WorldWideScience

Sample records for dynamic seawater intrusion

  1. Seawater intrusion policy analysis with a numerical spatially heterogeneous dynamic optimization model

    Science.gov (United States)

    Reinelt, Peter

    2005-05-01

    For more than 50 years, Monterey County and California State officials have pursued without success water policies to halt groundwater overdraft and seawater intrusion in the multilayer confined aquifers underlying arguably the most productive farmland in the United States. This study develops a general dynamic optimization model that emphasizes the institutional and physical characteristics that differentiate this policy problem from other groundwater extraction problems. The solution of the model exhibits heterogeneous spatial distribution of optimal extraction based on spatially distributed extraction cost, pumping cost externality, and seawater intrusion stock externality. Comparison of model results under alternative management regimes elucidates landowner economic incentives, reveals the potential welfare loss of current state policy, and explains much of the history of the political economy of water in Monterey County.

  2. Investigation of a dynamic seawater intrusion event using strontium isotopes (87Sr/86Sr)

    DEFF Research Database (Denmark)

    Jørgensen, Niels Oluf; Andersen, Martin S.; Engesgaard, Peter Knudegaard

    2008-01-01

    A seawater intrusion experiment was carried out in a shallow coastal unconfined aquifer at Skansehage, Denmark. The aquifer consists of 6-10 m of postglacial (Holocene) eolian and marine sands and gravels resting on Pleistocene glacial sequence of tills and glacio-fluviatile sediments on a baseme...

  3. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position. Recent

  4. Boron isotope method for study of seawater intrusion

    Institute of Scientific and Technical Information of China (English)

    肖应凯; 尹德忠; 刘卫国; 王庆忠; 魏海珍

    2001-01-01

    A distinct difference in boron isotopes between seawater and terrestrial water is emphasized by δ11B values reported for seawater and groundwater, with an average of 38.8‰ and in the range of -8.9‰ to 9.8‰, respectively. The isotopic composition of boron in groundwater can be used to quantify seawater intrusion and identify intrusion types, e.g. seawater or brine intrusions with different chemical and isotopic characteristics, by using the relation of δ11B and chloride concentration. The feasibility of utilizing boron isotope in groundwater for studying seawater intrusion in Laizhou Bay Region, China, is reported in this study, which shows that boron isotope is a useful and excellent tool for the study of seawater intrusion.

  5. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  6. SEAWATER INTRUSION TYPES AND REGIONAL DIVISIONS IN THE SOUTHERN COAST OF LAIZHOU BAY

    Institute of Scientific and Technical Information of China (English)

    孟广兰; 韩有松; 王少青; 王珍岩

    2002-01-01

    The southern coast of Laizhou Bay, Bohai Sea, is one of the areas in China most seriously impacted by seawater intrusion. Based on the sources of intruding waterbedies, seawater intrusion can be divided into two types: intrusion of saline water derived from modern seawater, and intrusion of subsurface brine and saline water derived from paleo-seawater in shallow Quaternary sediments. There are some distinct differences in their formation, mechanism and damage. The subsurface brine intrusion is a special type, which can cause very serious disaster. The coastal landform and the Quaternary hydrogeological environment are predominant factors in the classification of seawater intrusion types. Various coastal environments in different coastal sections result in three types of intrusion: seawater intrusion, saline groundwater intrusion, and mixed seawater and saline water intrusion, in the southern coast of Laizhou Bay, which can be divided into four areas: the sea-water intrusion area in the northern Laizhou City coast, the mixed seawater and saline groundwater intrusion area in the Baisha River-Jiaolai River mouth plain area, the mixed seawater and saline groundwater intrusion area in the Weihe River mouth plain area northern Changyi county coast, and the saline ground-water intrusion area in the northern Shouguang plains.

  7. SEAWATER INTRUSION TYPES AND REGIONAL DIVISIONS IN THE SOUTHERN COAST OF LAIZHOU BAY

    Institute of Scientific and Technical Information of China (English)

    孟广兰; 韩有松; 王少青; 王珍岩

    2002-01-01

    The southern coast of Laizhou Bay, Bohai Sea, is one of the areas in China most seriously impacted by seawater intrusion. Based on the sources of intruding wate rbodies, seawater intrusion can be divided into two types: intrusion of saline water derived from modern seawater, and intrusion of subsurface brine and saline water derived from paleo-seawater in shallow Quaternary sediments. There are so me distinct differences in their formation, mechanism and damage. The subsurface brine intrusion is a special typ e, which can cause very serious disaster.The coastal landform and the Quaternary hydrogeological environment are pr edominant factors in the classification of seawater intrusion types. Various coastal environments in diff erent coastal sections result in three types of intrusion: seawater intrusion, saline groundwater intrusion, and mixed seawater and saline water intrusion, in the southern coast of Laizhou Bay, which can be divided into four areas: the seawater intrusion area in the northern Laizhou City coast, the mixed seawater and saline groundwater in trusion area in the Baisha River-Jiaolai River mouth plain area, the mixed seawater and saline groundwater intrus ion area in the Weihe River mouth plain area northern Changyi county coast, and the saline groundwater intrusion area in the northern Shouguang plains.

  8. Misleading reconstruction of seawater intrusion via integral depth sampling

    Science.gov (United States)

    Colombani, N.; Volta, G.; Osti, A.; Mastrocicco, M.

    2016-05-01

    Saltwater intrusion in coastal aquifers is an urgent issue for the actual and future groundwater supply and a detailed characterization of groundwater quality with depth is a fundamental prerequisite to correctly distinguish salinization processes. In this study, interpolated Cl- maps of the Po River delta coastal aquifer (Italy), gained with Integrated Depth Sampling (IDS) and Multi-Level Sampling (MLS) techniques, are compared. The data set used to build up the IDS and MLS interpolated Cl- maps come from numerous monitoring campaigns on surface and ground waters, covering the time frame from 2010 to 2014. The IDS interpolated Cl- map recalls the phenomenon of actual seawater intrusion, with Cl- concentration never exceeding that of seawater and the absence of hypersaline groundwater all over the study area. On the contrary, in the MLS interpolated Cl- maps the lower portion of the unconfined aquifer presents hypersaline groundwater making it necessary to consider salinization processes other than actual seawater intrusion, like upward flux from a saline aquitard. Results demonstrate the obligation of using MLS in reconstructing a reliable representation of the distribution of salinity, especially in areas where the density contrast between fresh and saline groundwater is large. Implications of the reported field case are not limited to the local situation but have a wider significance, since the IDS technique is often employed in saltwater intrusion monitoring even in recent works, with detrimental effect on the sustainable water resource management of coastal aquifers.

  9. PREDICTING THE CONSEQUENCES OF SEAWATER INTRUSION AND PROTECTION PROJECTS

    Institute of Scientific and Technical Information of China (English)

    袁益让; 梁栋; 芮洪兴

    2001-01-01

    The simulation of this process and the effects of protection irojects lays the foundation of its effective control and defence. The mathematical model of the problem and upwind splitting alternating direction method were presented. Using this method, the numerical simulation of seawater intrusion in Laizhou Bay Area of Shandong Provivce was finished. The numerical results turned out to be identical with the real measurements, so the prediction of the consequences of protection projectects is reasonable.

  10. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  11. A reactive transport investigation of a seawater intrusion experiment in a shallow aquifer, Skansehage Denmark

    DEFF Research Database (Denmark)

    Christensen, Flemming Damgaard; Engesgaard, Peter Knudegaard; Kipp, K.L.

    2001-01-01

    Previous investigations on seawater intrusion have mainly focused on either the physical density flow system with transport of a single non-reactive species or focused on the geochemical aspects neglecting density effects. This study focuses on both the geochemical and physical aspects of seawater...... intrusion and their interaction during an intrusion experiment in a shallow, small-scale coastal aquifer in Denmark....

  12. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  13. Documentation of the seawater intrusion (SWI2) package for MODFLOW

    Science.gov (United States)

    Bakker, Mark; Schaars, Frans; Hughes, Joseph D.; Langevin, Christian D.; Dausman, Alyssa M.

    2013-01-01

    The SWI2 Package is the latest release of the Seawater Intrusion (SWI) Package for MODFLOW. The SWI2 Package allows three-dimensional vertically integrated variable-density groundwater flow and seawater intrusion in coastal multiaquifer systems to be simulated using MODFLOW-2005. Vertically integrated variable-density groundwater flow is based on the Dupuit approximation in which an aquifer is vertically discretized into zones of differing densities, separated from each other by defined surfaces representing interfaces or density isosurfaces. The numerical approach used in the SWI2 Package does not account for diffusion and dispersion and should not be used where these processes are important. The resulting differential equations are equivalent in form to the groundwater flow equation for uniform-density flow. The approach implemented in the SWI2 Package allows density effects to be incorporated into MODFLOW-2005 through the addition of pseudo-source terms to the groundwater flow equation without the need to solve a separate advective-dispersive transport equation. Vertical and horizontal movement of defined density surfaces is calculated separately using a combination of fluxes calculated through solution of the groundwater flow equation and a simple tip and toe tracking algorithm. Use of the SWI2 Package in MODFLOW-2005 only requires the addition of a single additional input file and modification of boundary heads to freshwater heads referenced to the top of the aquifer. Fluid density within model layers can be represented using zones of constant density (stratified flow) or continuously varying density (piecewise linear in the vertical direction) in the SWI2 Package. The main advantage of using the SWI2 Package instead of variable-density groundwater flow and dispersive solute transport codes, such as SEAWAT and SUTRA, is that fewer model cells are required for simulations using the SWI2 Package because every aquifer can be represented by a single layer of cells

  14. Physical and numerical modeling of seawater intrusion in coastal aquifers

    Science.gov (United States)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo

    2016-04-01

    Seawater intrusion in coastal aquifers is a worldwide problem caused, among others factors, by aquifer overexploitation, rising sea levels, and climate changes. To limit the deterioration of both surface water and groundwater quality caused by saline intrusion, in recent years many research studies have been developed to identify possible countermeasures, mainly consisting of underground barriers. In this context, physical models are fundamental to study the saltwater intrusion, since they provide benchmarks for numerical model calibrations and for the evaluation of the effectiveness of general solutions to contain the salt wedge. This work presents a laboratory experiment where seawater intrusion was reproduced in a specifically designed sand-box. The physical model, built at the University of Padova, represents the terminal part of a coastal aquifer and consists of a flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 49 cm with glass beads characterized by a d50 of 0.6 mm and a uniformity coefficient d60/d10 ≈ 1.5. The resulting porous media is homogeneous, with porosity of about 0.37 and hydraulic conductivity of about 1.3×10-3 m/s. Upstream from the sand-box, a tank filled by freshwater provides the recharge to the aquifer. The downstream tank simulates the sea and red food dye is added to the saltwater to easily visualize the salt wedge. The volume of the downstream tank is about five times the upstream one, and, due to the small filtration discharge, salt concentration variations (i.e., water density variations) due to the incoming freshwater flow are negligible. The hydraulic gradient during the tests is constant, due to the fixed water level in the two tanks. Water levels and discharged flow rate are continuously monitored. The experiment presented here had a duration of 36 h. For the first 24 h, the saltwater wedge was let to evolve until quasi stationary condition was obtained. In the last 12 h, water withdrawal was carried out at a

  15. Probabilistic assessment of seawater intrusion under multiple sources of uncertainty

    Science.gov (United States)

    Riva, M.; Guadagnini, A.; Dell'Oca, A.

    2015-01-01

    Coastal aquifers are affected by seawater intrusion (SWI) on a worldwide scale. The Henry's problem has been often used as a benchmark to analyze this phenomenon. Here, we investigate the way an incomplete knowledge of the system properties impacts the assessment of global quantities (GQs) describing key characteristics of the saltwater wedge in the dispersive Henry's problem. We recast the problem in dimensionless form and consider four dimensionless quantities characterizing the SWI process, i.e., the gravity number, the permeability anisotropy ratio, and the transverse and longitudinal Péclet numbers. These quantities are affected by uncertainty due to the lack of exhaustive characterization of the subsurface. We rely on the Sobol indices to quantify the relative contribution of each of these uncertain terms to the total variance of each of the global descriptors considered. Such indices are evaluated upon representing the target GQs through a generalized Polynomial Chaos Expansion (gPCE) approximation. The latter also serves as a surrogate model of the global system behavior. It allows (a) computing and analyzing the joint and marginal probability density function (pdf) of each GQ in a Monte Carlo framework at an affordable computational cost, and (b) exploring the way the uncertainty associated with the prediction of these global descriptors can be reduced by conditioning of the joint pdf on available information. Corresponding analytical expressions of the marginal pdfs of the variables of interest are derived and analyzed.

  16. Seawater intrusion and pumping wells in coastal aquifers

    Science.gov (United States)

    Nadjafzadeh Anvar, Amir; Riva, Monica

    2017-04-01

    Coastal aquifers are affected by seawater intrusion (SWI), this problem is exacerbated by groundwater extractions. In this work, we analyze key parameters affecting pumping wells contamination in costal aquifers. The USGS SUTRA code is employed to solve numerically flow and transport and to characterize SWI under diverse groundwater withdrawal scenarios. We developed two- and three-dimensional variable-density flow and solute transport models, respectively representing the existence of a pumping well barrier and of a single pumping well. The impact of the joint extraction of fresh- and salt- water has also been considered. We then analyzed the effect of (i) the location and pumping rate of fresh- and salt- water pumping wells (ii) the permeability of the aquifer as well as (iii) the transverse and longitudinal dispersivity on the maximum pumping time, tmax. The latter is defined as the maximum freshwater pumping time preventing the well to be contaminated by salt water. Finally we derived empirical equations to be used in practical applications to evaluate tmax as a function of key parameters highlighted.

  17. Geochemical and isotopic signatures for the identification of seawater intrusion in an alluvial aquifer

    Indian Academy of Sciences (India)

    Indu S Nair; S P Rajaveni; M Schneider; L Elango

    2015-08-01

    Seawater intrusion is one of the alarming processes that reduces the water quality and imperils the supply of freshwater in coastal aquifers. The region, north of the Chennai city, India is one such site affected by seawater intrusion. The objective of this study is to identify the extent of seawater intruded area by major geochemical and isotopic signatures. A total of 102 groundwater samples were collected and analysed for major and minor ions. Groundwater samples with electrical conductivity (EC) greater than 5000 S/cm and a river mouth sample were analyzed for Oxygen-18 (18O) and Deuterium (2H) isotopes to study their importance in monitoring seawater intrusion. The molar ratio of geochemical indicators and isotopic signatures suggests an intrusion up to a distance of 13 km from the sea as on March 2012 and up to 14.7 km during May 2012.

  18. Study on the Status Quo and Prevention-control Measures of Seawater Intrusion in Qingdao City

    Institute of Scientific and Technical Information of China (English)

    SUN; Jian-ming; LI; Jia-jia; GAO; Zong-jun

    2012-01-01

    Firstly, the general situation, influencing factors and damage of seawater intrusion in Qingdao City, Shandong Province were analyzed, and then some appropriate remedial measures were put forward, such as improving groundwater monitoring system in costal areas, exploiting groundwater reasonably, building underground cut-off walls and strengthening river management, which would provide a new approach for the prevention and control of seawater intrusion in Qingdao City.

  19. The evolution process of seawater intrusion in Laizhou Bay, and its linkage to climate change and human activity

    Science.gov (United States)

    xu, X.

    2013-12-01

    Seawater Intrusion is that seawater or saltwater intrude into the continent along the aquifer.Under the effects of the natural and artificial factors, the hydrodynamic conditions of aquifer in the coastal area has been changed ,which break the equilibrium between the seawater and the freshwater, hence the salt-fresh interface moves on the continent. Sea-level rise due to climate change and the paleoseawater hosting in marine strata combined with a rising population density in the Laizhou Bay have led to higher stresses on coastal water resources, and the risk of seawater intrusion has increased. Despite comprehensive seawater intrusion research and prevention measures are developed, the effects of climate change and human activity on seawater intrusion is still unclear. Therefore to reveal how climate change and human activity impact on seawater intrusion and to mathematical quantify it is important to establish reasonable prevention and control of seawater intrusion measures. Laizhou Bay is the region suffering from the geo-hazard of sea (saline) water intrusion most seriously in China, and is divided into seawater intrusion area, saline water (paleo-sea water) intrusion area and sea-saline water intrusion area The area of seawter intrusion in Laizhou Bay nearly 4,000 km2. And the seawater intrusion disasters in Laizhou bay can be divided into five stage from 1976 to now, which is Initial stage (1976-1979),Developing stage (1980-1985), Deterioration stage(1987-1989), Release stage (1990-2000)and Differentiation stage (2000-). The impact of human activities is shown as seawater intrusion in the linear growth trend. With the rapid economic development, the increase in abstraction from aquifers results in a serious imbalance between the seawater and freshwater interface, and the risk of seawater intrusion has increased. Taking into account of the climate change and human activity factors and seawater intrusion evaluation factors, such as the intensity of Cl

  20. Impact of Demographic Growth on Seawater Intrusion: Case of the Tripoli Aquifer, Lebanon

    Directory of Open Access Journals (Sweden)

    Omar Kalaoun

    2016-03-01

    Full Text Available Water resources in Mediterranean coastal aquifers are subject to overexploitation leading to an increase in seawater intrusion. Based on the United Nations Environment Program, “UNEP” 75% of people in the world will live in coastal cities by 2020. This is having a major impact on the salinization process. This paper deals with the impact of demographic evolution on seawater intrusion and considers the case of the lower Tripoli aquifer in Lebanon. A numerical model based on the sharp interface approach is implemented using “Freefem++” to access the seawater intrusion. The model is verified against an analytic and a numerical solution. It is calibrated and validated against hydraulic head observations (RMSD = 0.819 m. Then several scenarios of pumping are applied based on available demographic growth rates to quantify the impact on seawater intrusion. The projection scenarios show that if the current pumping rates are maintained while maintaining the demographic evolution, the pumping wells will be salinized within 2 decades in the highly populated areas.

  1. Assessing the pollution risk of a groundwater source field at western Laizhou Bay under seawater intrusion.

    Science.gov (United States)

    Zeng, Xiankui; Wu, Jichun; Wang, Dong; Zhu, Xiaobin

    2016-07-01

    Coastal areas have great significance for human living, economy and society development in the world. With the rapid increase of pressures from human activities and climate change, the safety of groundwater resource is under the threat of seawater intrusion in coastal areas. The area of Laizhou Bay is one of the most serious seawater intruded areas in China, since seawater intrusion phenomenon was firstly recognized in the middle of 1970s. This study assessed the pollution risk of a groundwater source filed of western Laizhou Bay area by inferring the probability distribution of groundwater Cl(-) concentration. The numerical model of seawater intrusion process is built by using SEAWAT4. The parameter uncertainty of this model is evaluated by Markov Chain Monte Carlo (MCMC) simulation, and DREAM(ZS) is used as sampling algorithm. Then, the predictive distribution of Cl(-) concentration at groundwater source field is inferred by using the samples of model parameters obtained from MCMC. After that, the pollution risk of groundwater source filed is assessed by the predictive quantiles of Cl(-) concentration. The results of model calibration and verification demonstrate that the DREAM(ZS) based MCMC is efficient and reliable to estimate model parameters under current observation. Under the condition of 95% confidence level, the groundwater source point will not be polluted by seawater intrusion in future five years (2015-2019). In addition, the 2.5% and 97.5% predictive quantiles show that the Cl(-) concentration of groundwater source field always vary between 175mg/l and 200mg/l. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. Investigation of Saltwater Intrusion and Recirculation of Seawater at a Coastal Boundary

    Science.gov (United States)

    Motz, L. H.; Sedighi, A.

    2012-12-01

    Numerical experiments were conducted to investigate saltwater intrusion and recirculation of seawater at a coastal boundary. A field-scale two-dimensional cross-section was simulated in which freshwater inflow occurred at an upgradient boundary, and saltwater inflow and freshwater outflow and recirculated seawater outflow occurred at a downgradient coastal boundary. The upgradient boundary is a specified-flux boundary with a zero freshwater concentration, and the downgradient boundary is a specified-head boundary with a specified saltwater concentration. This problem was solved using the numerical groundwater flow and transport code SEAWAT for two conditions, i.e., first for the uncoupled condition in which the fluid density is constant and thus the flow and transport equations are uncoupled in a constant-density flowfield, and then for the coupled condition in which the fluid density is a function of the total dissolved solids concentration and thus the flow and transport equations are coupled in a variable-density flowfield. Equivalent freshwater heads were specified at the downstream boundary for both conditions to account for density differences between freshwater and saltwater at the downstream boundary. A range of results for the landward extent of saltwater intrusion and the amount of recirculation of seawater at the coastal boundary was obtained by varying the independent dimensionless ratio of the freshwater inflow relative to the density-driven buoyancy flux, defined as az. For both coupled and uncoupled conditions, it was determined that saltwater intrusion and seawater recirculation are decreased significantly as az is increased. However, the extent of saltwater intrusion is less and the degree of seawater recirculation is greater for the uncoupled condition compared to the coupled condition at smaller values of az, indicating that significant differences can occur between uncoupled and coupled simulations. For the experiments conducted in this

  3. The numerical simulation and analysis of three-dimensional seawater intrusion and protection projects in porous media

    Institute of Scientific and Technical Information of China (English)

    YUAN YiRang; LIANG Dong; RUI HongXing

    2009-01-01

    For the three-dimensional seawater intrusion and protection system, the model of dynamics of fluids in porous media and the modified upwind finite difference fractional steps schemes are put forward. Based on the numerical simulation of the practical situation in the Laizhou Bay Area of Shandong Province, predictive numerical simulation and analysis of the consequence of protection projects, un-derground dams, tidal barrage projects and the applied modular form of project adjustment have been finished. By using the theory and techniques of differential equation prior estimates, the convergence results have been got.

  4. The numerical simulation and analysis of three-dimensional seawater intrusion and protection projects in porous media

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    For the three-dimensional seawater intrusion and protection system, the model of dynamics of fluids in porous media and the modified upwind finite difference fractional steps schemes are put forward. Based on the numerical simulation of the practical situation in the Laizhou Bay Area of Shandong Province, predictive numerical simulation and analysis of the consequence of protection projects, underground dams, tidal barrage projects and the applied modular form of project adjustment have been finished. By using the theory and techniques of differential equation prior estimates, the convergence results have been got.

  5. Geophysical and geochemical studies to delineate seawater intrusion in Bagoush area, Northwestern coast, Egypt

    Science.gov (United States)

    Eissa, Mustafa A.; Mahmoud, Hussein Hosni; Shouakar-Stash, Orfan; El-Shiekh, Abdelfattah; Parker, Beth

    2016-09-01

    Coastal aquifers are the main source for sustainable freshwater in many arid and semi-arid regions around the earth. In such regions, groundwater extraction far exceeds the natural replenishment rates due to additional demands on groundwater resources especially in the last few decades. The characterization of the seawater intrusion in the Baghoush area along the northwestern coast of Egypt assesses the risk of seawater intrusion for the purpose of managing the groundwater resources in coastal areas. The (SI) in the oolitic Pleistocene aquifer is affected by several natural factors, including the drainage patterns, geological structures, distance from the sea and the manipulation of groundwater. Electrical Resistivity Tomography (ERT) has been implemented to identify the geometry of the brackish/saline water interface and to map the distribution of brackish water zone floating over the denser saline water. Seven 2-D resistivity imaging profiles were conducted using a Wenner array with different electrode distance spacings. The inverse resistivity models of these profiles indicate that these profiles are composed of three zones: the upper dry zone, the middle brackish water zone, and the lower saline water zone. The thickness of the brackish groundwater zone decreases toward the sea and the resistivity decreases with depth due to increase in water salinity. Water table along these profiles decreases from south to north, which indicates that groundwater flow is from south (inland) to north (sea). Groundwater chemistry and stable isotopes were used to determine the fresh groundwater recharge source(s), to identify mixing of different groundwaters, to evaluate seawater intrusion zone along the coast, and to investigate the upwelling of deep saline groundwater underneath the brackish zone. The recharge of fresh groundwater originates from the mountain watershed located upstream as well as the annual rainfall; however, seawater is the main source of groundwater

  6. Testing alternative conceptual models of seawater intrusion in a coastal aquifer using computer simulation, southern California, USA

    Science.gov (United States)

    Nishikawa, T.

    1997-01-01

    Two alternative conceptual models of the physical processes controlling seawater intrusion in a coastal basin in California, USA, were tested to identify a likely principal pathway for seawater intrusion. The conceptual models were tested by using a two-dimensional, finite-element groundwater flow and transport model. This pathway was identified by the conceptual model that best replicated the historical data. The numerical model was applied in cross section to a submarine canyon that is a main avenue for seawater to enter the aquifer system underlying the study area. Both models are characterized by a heterogeneous, layered, water-bearing aquifer. However, the first model is characterized by flat-lying aquifer layers and by a high value of hydraulic conductivity in the basal aquifer layer, which is thought to be a principal conduit for seawater intrusion. The second model is characterized by offshore folding, which was modeled as a very nearshore outcrop, thereby providing a shorter path for seawater to intrude. General conclusions are that: 1) the aquifer system is best modeled as a flat, heterogeneous, layered system; 2) relatively thin basal layers with relatively high values of hydraulic conductivity are the principal pathways for seawater intrusion; and 3) continuous clay layers of low hydraulic conductivity play an important role in controlling the movement of seawater.

  7. Why seawater intrusion has not yet occurred in the Kaluvelli-Pondicherry basin, Tamil Nadu, India

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2017-03-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is greatest when aquifers are overexploited or when recharge is low due to a semi-arid or arid climate. The Kaluvelli-Pondicherry sedimentary basin in Tamil Nadu (India) presents both these characteristics. Groundwater levels in the Vanur aquifer can reach 50 m below sea level at less than 20 km inland. This groundwater depletion is due to an exponential increase in extraction for irrigation over 35 years. No seawater intrusion has yet been detected, but a sulphate-rich mineralization is observed, the result of upward vertical leakage from the underlying Ramanathapuram aquifer. To characterize the mechanisms involved, and to facilitate effective water management, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been applied to a quasi-3D hydrogeological model, NEWSAM. Recharge had been previously quantified through the inter-comparison of hydrological models, based on climatological and surface-flow field measurements. Sensitivity tests on parameters and boundary conditions associated with the sea were performed. The resulting water balances for each aquifer led to hypotheses of (1) an offshore fresh groundwater stock, and (2) a reversal and increase of the upward leakage from the Ramanathapuram aquifer, thus corroborating the hypothesis proposed to explain geochemical results of the previous study, and denying a seawater intrusion. Palaeo-climate review supports the existence of favourable hydro-climatological conditions to replenish an offshore groundwater stock of the Vanur aquifer in the past. The extent of this fresh groundwater stock was calculated using the Kooi and Groen method.

  8. Why seawater intrusion has not yet occurred in the Kaluvelli-Pondicherry basin, Tamil Nadu, India

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2017-09-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is greatest when aquifers are overexploited or when recharge is low due to a semi-arid or arid climate. The Kaluvelli-Pondicherry sedimentary basin in Tamil Nadu (India) presents both these characteristics. Groundwater levels in the Vanur aquifer can reach 50 m below sea level at less than 20 km inland. This groundwater depletion is due to an exponential increase in extraction for irrigation over 35 years. No seawater intrusion has yet been detected, but a sulphate-rich mineralization is observed, the result of upward vertical leakage from the underlying Ramanathapuram aquifer. To characterize the mechanisms involved, and to facilitate effective water management, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been applied to a quasi-3D hydrogeological model, NEWSAM. Recharge had been previously quantified through the inter-comparison of hydrological models, based on climatological and surface-flow field measurements. Sensitivity tests on parameters and boundary conditions associated with the sea were performed. The resulting water balances for each aquifer led to hypotheses of (1) an offshore fresh groundwater stock, and (2) a reversal and increase of the upward leakage from the Ramanathapuram aquifer, thus corroborating the hypothesis proposed to explain geochemical results of the previous study, and denying a seawater intrusion. Palaeo-climate review supports the existence of favourable hydro-climatological conditions to replenish an offshore groundwater stock of the Vanur aquifer in the past. The extent of this fresh groundwater stock was calculated using the Kooi and Groen method.

  9. The Alternating-Direction Schemes and Numerical Analysis for the Three-dimensional Seawater Intrusion Simulation

    Institute of Scientific and Technical Information of China (English)

    Zhi-yue Zhang

    2002-01-01

    Both numerical simulation and theoretical analysis of seawater intrusion in coastal regions are of great theoretical importance in environmental sciences. The mathematical model can be described as a coupled system of three dimensional nonlinear partial differential equations with initial-boundary value problems. In this paper, according to the actual conditions of molecular and three-dimensional characteristic of the problem,we construct the characteristic finite element alternating-direction schemes which can be divided into three continuous one-dimensional problems. By making use of tensor product algorithm, and priori estimation theory and techniques, the optimal order estimates in H1 norm are derived for the error in the approximate solution.

  10. Large-Scale Aquifer Replenishment and Seawater Intrusion Control Using Recycled Water in Southern California

    Energy Technology Data Exchange (ETDEWEB)

    Herndon, R.; Markus, M.

    2014-10-01

    In 2008, eighteen years after determining that its Talbert Seawater Barrier required expansion, the Orange County Water District started up the worldss largest indirect potable reuse facility, the Groundwater Replenishment System (GWR System). The GWR System provides a reliable potable-quality water supply to the Talbert Barrier, which consists of 109 multi-depth injection wells. The Talbert Barrier began operation in 1976 with the completion of Water Factory 21, the first project in California permitted to inject recycled water into a potable-supply aquifer. By 1990, as groundwater pumping increased, it was evident that the barriers original injection wells were incapable of maintaining protective groundwater elevations to prevent seawater intrusion. Ten years of technical planning and public outreach culminated in the decision to demolish the undersized Water Factory 21 and build a state-of-the-art advanced recycled water treatment system and expanded barrier. Barrier expansion entailed construction of over 20 new injection wells in key areas where seawater intrusion was observed. Flow modeling indicated that average barrier injection needed to be doubled to 80 m{sup 3}/min (30 mgal/day). Based on seasonal groundwater pumping patterns, model simulations indicated that the barrier should inject up to 107 m{sup 3}/min (40 mgal/day) in the summer/fall months and one-half that rate in winter/spring months to maintain a protective hydraulic barrier. With a capacity of 187 m{sup 3}/min (70 mgd), the GWR System provides all of the high-quality water that the barrier requires, with the remainder conveyed to OCWDss infiltration basins in the city of Anaheim. Five years after start-up, the expanded seawater barrier has met all expectations in terms of capacity and groundwater elevation maintenance using a reliable locally-produced water supply. (Author)

  11. An immune based dynamic intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    With the dynamic description method for self and antigen, and the concept of dynamic immune tolerance for lymphocytes in network-security domain presented in this paper, a new immune based dynamic intrusion detection model (Idid) is proposed. In Idid, the dynamic models and the corresponding recursive equations of the lifecycle of mature lymphocytes, and the immune memory are built. Therefore, the problem of the dynamic description of self and nonself in computer immune systems is solved, and the defect of the low efficiency of mature lymphocyte generating in traditional computer immune systems is overcome. Simulations of this model are performed, and the comparison experiment results show that the proposed dynamic intrusion detection model has a better adaptability than the traditional methods.

  12. Geophysical approach for assessment of seawater intrusion in the coastal aquifer of Wadi Nador (Tipaza, Algeria)

    Science.gov (United States)

    Bouderbala, Abdelkader; Remini, Boualem

    2014-12-01

    The aquifer of Nador has suffered significant salinization due to seawater intrusion. It was strongly exploited during the 1980s and 1990s. A piezometric analysis in April 2012 showed the piezometric level to lie at 0 m a.s.l. over the plain; as a result, this aquifer is highly sensitive to the marine intrusion with an electrical conductivity of the groundwater in of exceeds 2500 μS/cm and so there are no abstractions for irrigation or drinking purpose from these sectors. The geoelectric study also showed the lateral variation in the electrical resistivity for two moments separated in time by more than 45 years. The fall in resistivity may be due to the encroachment of seawater into previously freshwater zones and/or infiltration during the era of pumped abstractions downstream. The resistivity surveys reveal two distinct sectors: the saturated aquifer in brackish and saltwater having resistivity values to 36-10 Ωm, which extends nearly 1600 m inland.

  13. How significant is the slope of the sea-side boundary for modelling seawater intrusion in coastal aquifers?

    Science.gov (United States)

    Walther, Marc; Graf, Thomas; Kolditz, Olaf; Liedl, Rudolf; Post, Vincent

    2017-08-01

    Application of numerical models is a common method to assess groundwater resources. The versatility of these models allows consideration of different levels of complexity, but the accuracy of the outcomes hinges upon a proper description of the system behaviour. In seawater intrusion assessment, the implementation of the sea-side boundary condition is of particular importance. We evaluate the influence of the slope of the sea-side boundary on the simulation results of seawater intrusion in a freshwater aquifer by employing a series of slope variations together with a sensitivity analysis by varying additional sensitive parameters (freshwater inflow and longitudinal and transverse dispersivities). Model results reveal a multi-dimensional dependence of the investigated variables with an increasing relevance of the sea-side boundary slope for seawater intrusion (decrease of up to 32%), submarine groundwater discharge zone (reduction of up to 55%), and turnover times (increase of up to 730%) with increasing freshwater inflow or dispersivity values.

  14. Simulating spatial adaption of groundwater pumping on seawater intrusion in coastal regions

    Science.gov (United States)

    Grundmann, Jens; Ladwig, Robert; Schütze, Niels; Walther, Marc

    2016-04-01

    Coastal aquifer systems are used intensively to meet the growing demands for water in those regions. They are especially at risk for the intrusion of seawater due to aquifer overpumping, limited groundwater replenishment and unsustainable groundwater management which in turn also impacts the social and economical development of coastal regions. One example is the Al-Batinah coastal plain in northern Oman where irrigated agriculture is practiced by lots of small scaled farms in different distances from the sea, each of them pumping their water from coastal aquifer. Due to continuous overpumping and progressing saltwater intrusion farms near the coast had to close since water for irrigation got too saline. For investigating appropriate management options numerical density dependent groundwater modelling is required which should also portray the adaption of groundwater abstraction schemes on the water quality. For addressing this challenge a moving inner boundary condition is implemented in the numerical density dependent groundwater model which adjusts the locations for groundwater abstraction according to the position of the seawater intrusion front controlled by thresholds of relative chloride concentration. The adaption process is repeated for each management cycle within transient model simulations and allows for considering feedbacks with the consumers e.g. the agriculture by moving agricultural farms more inland or towards the sea if more fertile soils at the coast could be recovered. For finding optimal water management strategies efficiently, the behaviour of the numerical groundwater model for different extraction and replenishment scenarios is approximated by an artificial neural network using a novel approach for state space surrogate model development. Afterwards the derived surrogate is coupled with an agriculture module within a simulation based water management optimisation framework to achieve optimal cropping pattern and water abstraction schemes

  15. Numerical modelling of seawater intrusion in Shenzhen (China) using a 3D densitydependent model including tidal effects

    Indian Academy of Sciences (India)

    Wei Lu; Qingchun Yang; Jordi D Martín; Ricardo Juncosa

    2013-04-01

    During the 1990s, groundwater overexploitation has resulted in seawater intrusion in the coastal aquifer of the Shenzhen city, China. Although water supply facilities have been improved and alleviated seawater intrusion in recent years, groundwater overexploitation is still of great concern in some local areas. In this work we present a three-dimensional density-dependent numerical model developed with the FEFLOW code, which is aimed at simulating the extent of seawater intrusion while including tidal effects and different groundwater pumping scenarios. Model calibration, using waterheads and reported chloride concentration, has been performed based on the data from 14 boreholes, which were monitored from May 2008 to December 2009. A fairly good fitness between the observed and computed values was obtained by a manual trial-and-error method. Model prediction has been carried out forward 3 years with the calibrated model taking into account high, medium and low tide levels and different groundwater exploitation schemes. The model results show that tide-induced seawater intrusion significantly affects the groundwater levels and concentrations near the estuarine of the Dasha river, which implies that an important hydraulic connection exists between this river and groundwater, even considering that some anti-seepage measures were taken in the river bed. Two pumping scenarios were considered in the calibrated model in order to predict the future changes in the water levels and chloride concentration. The numerical results reveal a decreased tendency of seawater intrusion if groundwater exploitation does not reach an upper bound of about 1.32 × 104 m3/d. The model results provide also insights for controlling seawater intrusion in such coastal aquifer systems.

  16. The modified method of upwind with finite difference fractional steps procedure for the numerical simulation and analysis of seawater intrusion

    Institute of Scientific and Technical Information of China (English)

    YUAN Yirang; LIANG Dong; RUI Hongxing

    2006-01-01

    Numerical simulation and analysis of seawater intrusion is the mathematical basis for modern environmental science. Its mathematical model is the nonlinear coupled system of partial differential equations with initial-boundary problems. For a generic case of a three-dimensional bounded region, the modified method of upwind with finite difference fractional steps procedure is put forward. Optimal order estimates in L2 norm are derived for the error in the approximation solution. The present method has been successfully used in predicting the consequences of seawater intrusion and protection projects.

  17. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    Science.gov (United States)

    Supriyadi, Khumaedi, Yusuf, M.; Agung, W.

    2016-03-01

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm3 to 0.3 g/cm3 and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there were in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm3 to 0.28 g/cm3. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.

  18. Characterisation of sea-water intrusion in the Pioneer Valley, Australia using hydrochemistry and three-dimensional numerical modelling

    Science.gov (United States)

    Werner, A. D.; Gallagher, M. R.

    2006-12-01

    Sea-water intrusion is actively contaminating fresh groundwater reserves in the coastal aquifers of the Pioneer Valley, north-eastern Australia. A three-dimensional sea-water intrusion model has been developed using the MODHMS code to explore regional-scale processes and to aid assessment of management strategies for the system. A sea-water intrusion potential map, produced through analyses of the hydrochemistry, hydrology and hydrogeology, offsets model limitations by providing an alternative appraisal of susceptibility. Sea-water intrusion in the Pioneer Valley is not in equilibrium, and a potential exists for further landward shifts in the extent of saline groundwater. The model required consideration of tidal over-height (the additional hydraulic head at the coast produced by the action of tides), with over-height values in the range 0.5-0.9 m giving improved water-table predictions. The effect of the initial water-table condition dominated the sensitivity of the model to changes in the coastal hydraulic boundary condition. Several salination processes are probably occurring in the Pioneer Valley, rather than just simple landward sea-water advancement from “modern” sources of marine salts. The method of vertical discretisation (i.e. model-layer subdivision) was shown to introduce some errors in the prediction of water-table behaviour.

  19. Coupling of hydrogeological models with hydrogeophysical data to characterize seawater intrusion and shallow geothermal systems

    Science.gov (United States)

    Beaujean, J.; Kemna, A.; Engesgaard, P. K.; Hermans, T.; Vandenbohede, A.; Nguyen, F.

    2013-12-01

    While coastal aquifers are being stressed due to climate changes and excessive groundwater withdrawals require characterizing efficiently seawater intrusion (SWI) dynamics, production of geothermal energy is increasingly being used to hinder global warming. To study these issues, we need both robust measuring technologies and reliable predictions based on numerical models. SWI models are currently calibrated using borehole observations. Similarly, geothermal models depend mainly on the temperature field at few locations. Electrical resistivity tomography (ERT) can be used to improve these models given its high sensitivity to TDS and temperature and its relatively high lateral resolution. Inherent geophysical limitations, such as the resolution loss, can affect the overall quality of the ERT images and also prevent the correct recovery of the desired hydrochemical property. We present an uncoupled and coupled hydrogeophysical inversion to calibrate SWI and thermohydrogeologic models using ERT. In the SWI models, we demonstrate with two synthetic benchmarks (homogeneous and heterogeneous coastal aquifers) the ability of cumulative sensitivity-filtered ERT images using surface-only data to recover the hydraulic conductivity. Filtering of ERT-derived data at depth, where resolution is poorer, and the model errors make the dispersivity more difficult to estimate. In the coupled approach, we showed that parameter estimation is significantly improved because regularization bias is replaced by forward modeling only. Our efforts are currently focusing on applying the uncoupled/coupled approaches on a real life case study using field data from the site of Almeria, SE Spain. In the thermohydrogeologic models, the most sensitive hydrologic parameters responsible for heat transport are estimated from surface ERT-derived temperatures and ERT resistance data. A real life geothermal experiment that took place on the Campus De Sterre of Ghent University, Belgium and a synthetic

  20. Protecting coastal abstraction boreholes from seawater intrusion using self-potential data

    Science.gov (United States)

    Graham, Malcolm; Butler, Adrian; MacAllister, Donald John; Vinogradov, Jan; Ijioma, Amadi; Jackson, Matthew

    2016-04-01

    We investigate whether the presence and transport of seawater can influence self-potentials (SPs) measured within coastal groundwater boreholes, with a view to using SP monitoring as part of an early warning system for saline intrusion. SP data were collected over a period of 18 months from a coastal groundwater borehole in the fractured Chalk of England. Spectral analysis of the results shows semi-diurnal fluctuations that are several orders of magnitude higher than those observed from monitoring of the Chalk more than 60 km inland, indicating a strong influence from oceanic tides. Hydrodynamic and geoelectric modelling of the coastal aquifer suggests that observed pressure changes (giving rise to the streaming potential) are not sufficient to explain the magnitude of the observed SP fluctuations. Simulation of the exclusion-diffusion potential, produced by changes in concentration across the saline front, is required to match the SP data from the borehole, despite the front being located some distance away. In late summer of 2013 and 2014, seawater intrusion occurred in the coastal monitoring borehole. When referenced to the shallowest borehole electrode, there was a characteristic increase in SP within the array, several days before any measurable increase in salinity. The size of this precursor increased steadily with depth, typically reaching values close to 0.3 mV in the deepest electrode. Numerical modelling suggests that the exclusion-diffusion potential can explain the magnitude of the precursor, but that the polarity of the change in SP cannot be replicated assuming a homogeneous aquifer. Small-scale models of idealised Chalk blocks were used to simulate the effects of discrete fractures on the distribution of SP. Initial results suggest that comparatively large reductions in voltage can develop in the matrix ahead of the front, in conjunction with a reduced or absent precursor in the vicinity of a fracture. Geophysical logging indicates the presence of a

  1. Assessment of groundwater vulnerability to anthropogenic pollution and seawater intrusion in a small tropical island using index-based methods.

    Science.gov (United States)

    Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Aris, Ahmad Zaharin; Tanko, Adamu Idris; Zaudi, Muhammad Amar

    2015-01-01

    In this work, the DRASTIC and GALDIT models were employed to determine the groundwater vulnerability to contamination from anthropogenic activities and seawater intrusion in Kapas Island. In addition, the work also utilized sensitivity analysis to evaluate the influence of each individual parameter used in developing the final models. Based on these effects and variation indices of the said parameters, new effective weights were determined and were used to create modified DRASTIC and GALDIT models. The final DRASTIC model classified the island into five vulnerability classes: no risk (110-140), low (140-160), moderate (160-180), high (180-200), and very high (>200), covering 4, 26, 59, 4, and 7 % of the island, respectively. Likewise, for seawater intrusion, the modified GALDIT model delineates the island into four vulnerability classes: very low (130) covering 39, 33, 18, and 9 % of the island, respectively. Both models show that the areas that are likely to be affected by anthropogenic pollution and seawater intrusion are within the alluvial deposit at the western part of the island. Pearson correlation was used to verify the reliability of the two models in predicting their respective contaminants. The correlation matrix showed a good relationship between DRASTIC model and nitrate (r = 0.58). In a similar development, the correlation also reveals a very strong negative relationship between GALDIT model and seawater contaminant indicator (resistivity Ωm) values (r = -0.86) suggesting that the model predicts more than 86 % of seawater intrusion. In order to facilitate management strategy, suitable areas for artificial recharge were identified through modeling. The result suggested some areas within the alluvial deposit at the western part of the island as suitable for artificial recharge. This work can serve as a guide for a full vulnerability assessment to anthropogenic pollution and seawater intrusion in small islands and will help policy maker and

  2. Joint Hydrogeophysical Inversion: State Estimation for Seawater Intrusion Models in 3D

    CERN Document Server

    Steklova, K

    2016-01-01

    Seawater intrusion (SWI) is a complex process, where 3D modeling is often necessary in order to monitor and manage the affected aquifers. Here, we present a synthetic study to test a joint hydrogeophysical inversion approach aimed at solving the inverse problem of estimating initial and current saltwater distribution. First, we use a 3D groundwater model for variable density flow based on discretized flow and solute mass balance equations. In addition to the groundwater model, a 3D geophysical model was developed for direct current resistivity imaging and inversion. The objective function of the coupled problem consists of data misfit and regularization terms as well as a coupling term that relates groundwater and geophysical states. We present a novel approach to solve the inverse problem using an Alternating Direction Method of Multipliers (ADMM) to minimize this coupled objective function. The sensitivities are derived analytically for the discretized system of equations, which allows us to efficiently com...

  3. A simulation/optimization study to assess seawater intrusion management strategies for the Gaza Strip coastal aquifer (Palestine)

    Science.gov (United States)

    Dentoni, Marta; Deidda, Roberto; Paniconi, Claudio; Qahman, Khalid; Lecca, Giuditta

    2015-03-01

    Seawater intrusion is one of the major threats to freshwater resources in coastal areas, often exacerbated by groundwater overexploitation. Mitigation measures are needed to properly manage aquifers, and to restore groundwater quality. This study integrates three computational tools into a unified framework to investigate seawater intrusion in coastal areas and to assess strategies for managing groundwater resources under natural and human-induced stresses. The three components are a three-dimensional hydrogeological model for density-dependent variably saturated flow and miscible salt transport, an automatic calibration procedure that uses state variable outputs from the model to estimate selected model parameters, and an optimization module that couples a genetic algorithm with the simulation model. The computational system is used to rank alternative strategies for mitigation of seawater intrusion, taking into account conflicting objectives and problem constraints. It is applied to the Gaza Strip (Palestine) coastal aquifer to identify a feasible groundwater management strategy for the period 2011-2020. The optimized solution is able to: (1) keep overall future abstraction from municipal groundwater wells close to the user-defined maximum level, (2) increase the average groundwater heads, and (3) lower both the total mass of salt extracted and the extent of the areas affected by seawater intrusion.

  4. Management of aquifer recharge in Lebanon by removing seawater intrusion from coastal aquifers.

    Science.gov (United States)

    Masciopinto, Costantino

    2013-11-30

    This study investigates the feasibility of management of aquifer recharge (MAR) in Lebanon by designing well barriers to remove seawater intrusion from the fractured carbonate aquifers. Groundwater flow and saltwater/freshwater 50% sharp interface have been modeled along the coastal area using the Ghyben-Herzberg theory. The groundwater flow simulations have been supported by field transmissivity estimations and depth measurements carried out on 44 wells during 2003. Results have shown the seawater intrusion in coastal aquifers at Jieh and Damour regions. Three well-injection barriers have been proposed. The water volumes for recharge and the barrier positions have been defined by means of groundwater flow simulations. MAR can provide a valuable contribution to colloid (even pathogen) removal from injectant water, although during water infiltration in subsoil the reduction of aquifer permeability causes clogging. A simple new model for estimating the soil-rock permeability reduction due to the well clogging has been presented. The MAR, including the soil aquifer treatment at Damour and Jieh regions, has been studied by considering aquifer transmissivity (and soil porosity) reduction caused by clogging. Furthermore, the appropriate mixing of the injectant water by using reclaimed water, groundwater and surface water can be simulated using the proposed models. The time required to achieve 5% of rock permeability reduction at the proposed well barriers ranged from 71 to 935 d, by changing water quality and flow rate for recharge. This study can assist regional governments with water management in areas affected by scarcity of freshwater by implementing appropriate well-barrier projects.

  5. Analytical solutions of seawater intrusion in sloping confined and unconfined coastal aquifers

    Science.gov (United States)

    Lu, Chunhui; Xin, Pei; Kong, Jun; Li, Ling; Luo, Jian

    2016-09-01

    Sloping coastal aquifers in reality are ubiquitous and well documented. Steady state sharp-interface analytical solutions for describing seawater intrusion in sloping confined and unconfined coastal aquifers are developed based on the Dupuit-Forchheimer approximation. Specifically, analytical solutions based on the constant-flux inland boundary condition are derived by solving the discharge equation for the interface zone with the continuity conditions of the head and flux applied at the interface between the freshwater zone and the interface zone. Analytical solutions for the constant-head inland boundary are then obtained by developing the relationship between the inland freshwater flux and hydraulic head and combining this relationship with the solutions of the constant-flux inland boundary. It is found that for the constant-flux inland boundary, the shape of the saltwater interface is independent of the geometry of the bottom confining layer for both aquifer types, despite that the geometry of the bottom confining layer determines the location of the interface tip. This is attributed to that the hydraulic head at the interface is identical to that of the coastal boundary, so the shape of the bed below the interface is irrelevant to the interface position. Moreover, developed analytical solutions with an empirical factor on the density factor are in good agreement with the results of variable-density flow numerical modeling. Analytical solutions developed in this study provide a powerful tool for assessment of seawater intrusion in sloping coastal aquifers as well as in coastal aquifers with a known freshwater flux but an arbitrary geometry of the bottom confining layer.

  6. Large-Scale Multi-Objective Optimization for the Management of Seawater Intrusion, Santa Barbara, CA

    Science.gov (United States)

    Stanko, Z. P.; Nishikawa, T.; Paulinski, S. R.

    2015-12-01

    The City of Santa Barbara, located in coastal southern California, is concerned that excessive groundwater pumping will lead to chloride (Cl) contamination of its groundwater system from seawater intrusion (SWI). In addition, the city wishes to estimate the effect of continued pumping on the groundwater basin under a variety of initial and climatic conditions. A SEAWAT-based groundwater-flow and solute-transport model of the Santa Barbara groundwater basin was optimized to produce optimal pumping schedules assuming 5 different scenarios. Borg, a multi-objective genetic algorithm, was coupled with the SEAWAT model to identify optimal management strategies. The optimization problems were formulated as multi-objective so that the tradeoffs between maximizing pumping, minimizing SWI, and minimizing drawdowns can be examined by the city. Decisions can then be made on a pumping schedule in light of current preferences and climatic conditions. Borg was used to produce Pareto optimal results for all 5 scenarios, which vary in their initial conditions (high water levels, low water levels, or current basin state), simulated climate (normal or drought conditions), and problem formulation (objective equations and decision-variable aggregation). Results show mostly well-defined Pareto surfaces with a few singularities. Furthermore, the results identify the precise pumping schedule per well that was suitable given the desired restriction on drawdown and Cl concentrations. A system of decision-making is then possible based on various observations of the basin's hydrologic states and climatic trends without having to run any further optimizations. In addition, an assessment of selected Pareto-optimal solutions was analyzed with sensitivity information using the simulation model alone. A wide range of possible groundwater pumping scenarios is available and depends heavily on the future climate scenarios and the Pareto-optimal solution selected while managing the pumping wells.

  7. Managed Aquifer Recharge (MAR) and Design and Construction of Hydraulic Barriers against Seawater Intrusion: the California Case

    Energy Technology Data Exchange (ETDEWEB)

    Foreman, T. L.

    2014-10-01

    Managed aquifer recharge (MAR) has been practiced in California for over a century, using a range of artificial recharge methods, including surface spreading basins, injection wells and aquifer storage and recovery (ASR) wells. Intense municipal and industrial development of coastal regions, particularly in southern California, during and following World War II, led to overdraft of coastal groundwater basins, where groundwater levels were drawn down below sea level, resulting in seawater intrusion into freshwater aquifers. Surface water is imported from the Colorado River and later northern California to satisfy water demands of a growing population. This imported water is also a water supply used for injection into to injection wells constructed in the 1960s along the coastline to repel seawater from intruding into coastal aquifers. Since the 1960s, these seawater intrusion barriers have evolved in terms of water supplied for injection and in their construction and operation details. Imported water supplies are being completely replaced with highly treated wastewater and the injection wells are being constructed so that they are more automated to reduce operational costs. The West Coast Basin of southern California is provided as a case study of the evolution of hydraulic barriers used for protection against seawater intrusion into coastal aquifers. (Author)

  8. Seawater intrusion mapping using electrical resistivity tomography and hydrochemical data. An application in the coastal area of eastern Thermaikos Gulf, Greece

    Energy Technology Data Exchange (ETDEWEB)

    Kazakis, N., E-mail: kazanera@yahoo.com [Aristotle University of Thessaloniki, Department of Geology, Lab. of Engineering Geology & Hydrogeology, 54124 Thessaloniki (Greece); Pavlou, A. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Engineering Geology & Hydrogeology, 54124 Thessaloniki (Greece); Vargemezis, G. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Applied Geophysics, 54124 Thessaloniki (Greece); Voudouris, K.S.; Soulios, G. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Engineering Geology & Hydrogeology, 54124 Thessaloniki (Greece); Pliakas, F. [Democritus University of Thrace, Department of Civil Engineering, Xanthi 67100 (Greece); Tsokas, G. [Aristotle University of Thessaloniki, Department of Geology, Lab. of Applied Geophysics, 54124 Thessaloniki (Greece)

    2016-02-01

    The aim of this study was to determine the extent and geometrical characteristics of seawater intrusion in the coastal aquifer of the eastern Thermaikos Gulf, Greece. Hydrochemical data and geoelectrical measurements were combined and supplemented to determine the hydrochemical regime of the study site in regard to seawater phenomena. Chemical analysis of groundwater was performed in 126 boreholes and fifteen electrical resistivity tomographies (ERT) were measured, whereas in two sites the ERT measurements were repeated following the wet season. The Cl{sup −} concentrations recorded reached 2240 mg/L indicating seawater intrusion which was also verified by ionic ratios. The ionic ratios were overlapped and a seawater intrusion map (SWIM) was produced. A significant part of the coastal aquifer (up to 150 km{sup 2}) is influenced by seawater intrusion. The areas with the most intensive salinization are located between Nea Kallikratia–Epanomi and Aggelochori–Peraia. According to the ERTs, in the influenced areas the salinization of the aquifer exceeds 1 km toward the mainland and its depth reaches 200 m. In the area surrounding Thessaloniki airport, the ERTs revealed salinization of the upper aquifer to depths of up to 40 m, whereas the lower aquifer is uninfluenced. This abnormal distribution of seawater intrusion demonstrates the value of geoelectrical methods in the study of seawater intrusion especially in areas with limited available hydrochemical data. - Highlights: • ERTs determined the geometrical characteristics of the saline aquifer. • An abnormal distribution of seawater intrusion was recorded. • Four ionic ratios overlapped and a seawater intrusion map was produced. • Cl{sup −} concentrations increased significantly from 2005 to 2010 by up to 1800 mg/L.

  9. Seawater intrusion into groundwater aquifer through a coastal lake - complex interaction characterised by water isotopes (2)H and (18)O.

    Science.gov (United States)

    Gemitzi, Alexandra; Stefanopoulos, Kyriakos; Schmidt, Marie; Richnow, Hans H

    2014-01-01

    The present study investigates the complex interactions among surface waters, groundwaters and a coastal lake in northeastern Greece, using their stable isotopic composition (δ(18)O, δ(2)H) in combination with hydrogeological and hydrochemical data. Seasonal and spatial trends of water isotopes were studied and revealed that all water bodies in the study area interact. It was also shown that the aquifer's increased salinity is not due to fossil water from past geological periods, but is attributed to brackish lake water intrusion into the aquifer induced by the extensive groundwater pumping for irrigation purposes. Quantification of the contribution of the lake to the aquifer was achieved using the simple dilution formula. The isotopic signatures of the seawater and the groundwaters are considerably different, so there is a very little possibility of direct seawater intrusion into the aquifer.

  10. Electrical Resistivity Imaging of Seawater Intrusion into the Monterey Bay Aquifer System.

    Science.gov (United States)

    Pidlisecky, A; Moran, T; Hansen, B; Knight, R

    2016-03-01

    We use electrical resistivity tomography to obtain a 6.8-km electrical resistivity image to a depth of approximately 150 m.b.s.l. along the coast of Monterey Bay. The resulting image is used to determine the subsurface distribution of saltwater- and freshwater-saturated sediments and the geologic controls on fluid distributions in the region. Data acquisition took place over two field seasons in 2011 and 2012. To maximize our ability to image both vertical and horizontal variations in the subsurface, a combination of dipole-dipole, Wenner, Wenner-gamma, and gradient measurements were made, resulting in a large final dataset of approximately 139,000 data points. The resulting resistivity section extends to a depth of 150 m.b.s.l., and is used, in conjunction with the gamma logs from four coastal monitoring wells to identify four dominant lithologic units. From these data, we are able to infer the existence of a contiguous clay layer in the southern portion of our transect, which prevents downward migration of the saltwater observed in the upper 25 m of the subsurface to the underlying freshwater aquifer. The saltwater and brackish water in the northern portion of the transect introduce the potential for seawater intrusion into the hydraulically connected freshwater aquifer to the south, not just from the ocean, but also laterally from north to south.

  11. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello

    2015-11-01

    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  12. The effect of sea-water intrusion due to the large scale construction in a coastal region

    Science.gov (United States)

    Hyun, S.; Jin, S.; Woo, N. C.; Lee, J.; Lee, H.; Kim, Y.

    2010-12-01

    This study was carried out for estimating the seawater intrusion at the disturbed aquifer by a large scale construction when building a power plant in a coastal region, located in southeastern part of the Korean peninsula. Groundwater sampling and vertical profiling of electrical conductivity(EC) for 8 monitoring wells were carried. EC profiling results shows that maximum EC for PW-5, 6 and 7 is over 40 mS/cm, for PZ-1, 3, 4 and 8 is 18.76, 4.46, 26.16, 21.42 mS/cm and for PZ-2 is 0.79 mS/cm,respectively. Chemical composition of water samples shows that water types of Na-Cl for PZ-5, 6, and 7 (excavated and backfilled area), Na-Cl-SO4 for PZ-4 and PZ-8, Na-Ca-Mg-Cl for PZ-1, Ca-Na-SO4-Cl for PZ-2, and Mg-Ca-Na-SO4 for PZ-3. In addition, the bivariate plot of SO4/Cl(meq ratios) and SO4(mmol/L) indicates that PZ-4, 5, 6, 7 and 8 appear to be seawater, PZ-1 is located at mixing zone between freshwater and seawater, and PZ-2 is freshwater. However, based on the high SO42- level and (HCO3-/Sum anions} ratio less than 0.8, groundwater at PZ-3 seems to show the gypsum dissolution. The gypsum dissolution was attributed to the effect of sea-water intrusion on ageing of lean concrete that was used for backfill around the PZ-3. Key words : large scale construction, EC profiling, hydrochemistry, sea-water intrusion, concrete ageing Acknowledgement This study has been carried out under the Nuclear R&D Program [No. 2010-0001070] supported by the Ministry of Education, Science and Technology, Republic of Korea.

  13. Use of major ions to evaluate the hydrogeochemistry of groundwater influenced by reclamation and seawater intrusion, West Nile Delta, Egypt.

    Science.gov (United States)

    Salem, Zenhom El-Said; Osman, Osman M

    2017-02-01

    The aim of this research is to evaluate the groundwater geochemistry in western Nile Delta area as an example of an aquifer influenced by reclamation and seawater intrusion. To conduct this study, 63 groundwater samples and one surface water sample from El Nubaria Canal were collected. To estimate the origin of dissolved ions and the geochemical processes influencing this groundwater, integration between land use change, pedological, hydrogeological, hydrogeochemical, and statistical approaches was considered. Results suggest that the groundwater flow regime changed from northeast and southwest directions around El Nubaria canal before 1966 to northern and northeastern directions due to newly constructed channel network. Soil salinity and mineral contents, seepage from irrigation canal, and seawater intrusion are the main factors controlling the groundwater chemistry. Statistically, the groundwater samples were classified into eight groups, one to four for the deep groundwater and five to eight for the shallow groundwater. The deep groundwater is characterized by two groups of chemicals (SO4-HCO3-Mg-Ca-K and Cl-Na), while the shallow groundwater groups of chemicals are Na-Cl-SO4 and K-HCO3-Ca-Mg. Both shallow groundwater and deep groundwater are mostly saturated with respect to carbonate minerals and undersaturated with respect to chloride minerals. Sulfate minerals are above the saturation limit in the shallow groundwater, but in the deep samples, these minerals are under the saturation limit. Ion exchange, carbonate production, mineral precipitation, and seawater intrusion are the geochemical processes governing the groundwater chemistry in the study area.

  14. Hydraulic barrier against seawater intrusion in the main aquifer of Delta del Llobregat; Barrera hidraulica contra la intrusion marina en el acuifero principal del Delta del Llobregat

    Energy Technology Data Exchange (ETDEWEB)

    Ortuno Gobern, F.; Ninerola Pla, J. M.; Fraile, J.; Juarez, I.; Molinero Huguet, J.; Arcos, D.; Pitarch, J. L.

    2009-07-01

    The main aquifer of Delta del Llobregat (Barcelona, Spain) is affected by seawater intrusion from 1970. For stopping its advance, the Catalan Water Agency is carrying out the construction of a positive hydraulic barrier through the injection of water in 14 wells. This is the first project of these characteristic that it is carried out in Spain and pioneer in Europe. The barrier elevates the groundwater level of the aquifer near the coast and avoids that the seawater penetrates inland, using reclaimed water of Baix Llobregat WWTP with several treatments. The first phase brings already more than 2 years of functioning, with highly positive results since a substantial improvement of the quality of the groundwater has been observed. The second phase is at present under construction. (Author)

  15. Replenishing an unconfined coastal aquifer to control seawater intrusion: Injection or infiltration?

    Science.gov (United States)

    Lu, Chunhui; Shi, Wenlong; Xin, Pei; Wu, Jichun; Werner, Adrian D.

    2017-06-01

    In this study, we compare the performances of well injection and pond infiltration in controlling seawater intrusion in an unconfined coastal aquifer through two scenario groups: (1) a single injection well versus an elliptic infiltration pond and (2) an injection-extraction well pair system versus an elliptic infiltration pond-extraction well system. Comparison is based on quantitative indicators that include the interface toe location, saltwater volume, and maximum net extraction rate (for scenario 2). We introduce a method to determine the maximum net extraction rate for cases where the locations of stagnation points cannot be easily derived. Analytical analysis shows that the performances of injection and infiltration are the same, provided that the pond shape is circular. The examination of scenario group 1 suggests that the shape of the infiltration pond has a minor effect on the interface toe location as well as the reduction in the saltwater volume, given the same total recharge rate. The investigation of scenario group 2 indicates, by contrast, that the maximum net extraction rate increases significantly with the increasing ratio of b to a, where a and b are semiaxes of the ellipse parallel and perpendicular to the coastline, respectively. Specifically, for a typical aquifer assumed, an increase of 40% is obtained for the maximum net extraction when b/a increases from 1/200 to 200. Despite that the study is based on a simplified model, the results provide initial guidance for practitioners when planning to use an aquifer recharge strategy to restore a salinized unconfined coastal aquifer.

  16. Adsorption and desorption of phosphate on limestone in experiments simulating seawater intrusion

    Science.gov (United States)

    The absorption and desorption of phosphorus on a large block of limestone was investigated using deionized water (DIW) and seawater. The limestone had a high affinity to adsorb phosphorus in DIW. Phosphate adsorption was significantly less in seawater, and more phosphorus was desorbed in the seawate...

  17. Correction factor to account for dispersion in sharp-interface models of terrestrial freshwater lenses and active seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-04-01

    In this paper, a recent analytical solution that describes the steady-state extent of freshwater lenses adjacent to gaining rivers in saline aquifers is improved by applying an empirical correction for dispersive effects. Coastal aquifers experiencing active seawater intrusion (i.e., seawater is flowing inland) are presented as an analogous situation to the terrestrial freshwater lens problem, although the inland boundary in the coastal aquifer situation must represent both a source of freshwater and an outlet of saline groundwater. This condition corresponds to the freshwater river in the terrestrial case. The empirical correction developed in this research applies to situations of flowing saltwater and static freshwater lenses, although freshwater recirculation within the lens is a prominent consequence of dispersive effects, just as seawater recirculates within the stable wedges of coastal aquifers. The correction is a modification of a previous dispersive correction for Ghyben-Herzberg approximations of seawater intrusion (i.e., stable seawater wedges). Comparison between the sharp interface from the modified analytical solution and the 50% saltwater concentration from numerical modelling, using a range of parameter combinations, demonstrates the applicability of both the original analytical solution and its corrected form. The dispersive correction allows for a prediction of the depth to the middle of the mixing zone within about 0.3 m of numerically derived values, at least on average for the cases considered here. It is demonstrated that the uncorrected form of the analytical solution should be used to calculate saltwater flow rates, which closely match those obtained through numerical simulation. Thus, a combination of the unmodified and corrected analytical solutions should be utilized to explore both the saltwater fluxes and lens extent, depending on the dispersiveness of the problem. The new method developed in this paper is simple to apply and offers a

  18. 海水入侵对滨海城市化发展的影响研究--以大连市为例%The influence of seawater intrusion in coastal urbanization---A case of Dalian

    Institute of Scientific and Technical Information of China (English)

    张德君; 李雪铭; 单灵芝; 朱健亮

    2014-01-01

    The single index method was used to analyze the current situation of the underground water quality in dalian .The changes of land use from 2000 to 2009 were analyzed based on land use dynam-ics model ,which were supported by RS ,GIS technology .By doing these ,we can get seawater intru-sion in coastal urbanization affect spatial and temporal distribution ,establish the coupled relation-ships of saltwater intrusion and coastal urbanization ,provide decision support for the sustainable de-velopment of the coastal city .The results showed that :(1)From 1978 to 2010 ,the area of seawater intrusion in dalian was generally rising ,in 2007 ,2008 ,2009 reaching maximum (867 .8 km2 );(2)Seawater intrusion impacted on urbanization :seawater intrusion of urbanization has a negative effect ,slowing the process of urbanization .Seawater intrusion made the quality of ground water seri-ously pollute and endangered life of urbanization process ;seawater intrusion made land -use changes and frustrated process of urban space ;(3)The urbanization impacted on seawater intrusion :urbaniza-tion to promote seawater intrusion .As a result of the need of agricultural water ,urban construction and mariculture ,overexploitation of groundwater makes the degree seawater intrusion increase .%研究采用单一指标法分析大连市地下水质状况,通过RS、GIS技术和土地利用动态度分析2000-2009年大连市甘井子区土地利用变化,得到海水入侵对滨海城市化发展影响的时空分布特征,建立海水入侵与滨海城市化耦合关系,为滨海城市可持续发展提供决策支持.结果表明:(1)1978-2010年间,大连市海水入侵面积大致呈上升趋势,其中2007、2008、2009年度达到最大值(867.8 km2);(2)海水入侵对城市化的影响:海水入侵对城市化的发展产生负向作用,减缓城市化的进程.海水入侵使得地下水质污染严重,危害生活城市化的进程.海水入侵使

  19. A coupled stochastic inverse/sharp interface seawater intrusion approach for coastal aquifers under groundwater parameter uncertainty

    Science.gov (United States)

    Llopis-Albert, Carlos; Merigó, José M.; Xu, Yejun

    2016-09-01

    This paper presents an alternative approach to deal with seawater intrusion problems, that overcomes some of the limitations of previous works, by coupling the well-known SWI2 package for MODFLOW with a stochastic inverse model named GC method. On the one hand, the SWI2 allows a vertically integrated variable-density groundwater flow and seawater intrusion in coastal multi-aquifer systems, and a reduction in number of required model cells and the elimination of the need to solve the advective-dispersive transport equation, which leads to substantial model run-time savings. On the other hand, the GC method allows dealing with groundwater parameter uncertainty by constraining stochastic simulations to flow and mass transport data (i.e., hydraulic conductivity, freshwater heads, saltwater concentrations and travel times) and also to secondary information obtained from expert judgment or geophysical surveys, thus reducing uncertainty and increasing reliability in meeting the environmental standards. The methodology has been successfully applied to a transient movement of the freshwater-seawater interface in response to changing freshwater inflow in a two-aquifer coastal aquifer system, where an uncertainty assessment has been carried out by means of Monte Carlo simulation techniques. The approach also allows partially overcoming the neglected diffusion and dispersion processes after the conditioning process since the uncertainty is reduced and results are closer to available data.

  20. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  1. Why hasn't a seawater intrusion yet happened in the Kaluvelli-Pondicherry basin, Tamil Nadu, India?

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2016-04-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is even bigger when those aquifers are overexploited, for example for irrigation, or when their recharge is low due to a semi-arid or arid climate. The sedimentary basin studied here presents both this characteristics, and water level records in the main aquifer can be as low as 30m below MSL. Though, no seawater intrusion has been monitored yet. To understand why, and because a good knowledge of a system hydrodynamic is a necessary step to an efficient water management strategy, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been implemented into a quasi-3D hydrogeological model performed with NEWSAM code. Recharge had been previously quantified through the intercomparison of hydrological models, based on surface flow field measurements. During the hydrogeological modelling, sensitivity tests on parameters, and on the nature of the boundary condition with the sea, led to the hypothesis of an offshore freshwater stock. Extension of this fresh groundwater stock has been calculated thanks to Groen approximation.

  2. Heat-pulse flowmeter test to characterize the seawater intrusion in fractured rock, western coast of Korea

    Science.gov (United States)

    Oh, H.; Hwang, S.; Shin, J.; Park, K.

    2007-12-01

    Seawater intrusion occurs commonly along the western and southern coasts of Korea. Almost coastal area consists of a reclaimed land, and is affected by seawater intrusion through the fractured rocks connected the seaside within several kilometers of coasts. A combination of drilling, conventional geophysical well logging including caliper log, natural gamma log, fluid temperature/conductivity log etc., acoustic televiewer, flowmeter, hydrophysical logging, packer test, and freshwater injection test was performed to evaluate seawater intrusion through the fractured rock in Baeksu-eup, Youngkwang-gun, Korea. The geological structure of the survey area comprises mud, sand, and granite and andesite bedrock (below an approximate depth of 22 m). The test boreholes are located with the brackish area interpreted with surface geophysical survey and hydrogeochemcial survey. The depth of two test boreholes is 50m, and the diameter is 3 inch, the distance between boreholes is 10m. Although the core log showed the several fractures, we didn't identify the minor fractures using 3-arm caliper logs because of small aperture size of fractures. The electrical conductivity of the borehole fluid is seen to be more than 1000 μS/cm at depth of about 35 m, and the highest conductivity is about 5000 μS/cm. Several intervals shown the change of conductivity logs doesn't relate with fractures identified by 3-arm caliper logs. In order to verify the permeable fractures, heat-pulse flowmeter test was conducted within single hole and interpreted with Paillet inversion method. Five permeable fractures are detected and hydraulic properties are estimated. These results are compared with hydrophysical logging performed one borehole. After the replacement of borehole fluid with freshwater, the change of fluid conductivity shows at least seven fractures with different salinity. Main fractures with highest salinity detected acoustic televiewer show low dip angles. To define subsurface connection

  3. Electrical Resistivity Survey for Delineation of the Seawater Intrusion in the Çanakkale Plain, NW Turkey

    Science.gov (United States)

    Demirci, Alper; Ekinci, Yunus Levent; Kaya, Mehmet Ali

    2013-04-01

    The city of Çanakkale (Dardanelles) is located on the west side of the Biga Peninsula. The Peninsula is delimited by the Strait of Çanakkale, which is the unique water linkage between the Aegean Sea and the Marmara Sea. The study area is covered by quaternary aged sediments. Sarıçay, which originates from the eastern hilly area, accumulates sediment deposits and forms this alluvial basin. Alluvial terrace including sand, gravel and block sized materials is observed towards northeastern part of this basin. There has been six-fold increase in the population and tremendous growth in industrial and environmental activities in Çanakkale city in the last two decades. Thus, there has been necessity of new settlement areas for planned urbanization and the parameters of liquefaction potential and the extent of seawater intrusion should be taken into consideration. To this end, we have carried out Direct Current (DC) electrical resistivity survey on 52 stations to shed light on the thickness of alluvial layers and traces of the seawater intrusion in the Çanakkale plain. We have used maximum half current electrode spacing (AB/2) of 80 m for each station. The acquired apparent resistivity data were processed by using a damped least square inversion algorithm with singular value decomposition (SVD) technique. After obtaining the model parameters (thickness and resistivity) of each resistivity curve, a MATLAB-based visualization algorithm was used for joint representation of the whole resistivity variation of the studied area. The produced psuedo-three dimensional volumetric resistivity distribution images indicated that the western part of investigation area has relatively resistive structures (> 80 ohm.m), which extend to the depth of 3 m. The sudden decrease in resistivity values to downward clearly indicated seawater saturated sediments (0.5-5 ohm.m). On contrary to these low resistivity values observed at the western part of the city, the central and eastern parts are

  4. Resolving discrepancies between hydraulic and chemical calibration data for seawater intrusion groundwater flow models by considering climate-driven sea level change.

    Energy Technology Data Exchange (ETDEWEB)

    J. Chapman; A. Hassan; K. Pohlmann

    2001-10-18

    Groundwater models of seawater intrusion environments can be calibrated using both hydraulic and chemical information. The possible impact of the long-term transient process of sea level change is difficult to identify, but important to accurate simulation of present conditions. The response times of the pressure and chemical fields to major fluctuations in sea level change are investigated

  5. Integrated geophysical investigation to assess seawater intrusion into the coastal aquifer in the southwest of Saudi Arabia

    Science.gov (United States)

    Kahal, A. Y.; Alfaifi, H. J.; Ibrahim, E. K. E.; Abdel Rahman, K.; Alhumidan, S. M.

    2016-12-01

    The shallow groundwater aquifer in the coastal zone of western Saudi Arabia has been witnessed quality deterioration due to uncontrolled and unwise domestic and agricultural activities. The aquifer quality deterioration resulted from the seawater intrusion that threatens the groundwater quality in the area. To assess this problem, integrated geophysical tools; electrical resistivity tomography (ERT), seismic refraction tomography (SRT) and vertical electrical sounding (VES) techniques are used. In this study, three ERT and two SRT profiles along with 6 VES stations are measured along a distance of about 20 Km, perpendicular to the Red Sea coast. The resistivity and seismic data are processed and presented along sections to display the changes in the electrical resistivities and seismic velocities along the measured profiles. These sections are interpreted in light of the available geological and hydrological information. The interpretation of the geophysical data indicates the presence of three subsurface layers that capped with a thin, dry and unconsolidated sandy layer. This topmost layer is underlain by a freshwater saturated layer that shows thinning and wedging towards the sea coast. This layer overlies a relatively low resistivity and high velocity layer that is interpreted as moderately compacted sandy layer saturated with saline water. It is observed that the level of the saltwater rise and the freshwater saturated layer thins out towards the sea; indicating seawater intrusion that extents into the shallow coastal aquifer in the investigated area. It is expected that the porous and permeable character of the coastal sediments facilitates the hydraulic contact between the coastal shallow aquifer and sea water. In addition, the unwise domestic use and aggressive pumping of the groundwater aquifer leads to an increase in the salinization of the coastal aquifer.

  6. Geophysical and Geochemical Approach for Seawater Intrusion Assessment in the Godavari Delta Basin, A.P., India.

    Science.gov (United States)

    Gurunadha Rao, V V S; Rao, G Tamma; Surinaidu, L; Rajesh, R; Mahesh, J

    2011-05-01

    Coastal lands around Bay of Bengal in Central Godavari Delta are mainly agriculture fields and two times annually paddy crops putting in the study area. Canals of Godavari River are the main source of water for irrigation. Geophysical and geochemical investigations were carried out in the study area to decipher subsurface geologic formation and assessing seawater intrusion. Electrical resistivity tomographic surveys carried out in the watershed-indicated low resistivity formation in the upstream area due to the presence of thick marine clays up to thickness of 20-25 m from the surface. Secondly, the lowering of resistivity may be due to the encroachment of seawater in to freshwater zones and infiltration during tidal fluctuation through mainly the Pikaleru drain, and to some extent rarely through Kannvaram and Vasalatippa drains in the downstream area. Groundwater quality analyses were made for major ions revealed brackish nature of groundwater water at shallow depth. The in situ salinity of groundwater is around 5,000 mg/l and there is no groundwater withdrawal for irrigation or drinking purpose in this area except Cairn energy pumping wells which is using for inject brackish water into the oil wells for easy exploration of oil. Chemical analyses of groundwater samples have indicated the range of salt concentrations and correlation of geophysical and borehole litholog data in the study area predicting seawater-contaminated zones and influence of in situ salinity in the upstream of study area. The article suggested further studies and research work that can lead to sustainable exploitation/use and management of groundwater resources in coastal areas.

  7. Current challenges using models to forecast seawater intrusion: lessons from the Eastern Shore of Virginia, USA

    Science.gov (United States)

    Sanford, Ward E.; Pope, Jason P.

    2010-01-01

    A three-dimensional model of the aquifer system of the Eastern Shore of Virginia, USA was calibrated to reproduce historical water levels and forecast the potential for saltwater intrusion. Future scenarios were simulated with two pumping schemes to predict potential areas of saltwater intrusion. Simulations suggest that only a few wells would be threatened with detectable salinity increases before 2050. The objective was to examine whether salinity increases can be accurately forecast for individual wells with such a model, and to address what the challenges are in making such model forecasts given current (2009) simulation capabilities. The analysis suggests that even with current computer capabilities, accurate simulations of concentrations within a regional-scale (many km) transition zone are computationally prohibitive. The relative paucity of data that is typical for such regions relative to what is needed for accurate transport simulations suggests that even with an infinitely powerful computer, accurate forecasting for a single well would still be elusive. Useful approaches may include local-grid refinement near wells and geophysical surveys, but it is important to keep expectations for simulated forecasts at wells in line with chloride concentration and other data that can be obtained at that local scale.

  8. Dynamic Probing for Intrusion Detection under Resource Constraints

    Science.gov (United States)

    2013-06-01

    performance measure of regret, defined as the performance loss compared to that of a genie who knows the entire attack processes a priori and probes...performance as that of the omniscient genie . Index Terms—Intrusion detection, dynamic probing, non- stochastic multi-armed bandit, regret. I...dynamic probing strategy under the performance measure of regret, de ned as the performance loss compared to that of a genie who knows the entire attack

  9. Development of a complex groundwater model to assess the relation among groundwater resource exploitation, seawater intrusion and land subsidence

    Science.gov (United States)

    Hsi Ting, Fang; Yih Chi, Tan; Chen, Jhong Bing

    2016-04-01

    The land subsidence, which is usually irreversible, in Taiwan Pintung Plain occurred due to groundwater overexploitation. Many of the land subsidence areas in Taiwan are located in coastal area. It could not only result in homeland loss, but also vulnerability to flooding because the function of drainage system and sea wall are weakened for the lowered ground surface. Groundwater salinization and seawater intrusion could happen more easily as well. This research focuses on grasping the trend of environmental change due to the damage and impact from inappropriate development of aquaculture in the last decades. The main task is developing the artificial neural networks (ANNs) and complex numerical model for conjunctive use of surface and groundwater which is composed of a few modules such as land use, land subsidence, contamination transportation and etc. An approach based on self-organizing map (SOM) is proposed to delineate groundwater recharge zones. Several topics will be studied such as coupling of surface water and groundwater modeling, assessing the benefit of improving groundwater resources by recharge, identifying the improper usage of groundwater resources, and investigating the effect of over-pumping on land subsidence in different depth. In addition, a complete plan for managing both the flooding and water resources will be instituted by scheming non-engineering adaptation strategies for homeland planning, ex. controlling pumping behavior in area vulnerable to land subsidence and increasing groundwater recharge.

  10. Seawater Intrusion Impacts on the Water Quality of the Groundwater on theNorthwest Coast of Oman.

    Science.gov (United States)

    Ahmed, Abdelkader T; Askri, Brahim

    2016-08-01

    The groundwater aquifer in the coastal region of the northwest of Oman has been used extensively since the early 1980s for agricultural, industrial and municipal purposes. The over pumping of this reservoir has led to the intrusion of seawater and therefore to the deterioration of the groundwater quality. In this study, an investigation was carried out in the southern part of this region to identify the quality of groundwater, to understand the main sources of groundwater mineralisation, and to check the suitability of groundwater for drinking and irrigation. The spatial distributions and temporal variations of groundwater level and electrical conductivity were studied for the period from 1982 to 2005 using data collected from 225 wells. In addition, groundwater samples were collected recently in 2012 from eight wells and analysed for pH, EC, and major ions to understand the sources of dissolved ions and assess the chemical quality of the groundwater. The study area was divided into two strips parallel to the coastline, A and B, located in the discharge and recharge parts of the aquifer, respectively. Results showed a significant increase in the degree of water mineralisation in the direction of south to north following the regional flow direction. Results showed also that the groundwater in the last area could be used for irrigation with little danger of exchangeable sodium while this aquifer is unsuitable for irrigation in the discharge area because it presents a very high salinity hazard.

  11. 海水入侵-地下水位变化-土壤盐渍化自动监测实验研究%Automatic Monitoring for Seawater Intrusion-Groundwater Level Changes-Soil Salinization

    Institute of Scientific and Technical Information of China (English)

    潘玉英; 付腾飞; 赵战坤; 张颖; 贾永刚

    2012-01-01

    In order to verify the availability of the monitoring system in monitoring the environmental processes such as seawater intrusion,groundwater level change and soil salinization,the dynamic monitoring simulation experiments had been carried on seawater intrusion,groundwater level rising and falling,and soil salinization respectively using self-made automatic monitoring system supported by National 863 Topics with resistivity.The results showed that the saltwater-freshwater interface and the dispersion zone by seawater intrusion,the position above or below the groundwater level and the unsaturated zone,and soils with different salt contents had significant resistivity differences in test results.It could provide data and technique support for environmental processes such as seawater intrusion,groundwater level changes,soil salinization and underground contamination.%利用国家863课题支持研制的电阻率探杆自动监测系统,分别进行了海水入侵、地下水位升降、土壤盐渍化过程的动态监测室内模拟实验,旨在探讨该系统用于海水入侵、地下水位变化、土壤盐渍化等环境过程自动监测的可行性。结果表明,海水入侵形成的咸-淡水界面及海水弥散带,地下水位位置上下及包气带,及不同含盐量的土体,均具有显著的电阻率探杆测试结果特征差异。该系统可为海水入侵,地下水位变化,土壤盐渍化,土壤地下污染等环境过程的原位连续实时自动监测提供数据资料及技术支持。

  12. Seawater intrusion barrier and artificial recharge in the deltaic Llobregat aquifer (Barcelona, Spain); La barrera hidraulica contra la intrusion marina y la recarga artificial en el acuifero del Llobregat (Barcelona, Espana)

    Energy Technology Data Exchange (ETDEWEB)

    Ortuno Gobern, F.; Ninerola Pla, J. M.; Armenter Ferrando, J. L.; Molinero Huguet, J.

    2009-07-01

    The main aquifer of the Llobregat Delta (Barcelona, Spain) is affected by seawater intrusion processes since 1970. The Catalan Water Agency is currently promoting several actions of enhanced aquifer recharge, including the construction of a positive hydraulic barrier in order to stop the advance of the seawater intrusion. Such a positive hydraulic barrier works by injecting reclaimed water in 14 wells. This is the first time that a project of this type is performed in Spain, and it is also pioneer in Europe. The positive hydraulic barrier produces the rise of the groundwater head near the coast and avoids seawater penetration inland. The injected reclaimed water comes from the WWTP of the Baix Llobregat after passing through several treatments (ultrafiltration, osmosis and disinfection). The pilot phase of the project has been working during the last 2 years, showing highly positive results. Substantial improvement of the groundwater quality has been observed in wells surrounding the injection points and no clogging has been appeared. The second phase of the project is currently under construction. (Author) 13 refs.

  13. Controls of evaporative irrigation return flows in comparison to seawater intrusion in coastal karstic aquifers in northern Sri Lanka: evidence from solutes and stable isotopes

    Science.gov (United States)

    Chandrajith, Rohana; Diyabalanage, Saranga; Premathilake, Mahinda; Hanke, Christian; van Geldern, Robert; Barth, Johannes A. C.

    2016-04-01

    Groundwater in Miocene karstic aquifers in the Jaffna Peninsula of Sri Lanka is an important resource since no other fresh water sources are available in the region. The subsurface is characterized by highly productive limestone aquifers that are used for drinking and agriculture purposes. A comprehensive hydrogeochemical study was carried out to reveal the processes affecting the groundwater quality in this region. Major and trace element composition and environmental isotope ratios of oxygen and hydrogen (δ18OH2O and δ2HH2O) were determined in 35 groundwater samples for this investigation. The ion abundance of groundwater in the region was characterized by an anion sequence order with HCO3¯ >Cl¯ >SO4¯ >NO3¯ . For cations, average Na++K+ contents in groundwater exceeded those of Ca2++Mg2+ in most cases. Ionic relationships of major solutes indicated open system calcite dissolution while seawater intrusions are also evident but only close to the coast. The solute contents are enriched by agricultural irrigation returns and associated evaporation. This was confirmed by the stable isotope composition of groundwater that deviated from the local meteoric water line (LMWL) and formed its own regression line denoted as the local evaporation line (LEL). The latter can be described by δ2HH2O=5.8 ×δ18OH2O - 2.9. Increased contents of nitrate (up to 26 mg/L), sulfate (up to 430 mg/L) and fluoride (up to 1.5 mg/L) provided evidences for anthropogenic inputs of solutes, most likely from agriculture activities. Among trace elements Ba, Sr, As and Se levels in the Jaffna groundwater were higher compared to that of the dry zone metamorphic aquifers in Sri Lanka. Solute geochemistry and stable isotope evidences from the region indicates that groundwater in the area is mainly derived from local modern precipitation but modified heavily by progressive evaporative concentration rather than seawater intrusion. The currently most imminent vulnerability of groundwater in the

  14. A preliminary appraisal of the effect of pumping on seawater intrusion and upconing in a small tropical island using 2D resistivity technique.

    Science.gov (United States)

    Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Zaudi, Muhammad Amar; Aris, Ahmad Zaharin

    2014-01-01

    The existing knowledge regarding seawater intrusion and particularly upconing, in which both problems are linked to pumping, entirely relies on theoretical assumptions. Therefore, in this paper, an attempt is made to capture the effects of pumping on seawater intrusion and upconing using 2D resistivity measurement. For this work, two positions, one perpendicular and the other parallel to the sea, were chosen as profile line for resistivity measurement in the coastal area near the pumping wells of Kapas Island, Malaysia. Subsequently, water was pumped out of two pumping wells simultaneously for about five straight hours. Then, immediately after the pumping stopped, resistivity measurements were taken along the two stationed profile lines. This was followed by additional measurements after four and eight hours. The results showed an upconing with low resistivity of about 1-10 Ωm just beneath the pumping well along the first profile line that was taken just after the pumping stopped. The resistivity image also shows an intrusion of saline water (water enriched with diluted salt) from the sea coming towards the pumping well with resistivity values ranging between 10 and 25 Ωm. The subsequent measurements show the recovery of freshwater in the aquifer and how the saline water is gradually diluted or pushed out of the aquifer. Similarly the line parallel to the sea (L2) reveals almost the same result as the first line. However, in the second and third measurements, there were some significant variations which were contrary to the expectation that the freshwater may completely flush out the saline water from the aquifer. These two time series lines show that as the areas with the lowest resistivity (1 Ωm) shrink with time, the low resistivity (10 Ωm) tends to take over almost the entire area implying that the freshwater-saltwater equilibrium zone has already been altered. These results have clearly enhanced our current understanding and add more scientific

  15. A Preliminary Appraisal of the Effect of Pumping on Seawater Intrusion and Upconing in a Small Tropical Island Using 2D Resistivity Technique

    Directory of Open Access Journals (Sweden)

    Nura Umar Kura

    2014-01-01

    Full Text Available The existing knowledge regarding seawater intrusion and particularly upconing, in which both problems are linked to pumping, entirely relies on theoretical assumptions. Therefore, in this paper, an attempt is made to capture the effects of pumping on seawater intrusion and upconing using 2D resistivity measurement. For this work, two positions, one perpendicular and the other parallel to the sea, were chosen as profile line for resistivity measurement in the coastal area near the pumping wells of Kapas Island, Malaysia. Subsequently, water was pumped out of two pumping wells simultaneously for about five straight hours. Then, immediately after the pumping stopped, resistivity measurements were taken along the two stationed profile lines. This was followed by additional measurements after four and eight hours. The results showed an upconing with low resistivity of about 1–10 Ωm just beneath the pumping well along the first profile line that was taken just after the pumping stopped. The resistivity image also shows an intrusion of saline water (water enriched with diluted salt from the sea coming towards the pumping well with resistivity values ranging between 10 and 25 Ωm. The subsequent measurements show the recovery of freshwater in the aquifer and how the saline water is gradually diluted or pushed out of the aquifer. Similarly the line parallel to the sea (L2 reveals almost the same result as the first line. However, in the second and third measurements, there were some significant variations which were contrary to the expectation that the freshwater may completely flush out the saline water from the aquifer. These two time series lines show that as the areas with the lowest resistivity (1 Ωm shrink with time, the low resistivity (10 Ωm tends to take over almost the entire area implying that the freshwater-saltwater equilibrium zone has already been altered. These results have clearly enhanced our current understanding and add

  16. Identification of palaeo-seawater intrusion in groundwater using minor ions in a semi-confined aquifer of the Río de la Plata littoral (Argentina)

    Energy Technology Data Exchange (ETDEWEB)

    Santucci, L., E-mail: eleocarol@fcnym.unlp.edu.ar [Centro de Investigaciones Geológicas (CIG), Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) - Universidad Nacional de La Plata - UNLP, Calle 64 y Diag. 113, 1900 La Plata, Buenos Aires (Argentina); Carol, E. [Centro de Investigaciones Geológicas (CIG), Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) - Universidad Nacional de La Plata - UNLP, Calle 64 y Diag. 113, 1900 La Plata, Buenos Aires (Argentina); Kruse, E. [Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Cátedra de Hidrología General de la Facultad de Ciencias Naturales y Museo, Universidad Nacional de La Plata (UNLP), Calle 64 #3, 1900 La Plata, Buenos Aires (Argentina)

    2016-10-01

    The hydrochemistry of minor elements and traces such as bromide, lithium, strontium, uranium and selenium, together with the chemical analysis of major ions, has been used in the study of salinization process. This process occurs in a semi-confined aquifer that corresponds to a Pliocene–Pleistocene fluvial environment. The semi-confined aquifer is located in the littoral of the cities of Ensenada and Berisso, in the region of the middle Río de la Plata estuary, Argentina. Groundwater salinization was detected in the semi-confined aquifer in the coastal plain area, with salt contents that increase from the loess plain towards the river. The content of major ions that predominate in sea water (Cl{sup −}, Na{sup +} and Mg{sup 2+}), as well as the Cl{sup −}/Br{sup −} and U vs. Cl{sup −} ratios, demonstrates that such salinization is related to sea water, which shows no correspondence with estuary water. In the salinized area, Li, Sr and Se enrichments occur, and are used as tracers of the average time that a substance remains in solution in sea water in the aquifer. The study of such minor ions together with the geological evolution of the area made it possible to recognize that the salt water in the semi-confined aquifer corresponds to a palaeo-intrusion of sea water associated with the Pleistocene–Holocene ingressions caused by the climate changes occurring during the Quaternary. - Highlights: • The semi-confined aquifer in a sector of the Río de la Plata estuary is salinized. • Saline content is higher in the aquifer than in the estuary. • Minor elements indicate the occurrence of palaeo-seawater intrusion. • Palaeo-seawater intrusion may be associated with interglacial fluctuations.

  17. Controls of evaporative irrigation return flows in comparison to seawater intrusion in coastal karstic aquifers in northern Sri Lanka: Evidence from solutes and stable isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Chandrajith, Rohana, E-mail: rohanac@pdn.ac.lk [Department of Geology, Faculty of Science, University of Peradeniya (Sri Lanka); Diyabalanage, Saranga [Department of Geology, Faculty of Science, University of Peradeniya (Sri Lanka); Premathilake, K.M. [Water Supply and Drainage Board, Telewala Road, Ratmalana (Sri Lanka); Hanke, Christian; Geldern, Robert van; Barth, Johannes A.C. [Friedrich-Alexander University Erlangen-Nuremberg (FAU), Department of Geography and Geosciences, GeoZentrum Nordbayern, Schlossgarten 5, 91054 Erlangen (Germany)

    2016-04-01

    Groundwater in Miocene karstic aquifers in the Jaffna Peninsula of Sri Lanka is an important resource since no other fresh water sources are available in the region. The subsurface is characterized by highly productive limestone aquifers that are used for drinking and agriculture purposes. A comprehensive hydrogeochemical study was carried out to reveal the processes affecting the groundwater quality in this region. Major and trace element composition and environmental isotope ratios of oxygen and hydrogen (δ{sup 18}O{sub H2O} and δ{sup 2}H{sub H2O}) were determined in 35 groundwater samples for this investigation. The ion abundance of groundwater in the region was characterized by an anion sequence order with HCO{sub 3}¯ > Cl¯ > SO{sub 4}¯ > NO{sub 3}¯. For cations, average Na{sup +}+K{sup +} contents in groundwater exceeded those of Ca{sup 2+} + Mg{sup 2+} in most cases. Ionic relationships of major solutes indicated open system calcite dissolution while seawater intrusions are also evident but only close to the coast. The solute contents are enriched by agricultural irrigation returns and associated evaporation. This was confirmed by the stable isotope composition of groundwater that deviated from the local meteoric water line (LMWL) and formed its own regression line denoted as the local evaporation line (LEL). The latter can be described by δ{sup 2}H{sub H2O} = 5.8 × δ{sup 18}O{sub H2O-–} 2.9. Increased contents of nitrate-N (up to 5 mg/L), sulfate (up to 430 mg/L) and fluoride (up to 1.5 mg/L) provided evidences for anthropogenic inputs of solutes, most likely from agriculture activities. Among trace elements Ba, Sr, As and Se levels in the Jaffna groundwater were higher compared to that of the dry zone metamorphic aquifers in Sri Lanka. Solute geochemistry and stable isotope evidences from the region indicates that groundwater in the area is mainly derived from local modern precipitation but modified heavily by progressive evaporative

  18. Effects of seasonal change and seawater intrusion on water quality for drinking and irrigation purposes, in coastal aquifers of Dar es Salaam, Tanzania

    Science.gov (United States)

    Sappa, Giuseppe; Ergul, Sibel; Ferranti, Flavia; Sweya, Lukuba Ngalya; Luciani, Giulia

    2015-05-01

    Groundwater is the major source to meet domestic, industrial and agricultural needs in the city of Dar es Salaam, Tanzania. However, population growth, increasing urbanization, industrialization and tourism, and climatic changes have caused an intensive exploitation of groundwater resources leading the aquifers become more vulnerable to seawater intrusion. The aim of this study is to examine the variations of groundwater chemistry (as resulting from natural and anthropogenic inputs) depending on seasonal changes, in order to evaluate water quality for drinking and irrigation purposes. Physical and chemical data come from the analysis of groundwater samples, collected from 72 wells, used for the evaluation of water quality parameters, during a year of monitoring. Pattern diagrams, geochemical modeling techniques and Principal Component Analysis (PCA) have been used to identify the main factors influencing groundwater composition. Based on the hydrochemistry, the groundwater was classified into three types: (a) Na-Cl, (b) Ca-Cl, (c) mixed Ca-Na-HCO3-Cl (d) mixed Ca-Mg-Cl-SO4. The geochemical modeling results show that groundwater chemistry is mainly influenced by evaporation process, as it is suggested by the increase of Na and Cl ions concentrations. According to irrigation water quality assessment diagrams of USDA, most water samples from dry and rainy seasons, distributed in category C2-S1, C3-S1, C3-S2, C4-S2 highlighting medium to very high salinity hazard and low to medium sodium content class. PCA evidenced the role of seawater intrusion, evaporation process and anthropogenic pollution (i.e. high NO3 levels due to agricultural activities), as the major factors that influenced the water chemistry, and hence the water quality. Based on Pearson correlation matrix, the presence of high correlations (>0.8) among Na, Cl, Mg and SO4, in association with EC, were interpreted as the seawater intrusion effects. In this area groundwater quality is generally low, and

  19. 高密度电阻率探针原位监测海水入侵过程试验研究%EXPERIMENTAL RESEARCH ON MONITORING OF SEAWATER INTRUSION PROCESS USING HIGH-DENSITY RESISTIVITY PROBE

    Institute of Scientific and Technical Information of China (English)

    赵战坤; 贾永刚; 郭磊; 刘晓磊; 付腾飞; 单红仙

    2012-01-01

    为研究砂质含水层中海水入侵问题,确定海水入侵过程中含水介质内海水入侵楔形体的发展演化过程,本文采用砂槽实验模拟海水入侵,利用高密度电阻率探针观测系统远程实时监测海水入侵过程中土体的垂向电阻率变化,据电阻率变化曲线分析海水入侵发生发展过程.研究结果表明:高密度电阻率探针对海水入侵界面变化反应灵敏,能够监测到咸淡水突变界面形成、过渡带演化及咸淡水界面变迁等一系列现象,较好地实时监测海水入侵发生发展过程及海水入侵状态并进行预警.%This paper aims to study the seawater intrusion problems in the sandy aquifer, and determine the development and evolution of saltwater-wedge in the aqueous medium through the seawater intrusion process. It simulates seawater intrusion process in the soil bin, using the high-density resistivity probe observing system to remote and real-time monitor the vertical resistivity changes of the soil through the seawater intrusion process. It determines the development of the seawater intrusion by analyzing the resistivity data. The result shows that the high-density resistivity probe is good at monitoring the occurrence and development of seawater intrusion. The formation of the salt-fresh mutation interface, the evolution of the transition zone and the change of salt-fresh water interