosion risk estimates for current land use indicated that the areas where should receive more attention were mainly areas with greater topographic factors and those with Cambisols. Planning of forestry activities in this region should consider implementation of other conservation practices beyond those already used, reducing areas with a greater risk of soil erosion and increasing areas with very low risk.

  20. Evaluation of the serum zinc level in erosive and non-erosive oral lichen planus.

    Science.gov (United States)

    Gholizadeh, N; Mehdipour, M; Najafi, Sh; Bahramian, A; Garjani, Sh; Khoeini Poorfar, H

    2014-06-01

    Lichen planus is a chronic inflammatory immunologic-based disease involving skin and mucosa. This disease is generally divided into two categories: erosive and non-erosive. Many etiologic factors are deliberated regarding the disease; however, the disorders of immune system and the role of cytotoxic T-lymphocytes and monocytes are more highlighted. Zinc is an imperative element for the growth of epithelium and its deficiency induces the cytotoxic activity of T-helper2 cells, which seems to be associated with lichen planus. This study was aimed to evaluate the levels of serum zinc in erosive and non-erosive oral lichen planus (OLP) and to compare it with the healthy control group to find out any feasible inference. A total of 22 patients with erosive oral lichen planus, 22 patients with non erosive OLP and 44 healthy individuals as the control group were recruited in this descriptive-comparative study. All the participants were selected from the referees to the department of oral medicine, school of dentistry, Tabriz University of Medical Sciences. Serum zinc level was examined for all the individuals with liquid-stat kit (Beckman Instruments Inc.; Carlsbad, CA). Data were analyzed by adopting the ANOVA and Tukey tests, using SPSS 16 statistical software. The mean age of patients with erosive and non-erosive LP was 41.7 and 41.3 years, respectively. The mean age of the healthy control group was 34.4 years .The mean serum zinc levels in the erosive and non erosive lichen planus groups and control groups were 8.3 (1.15), 11.15 (0.92) and 15.74 (1.75) μg/dl respectively. The difference was statistically significant (poral lichen planus. This finding may probably indicate the promising role of zinc in development of oral lichen planus.

  1. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  2. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  3. A Proposal for Non-Intrusive Namespaces in OCaml

    OpenAIRE

    Couderc , Pierrick; Canou , Benjamin; Chambart , Pierre; Le Fessant , Fabrice

    2014-01-01

    International audience; We present a work-in-progress about adding namespaces to OCaml. Inspired by other lan-guages such as Scala or C++, our aim is to de-sign and formalize a simple and non-intrusive namespace mechanism without complexifying the core language. Namespaces in our ap-proach are a simple way to define libraries while avoiding name clashes. They are also meant to simplify the build process, clarify-ing and reducing (to zero whenever possible) the responsibility of external tools.

  4. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  5. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  6. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  7. Non-intrusive load characterization of an airfoil using PIV

    Energy Technology Data Exchange (ETDEWEB)

    Oudheusden, B.W. van; Scarano, F.; Casimiri, E.W.F. [Dept. of Aerospace Engineering, Delft Univ. of Tech., Delft (Netherlands)

    2006-06-15

    An assessment is made of the feasibility of using PIV velocity data for the non-intrusive aerodynamic force characterization (lift, drag and pitching moment) of an airfoil. The method relies upon the application of control-volume approaches in combination with the deduction of the pressure from the PIV experimental data, by making use of the momentum equation. First, the consistency of the method is verified by means of synthetic data obtained from CFD. Subsequently, the procedure was applied in an experimental investigation, in which the PIV approach is validated against standard pressure-based methods (surface pressure distribution and wake rake). (orig.)

  8. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  9. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  10. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  11. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  12. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  13. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  14. Sand transport, erosion and granular electrification

    DEFF Research Database (Denmark)

    Merrison, J.P.

    2012-01-01

    is expanding our current understanding and outline the areas of advancement needed in the future. Presentation is made of current models for wind driven detachment/entrainment and the transport rates of sand and dust, including the effects of contact induced grain electrification. This ubiquitous phenomenon...... can affect grain transport through the generation of intense electric fields and processes of electrostatic assembly. Importantly the transport of sand is characterized by saltation, which is known to be an active process for erosion and therefore a source for dust and sand formation. Using novel...... erosion simulation techniques the link between grain transport rates and erosion rates has been quantified. Furthermore this can be linked to production rates for dust and has been associated with chemical and mineral alteration through a process of mechanical activation of fractured surfaces. This work...

  15. Erosion protection of uranium tailings impoundments

    International Nuclear Information System (INIS)

    Walters, W.H.; Skaggs, R.L.; Foley, M.G.; Beedlow, P.A.

    1986-09-01

    Pacific Northwest Laboratory (PNL) prepared this report to assist in the design and review of erosion protection works for decommissioned uranium tailings impoundments. The major causes of erosion over the long-term decommissioning period are from rainfall-runoff (overland flow) and stream channel flooding. The method of protection recommended for the impoundment side slopes and site drainage channels is rock riprap. Combinations of vegetation and rock mulch are recommended for the top surface. The design methods were developed from currently available procedures supplemented by field, laboratory, and mathematical model studies performed by PNL. Guidelines for the placement of riprap, inspection, and maintenance are presented. Other subjects discussed are rock selection and testing, slope stability, and overland erosion modeling

  16. Erosion of buffer caused by groundwater leakages

    International Nuclear Information System (INIS)

    Autio, J.; Hanana, K.; Punkkinen, O.; Koskinen, K.; Olin, M.

    2010-01-01

    Document available in extended abstract form only. In the Finnish HLW disposal concept the most important properties of the bentonite clay being considered for these isolation purposes are its thermal behaviour, low hydraulic conductivity, diffusion limited transport, rheology, plasticity, sufficient swelling potential, and exchange capacity. All of these properties depend critically on bentonite density; therefore, any potential mass loss or redistribution events must be well characterized. One such event or process is the erosion of bentonite by flowing groundwater and the groundwater flowing in newly formed channels, in special. Mechanical erosion during the operational phase, due to high groundwater pressure gradients in open excavations, has been identified as a critical issue in TKS-2006 and SR-Can. This work addresses the mechanical erosion of bentonite by fluid shear. In order for buffer erosion to occur three processes must take place: detachment, entrainment, and transport. These processes are followed by the settling of the material and redistribution of buffer mass. Erosion begins with the detachment of a particle from surrounding material, which requires the application of shear forces greater than the attractive force between the particle and parent structure. Entrainment is the process by which the eroding medium lifts the detached particle into the flow. The most important aspect in entrainment is transfer of fluid's inertial forces via surface friction to particles' inertial forces, which, in turn, must overcome the frictional resistance between the particle and its surroundings. Factors influencing frictional resistance include gravity, particle mass, saturation degree of parent structure, composition of water present in parent structure, particle size, and surface roughness. Recent erosion tests, whereby water flow was directed over compacted bentonite blocks or through a system of bentonite pellets, have indicated that bentonite erodes

  17. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  18. Disc valve for sampling erosive process streams

    Science.gov (United States)

    Mrochek, J.E.; Dinsmore, S.R.; Chandler, E.W.

    1986-01-07

    A four-port disc valve is described for sampling erosive, high temperature process streams. A rotatable disc defining opposed first and second sampling cavities rotates between fired faceplates defining flow passageways positioned to be alternatively in axial alignment with the first and second cavities. Silicon carbide inserts and liners composed of [alpha] silicon carbide are provided in the faceplates and in the sampling cavities to limit erosion while providing lubricity for a smooth and precise operation when used under harsh process conditions. 1 fig.

  19. Numerical Modelling and Prediction of Erosion Induced by Hydrodynamic Cavitation

    Science.gov (United States)

    Peters, A.; Lantermann, U.; el Moctar, O.

    2015-12-01

    The present work aims to predict cavitation erosion using a numerical flow solver together with a new developed erosion model. The erosion model is based on the hypothesis that collapses of single cavitation bubbles near solid boundaries form high velocity microjets, which cause sonic impacts with high pressure amplitudes damaging the surface. The erosion model uses information from a numerical Euler-Euler flow simulation to predict erosion sensitive areas and assess the erosion aggressiveness of the flow. The obtained numerical results were compared to experimental results from tests of an axisymmetric nozzle.

  20. Wind and water erosion control on semiarid lands

    International Nuclear Information System (INIS)

    Siddoway, F.H.

    1980-01-01

    Commercial crop production on semiarid lands is difficult because insufficient water is often present to manage the system effectively. Erosion control presents the major management problem. The factors contributing to wind erosion and their interaction have been quantified into a wind erosion equation. The control of wind erosion through agronomic alteration of the various factors is discussed. The quantification and control of water erosion is also discussed with respect to the Universal Soil Loss Equation. Radioisotopes tracers have been used in conjunction with these erosion equations to measure soil losses. (author)

  1. Comparison of Inconel 625 and Inconel 600 in resistance to cavitation erosion and jet impingement erosion

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.X. [State Key Laboratory for Corrosion and Protection, Institute of Metal Research, Chinese Academy of Science, 62 Wencui Road, Shenyang 110016 (China); Zheng, Y.G., E-mail: ygzheng@imr.ac.c [State Key Laboratory for Corrosion and Protection, Institute of Metal Research, Chinese Academy of Science, 62 Wencui Road, Shenyang 110016 (China); Qin, C.P. [State Key Laboratory for Corrosion and Protection, Institute of Metal Research, Chinese Academy of Science, 62 Wencui Road, Shenyang 110016 (China)

    2010-10-15

    Liquid droplet erosion (LDE), which often occurs in bellows made of nickel-based alloys, threatens the security operation of the nuclear power plant. As the candidate materials of the bellows, Inconel 600 and Inconel 625 were both tested for resistance to cavitation erosion (CE) and jet impingement erosion (JIE) through vibratory cavitation equipment and a jet apparatus for erosion-corrosion. Cumulative mass loss vs. exposure time was used to evaluate the erosion rate of the two alloys. The surface and cross-sectional morphologies before and after the erosion tests were observed by scanning electron microscopy (SEM), the inclusions were analyzed by an energy dispersive spectroscopy (EDS), and the surface roughness was also measured by surface roughness tester to illustrate the evolution of erosion process. The results show that the cumulative mass loss of CE of Inconel 625 is about 1/6 that of Inconel 600 and the CE incubation period of the Inconel 625 is 4 times as long as that of the Inconel 600. The micro-morphology evolution of CE process illustrates that the twinning and hardness of the Inconel 625 plays a significant role in CE. In addition, the cumulative mass loss of JIE of Inconel 625 is about 2/3 that of Inconel 600 at impacting angle of 90{sup o}, and almost equal to that of the Inconel 600 at impacting angle of 30{sup o}. Overall, the resistance to CE and JIE of Inconel 625 is much superior to that of Inconel 600.

  2. Comparison of Inconel 625 and Inconel 600 in resistance to cavitation erosion and jet impingement erosion

    International Nuclear Information System (INIS)

    Hu, H.X.; Zheng, Y.G.; Qin, C.P.

    2010-01-01

    Liquid droplet erosion (LDE), which often occurs in bellows made of nickel-based alloys, threatens the security operation of the nuclear power plant. As the candidate materials of the bellows, Inconel 600 and Inconel 625 were both tested for resistance to cavitation erosion (CE) and jet impingement erosion (JIE) through vibratory cavitation equipment and a jet apparatus for erosion-corrosion. Cumulative mass loss vs. exposure time was used to evaluate the erosion rate of the two alloys. The surface and cross-sectional morphologies before and after the erosion tests were observed by scanning electron microscopy (SEM), the inclusions were analyzed by an energy dispersive spectroscopy (EDS), and the surface roughness was also measured by surface roughness tester to illustrate the evolution of erosion process. The results show that the cumulative mass loss of CE of Inconel 625 is about 1/6 that of Inconel 600 and the CE incubation period of the Inconel 625 is 4 times as long as that of the Inconel 600. The micro-morphology evolution of CE process illustrates that the twinning and hardness of the Inconel 625 plays a significant role in CE. In addition, the cumulative mass loss of JIE of Inconel 625 is about 2/3 that of Inconel 600 at impacting angle of 90 o , and almost equal to that of the Inconel 600 at impacting angle of 30 o . Overall, the resistance to CE and JIE of Inconel 625 is much superior to that of Inconel 600.

  3. Mapping Soil Erosion Factors and Potential Erosion Risk for the National Park "Central Balkan"

    Science.gov (United States)

    Ilieva, Diliana; Malinov, Ilia

    2014-05-01

    Soil erosion is widely recognised environmental problem. The report aims at presenting the main results from assessment and mapping of the factors of sheet water erosion and the potential erosion risk on the territory of National Park "Central Balkan". For this purpose, the Universal Soil Loss Equation (USLE) was used for predicting soil loss from erosion. The influence of topography (LS-factor) and soil erodibility (K-factor) was assessed using small-scale topographic and soil maps. Rainfall erosivity (R-factor) was calculated from data of rainfalls with amounts exceeding 9.5 mm from 14 hydro-meteorological stations. The values of the erosion factors (R, K and LS) were presented for the areas of forest, sub-alpine and alpine zones. Using the methods of GIS, maps were plotted presenting the area distribution among the classes of the soil erosion factors and the potential risk in the respective zones. The results can be used for making accurate decisions for soil conservation and sustainable land management in the park.

  4. Role of erosion and isostasy in the Cordillera Blanca uplift: insights from Low-T thermochronology and landscape evolution modeling (northern Peru, Andes)

    Science.gov (United States)

    Margirier, A.; Robert, X.; Braun, J.; Laurence, A.

    2017-12-01

    The uplift and exhumation of the highest Peruvian peaks seems closely linked to the Cordillera Blanca normal fault that delimits and shape the western flank of the Cordillera Blanca. Two models have been previously proposed to explain the occurrence of extension and the presence of this active normal fault in a compression setting but the Cordillera Blanca normal fault and the uplift and exhumation of the Cordillera Blanca remain enigmatic. Recent studies suggested an increase of exhumation rates during the Quaternary in the Cordillera Blanca and related this increase to a change in climate and erosion process (glacial erosion vs. fluvial erosion). The Cordillera Blanca granite has been significantly eroded since its emplacement (12-5 Ma) indicating a significant mass of rocks removal. Whereas it has been demonstrated recently that the effect of eroding denser rocks can contribute to an increase of uplift rate, the impact of erosion and isostasy on the increase of the Cordillera Blanca uplift rates has never been explored. Based on numerical modeling of landscape evolution we address the role of erosion and isostasy in the uplift and exhumation of the Cordillera Blanca. We performed inversions of the present-day topography, total exhumation and thermochronological data using a landscape evolution model (FastScape). Our results evidence the contribution of erosion and associated flexural rebound to the uplift of the Cordillera Blanca. Our models suggest that the erosion of the Cordillera Blanca dense intrusion since 3 Ma could also explain the Quaternary exhumation rate increase in this area. Finally, our results allow to question the previous models proposed for the formation of the Cordillera Blanca normal fault.

  5. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  6. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  7. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  8. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  9. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  10. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  11. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  12. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  13. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  14. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  15. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  16. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  17. Modeling erosion of unsaturated compacted bentonite by groundwater flow; pinhole erosion test case

    International Nuclear Information System (INIS)

    Laurila, T.; Sane, P.; Olin, M.; Koskinen, K.

    2012-01-01

    Document available in extended abstract form only. Erosion of compacted clay material by water flow is a critical factor affecting the performance of radioactive waste confinement. Our emphasis in this work is the buffer of KBS-3V concept, proposed to be compacted MX-80 bentonite. Unsaturated erosion occurs during the saturation phase of the EBS, and the main quantity of interest is the total buffer mass carried away by a groundwater flow that induces erosion by forming piping channels near the buffer/rock interface. The purpose of this work is to provide modeling tools to support erosion experiments. Role of modeling is first to interpret experimental observations in terms of processes, and to estimate robustness of experimental results. Secondly, we seek to scale up results from the laboratory scale, particularly to time scales longer than those experimentally accessible. We have performed modeling and data analysis pertaining to tests of unsaturated clay erosion. Pinhole experiments were used to study this erosion case. The main differences to well-understood pinhole erosion tests are that the material is strongly swelling and that the water flow is not determined by the pressure head but by the total flux. Groundwater flow in the buffer is determined by the flux because pressure losses occur overwhelmingly in the surrounding rock, not in the piping channel. We formulate a simple model that links an effective solid diffusivity -based swelling model to erosion by flow on the solid/liquid interface. The swelling model is similar in concept to that developed at KTH, but simpler. Erosion in the model is caused by laminar flow in the pinhole, and happens in a narrow region at the solid/liquid interface where velocity and solid volume fraction overlap. The erosion model can be mapped to erosion by wall shear, and can thus be considered as extension of that classic erosion model. The main quantity defining the behavior of clay erosion in the model is the ratio of

  18. Oxygen intrusion into anoxic fjords leads to increased methylmercury availability

    Science.gov (United States)

    Veiteberg Braaten, Hans Fredrik; Pakhomova, Svetlana; Yakushev, Evgeniy

    2013-04-01

    Mercury (Hg) appears in the oxic surface waters of the oceans at low levels (sub ng/L). Because inorganic Hg can be methylated into the toxic and bioaccumulative specie methylmercury (MeHg) levels can be high at the top of the marine food chain. Even though marine sea food is considered the main risk driver for MeHg exposure to people most research up to date has focused on Hg methylation processes in freshwater systems. This study identifies the mechanisms driving formation of MeHg during oxygen depletion in fjords, and shows how MeHg is made available in the surface water during oxygen intrusion. Studies of the biogeochemical structure in the water column of the Norwegian fjord Hunnbunn were performed in 2009, 2011 and 2012. In autumn of 2011 mixing flushing events were observed and lead to both positive and negative effects on the ecosystem state in the fjord. The oxygenated water intrusions lead to a decrease of the deep layer concentrations of hydrogen sulfide (H2S), ammonia and phosphate. On the other hand the intrusion also raised the H2S boundary from 8 m to a shallower depth of just 4 m. Following the intrusion was also observed an increase at shallower depths of nutrients combined with a decrease of pH. Before flushing events were observed concentrations of total Hg (TotHg) increased from 1.3 - 1.7 ng/L in the surface layer of the fjord to concentrations ranging from 5.2 ng/L to 6.4 ng/L in the anoxic zone. MeHg increased regularly from 0.04 ng/L in the surface water to a maximum concentration of 5.2 ng/L in the deeper layers. This corresponds to an amount of TotHg present as MeHg ranging from 2.1 % to 99 %. The higher concentrations of MeHg in the deeper layer corresponds to an area where no oxygen is present and concentrations of H2S exceeds 500 µM, suggesting a production of MeHg in the anoxic area as a result of sulphate reducing bacteria activity. After flushing the concentrations of TotHg showed a similar pattern ranging from 0.6 ng/L in the

  19. Soil erosion after forest fires in the Valencia region

    Science.gov (United States)

    González-Pelayo, Óscar; Keizer, Jan Jacob; Cerdà, Artemi

    2014-05-01

    Soil erosion after forest fire is triggered by the lack of vegetation cover and the degradation of the physical, biological and chemical properties (Martí et al., 2012; Fernández et al., 2012; Guénon, 2013). Valencia region belongs to the west Mediterranean basin ("Csa", Köppen climate classification), with drought summer periods that enhance forest fire risk. The characteristics of the climate, lithology and land use history makes this region more vulnerable to soil erosion. In this area, fire recurrence is being increased since late 50s (Pausas, 2004) and post-fire erosion studies became more popular from 80's until nowadays (Cerdá and Mataix-Solera, 2009). Research in Valencia region has contributed significantly to a better understanding of the effect of spatial and temporal scale on runoff and sediment yield measurements. The main achievements concerns: a) direct measurement of erosion rates under a wide range of methodologies (natural vs simulated rainfall, open vs closed plots); from micro- to meso-plot and catchment scale in single (Rubio et al., 1994; Cerdà et al., 1995; Cerdà 1998a; 1998b; Llovet et al., 1998; Cerdà, 2001; Calvo-Cases et al., 2003; Andreu et al., 2001; Mayor et al., 2007; Cerdà and Doerr, 2008) and multiples fires (Campo et al., 2006; González-Pelayo et al., 2010a). Changes in soil properties (Sanroque et al., 1985; Rubio et al., 1997; Boix-Fayós, 1997; Gimeno-Garcia et al., 2000; Guerrero et al., 2001; Mataix-Solera et al., 2004; González-Pelayo et al., 2006; Arcenegui et al., 2008; Campo et al., 2008; Bodí et al., 2012), in post-fire vegetation patterns (Gimeno-García et al., 2007) and, studies on mitigation strategies (Bautista et al., 1996; Abad et al., 2000). b) Progress to understanding post-fire erosion mechanism and sediment movement (Boix-Fayós et al., 2005) by definition of thresholds for sediment losses; fire severity, slope angle, bedrock, rain characteristics, vegetation pattern and ecosystem resilience (Mayor

  20. Is telomere erosion a mechanism of species extinction?

    Science.gov (United States)

    Stindl, Reinhard

    2004-03-15

    According to the fossil record, 99.9% of all species that have ever lived on Earth have disappeared. However, only about 4% died out during the five mass extinction events, whereas it seems that the majority of species vanished without any signs of significant earthbound or extraterrestrial physical threats. Clearly, biological extinction mechanisms are by far the most important, but they are subject to serious limitations concerning the worldwide disappearance of species. In view of that, species-inherent mechanisms, which could lead to the worldwide destabilization of a population, might be worth reconsideration. Telomeres, the protective caps of chromosome ends, and the enzyme telomerase have been well preserved in plants and animals during evolution. In the absence of telomerase activity, telomeric DNA has been shown to shorten every time a cell divides. The concept of a mitotic clock based on the gradual erosion of telomeres is now generally accepted and has been confirmed in numerous plants and animals. Chromosomal rearrangements are the hallmarks of two completely different biological phenomena, cancer and speciation. In premalignant cells, gradual telomere erosion beyond a critical threshold is a well-known inducer of chromosomal instability. The species clock hypothesis, as presented here, is based on the idea of a tiny loss of mean telomere length per generation. This mechanism would not rapidly endanger the survival of a particular species. Yet, after many thousands of generations, critically short telomeres could lead to the weakening and even the extinction of old species and would simultaneously create the unstable chromosomal environment that might result in the origination of new species. Copyright 2004 Wiley-Liss, Inc.

  1. The water erosion processes in the retreat erosive of cliff on soft rocks in the province of Cadiz (Spain)

    International Nuclear Information System (INIS)

    Rendon Aragon, J. J.; Gracia Prieto, F. J.; Rio Rodriguez, L. del

    2009-01-01

    The littoral cliffs on soft materials of the Atlantic Cadiz coast show an important activity of the fresh water erosion processes, sometimes even more significant than the marine erosion processes. The connection of the lower cliffs with sandy beaches favours aeolian sand invasion, which fills previous rills and reduces the water erosion intensity by increasing infiltration. Cliff retreat and rill erosion measurement by using erosion sticks has shown very variables values, most of them higher than the estimated error of the employed methods. This indicates the existence of other factors influencing the distribution of water erosion processes along these cliffs, which have to be studied through different techniques. (Author) 5 refs.

  2. Erosions of the Petrous Temporal Bone

    African Journals Online (AJOL)

    tumours of the parotid gland; tumours of the paranasal sinuses; and tumours of ... showed severe erosion of the anterior and posterior walls and floor of the external .... sphenoid sinus, the pituitary fossa, and the greater and lesser wings of the ...

  3. Natural Erosion of Sandstone as Shape Optimisation.

    Science.gov (United States)

    Ostanin, Igor; Safonov, Alexander; Oseledets, Ivan

    2017-12-11

    Natural arches, pillars and other exotic sandstone formations have always been attracting attention for their unusual shapes and amazing mechanical balance that leave a strong impression of intelligent design rather than the result of a stochastic process. It has been recently demonstrated that these shapes could have been the result of the negative feedback between stress and erosion that originates in fundamental laws of friction between the rock's constituent particles. Here we present a deeper analysis of this idea and bridge it with the approaches utilized in shape and topology optimisation. It appears that the processes of natural erosion, driven by stochastic surface forces and Mohr-Coulomb law of dry friction, can be viewed within the framework of local optimisation for minimum elastic strain energy. Our hypothesis is confirmed by numerical simulations of the erosion using the topological-shape optimisation model. Our work contributes to a better understanding of stochastic erosion and feasible landscape formations that could be found on Earth and beyond.

  4. Alleviating gizzard erosion with Hepasan ® - Provisional ...

    African Journals Online (AJOL)

    Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. DOWNLOAD FULL TEXT Open Access DOWNLOAD FULL TEXT Subscription or Fee Access. Alleviating gizzard erosion with Hepasan® - Provisional Communication. K Boa-Amponsem, A Osei-Somuah. Full Text:.

  5. Identifying conservation hotspots using tillage erosion modeling

    Science.gov (United States)

    Tillage operations redistribute soil within agricultural landscapes due to deviations in the quantity of soil moved during tillage. Tillage erosion is the net loss or accumulation of soil at any spot within an agricultural landscape due to soil being directly moved by tillage; it is a dominant erosi...

  6. Slope stability and erosion control: Ecotechnological solutions

    NARCIS (Netherlands)

    Norris, J.E.; Stokes, A.; Mickovski, S.B.; Cammeraat, E.; van Beek, R.; Nicoll, B.C.; Achim, A.

    2008-01-01

    This book is designed to assist the civil and geotechnical engineer, geomorphologist, forester, landscape architect or ecologist in choosing ecotechnological solutions for slopes that are prone to a variety of mass movements e.g. shallow failure or erosion. Within this book, the 'engineer' is used

  7. Modeling Edge Effects of Tillage Erosion

    Science.gov (United States)

    Tillage erosion has been recognized as an important factor in redistribution of soil over time and in the development of morphological changes within agricultural fields. Field borders, fences, and vegetated strips that interrupt soil fluxes lead to the creation topographic discontinuities or lynche...

  8. Hydrogeological And Geotechnical Investigations Of Gully Erosion ...

    African Journals Online (AJOL)

    Consequently, hydrogeological and geotechnical studies of gully erosion sites were carried out in order to provide information on the genesis and continual expansion of gullies in the area. The results indicate that gullies are located in the upper aquifer of the Benin Formation (Coastal Plain Sands). The estimated hydraulic ...

  9. Is dental erosion really a problem?

    Science.gov (United States)

    Schlueter, N; Jaeggi, T; Lussi, A

    2012-09-01

    Dental erosion is the non-carious dental substance loss induced by direct impact of exogenous or endogenous acids. It results in a loss of dental hard tissue, which can be serious in some groups, such as those with eating disorders, in patients with gastroesophageal reflux disease, and also in persons consuming high amounts of acidic drinks and foodstuffs. For these persons, erosion can impair their well-being, due to changes in appearance and/or loss of function of the teeth, e.g., the occurrence of hypersensitivity of teeth if the dentin is exposed. If erosion reaches an advanced stage, time- and money-consuming therapies may be necessary. The therapy, in turn, poses a challenge for the dentist, particularly if the defects are diagnosed at an advanced stage. While initial and moderate defects can mostly be treated non- or minimally invasively, severe defects often require complex therapeutic strategies, which often entail extensive loss of dental hard tissue due to preparatory measures. A major goal should therefore be to diagnose dental erosion at an early stage, to avoid functional and esthetic impairments as well as pain sensations and to ensure longevity of the dentition.

  10. Coastal erosion and accretion rates in Greece

    Science.gov (United States)

    Foteinis, Spyros; Papadopoulos, Costas; Koutsogiannaki, Irini; Synolakis, Costas

    2010-05-01

    Erosion threatens many coastal regions of Greece. Anthropogenic changes of landforms such as coastal roads built on even narrow beaches, sand mining for construction, poor design of coastal structures that interfere with sediment, and dams without sediment bypasses have significantly reduced beach widths. We present erosion rates for different beaches, some of which are in sensitive ecosystems, otherwise "protected" by local and EU ordinances. By comparing inferences of beach widths in varying intervals from 1933 to 2006, we infer that the construction of dams in Acheloos river in western Greece, built in a faraonic attempt to partially divert its flows to eastern Greece, this is responsible for up to 20m/year erosion rates observed in certain locales in the Acheloos delta. More characteristic erosion rates in the region are ~ 2m/year. By contrast, there appears rapid accretion of up to 4m/year in the beaches around the Nestos delta in northern Greece (Papadopoulos, 2009). In beaches that are not near large river deltas, erosion rates range from 0.5m/year to 1m/year. While we have not done comprehensive comparisons among coastlines with different levels of coastal development, it does appear that rapid coastal development correlates well with erosion rates. The underlying problem is the complete lack of any semblance of coastal zone management in Greece and substandard design of coastal structures, which are often sited without any measurements of waves and currents offshore (Synolakis et al, 2008). Beach maintenance remains an exotic concept for most local authorities, who invariably prefer to build hard coastal structures to "protect" versus nourish, siting lack of experience with nourishment and "environmental" concerns. In certain cases, choices are dictated by costs, the larger the cost the easier the project gets approved by regulatory authorities, hence the preference for concrete or rubble structures. We conclude that, unless urgent salvage measures are

  11. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  12. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Urban Runoff: Model Ordinances for Erosion and Sediment Control

    Science.gov (United States)

    The model ordinance in this section borrows language from the erosion and sediment control ordinance features that might help prevent erosion and sedimentation and protect natural resources more fully.

  14. Molybdenum erosion measurements in Alcator C-Mod

    Energy Technology Data Exchange (ETDEWEB)

    Wampler, W.R. [Sandia National Labs., Albuquerque, NM (United States); LaBombard, B.; Lipshultz, B.; Pappas, D.; Pitcher, C.S. [Massachusetts Inst. of Tech., Cambridge, MA (United States); McCracken, G.M. [JET Joint Undertaking, Abingdon (United Kingdom)

    1998-05-01

    Erosion of molybdenum was measured on a set of 21 tiles after a run campaign of 1,090 shots in the Alcator C-Mod tokamak. The net erosion of molybdenum, was determined from changes in the depth of a thin chromium marker layer measured by Rutherford backscattering. Net Mo erosion was found to be approximately 150 nm near the outer divertor strike point, and much less everywhere else. Gross erosion rates by sputtering were estimated using ion energies and fluxes obtained from Langmuir probe measurements of edge-plasma conditions. Predicted net erosion using calculated gross erosion with prompt redeposition and measured net erosion agree within a factor of 3. Sputtering by boron and molybdenum impurities dominates erosion.

  15. Categorization of erosion control matting for slope applications.

    Science.gov (United States)

    2013-12-25

    Erosion control is an important aspect of any Georgia Department of Transportation (GDOT) construction project, with the extreme negative impacts of high sediment loads in natural waterways having been well documented. Selection of a proper erosion c...

  16. Mapping Soil Erosion in a Quaternary Catchment in Eastern Cape ...

    African Journals Online (AJOL)

    Temp

    2017-04-06

    Apr 6, 2017 ... Keywords: Geographic Information System; Remote Sensing; Soil Erosion; Vegetation Indices ... Soil erosion is considered one of the world's most critical ... the spatial extent of the problem (Le Roux et al., 2007) in other ...

  17. Thermomechanical Erosion Modelling of Baydaratskaya Bay, Russia with COSMOS

    NARCIS (Netherlands)

    Pearson, S.G.; Lubbad, R; Le, T.M.H.; Nairn, Rob

    2016-01-01

    Rapid coastal erosion threatens Arctic coastal infrastructure, including communities and industrial installations. Erosion of permafrost depends on numerous processes, including thermal and mechanical behaviour of frozen and unfrozen soil, nearshore hydrodynamics, atmospheric forcing, and the

  18. Three procedures for estimating erosion from construction areas

    International Nuclear Information System (INIS)

    Abt, S.R.; Ruff, J.F.

    1978-01-01

    Erosion from many mining and construction sites can lead to serious environmental pollution problems. Therefore, erosion management plans must be developed in order that the engineer may implement measures to control or eliminate excessive soil losses. To properly implement a management program, it is necessary to estimate potential soil losses from the time the project begins to beyond project completion. Three methodologies are presented which project the estimated soil losses due to sheet or rill erosion of water and are applicable to mining and construction areas. Furthermore, the three methods described are intended as indicators of the state-of-the-art in water erosion prediction. The procedures herein do not account for gully erosion, snowmelt erosion, wind erosion, freeze-thaw erosion or extensive flooding

  19. Water erosion of dystrophic Red Latosols (Oxisols

    Directory of Open Access Journals (Sweden)

    Joaquim Ernesto Bernardes Ayer

    2015-06-01

    Full Text Available In their natural state, Latosols (Oxisols present great stability and resistance to erosion, being the most abundant and used soils for farming and cattle raising activities in southern Minas Gerais State, Brazil. However, along the last one hundred years, they have been submitted to intensive cultivation and managements which favor water erosion. This study aimed to estimate the water erosion rates of dystrophic Red Latosols from the Revised Universal Soil Loss Equation, compared with the soil loss tolerance limits, and assess the impact on water erosion of the managements more common in the region, by alternative conservation management simulation. Soil loss tolerance limits ranged from 8.94 Mg ha-1 year-1 to 9.99 Mg ha-1 year-1, with the study area presenting a susceptibility of soil loss of 23.86 Mg year-1, with an average rate of 8.40 Mg ha-1 year-1, corresponding to 34.80 % of the area with values above the soil loss tolerance limit. The biggest annual losses occur in areas with use and management of eucalyptus grown downhill (30.67 Mg ha-1 year-1 and pasture under continuous occupancy (11.10 Mg ha-1 year-1. However, when the average loss per type of use is considered, the areas more susceptible to water erosion are those with potato and eucalyptus crops, grown downhill, and those in bare soil. Nevertheless, in the simulated conservation management scenario, the average losses would be drastically reduced (8.40 Mg ha-1 year-1 to 2.84 Mg ha-1 year-1 and only 4.00 % of the area with soil loss would remain above the tolerance limits.

  20. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid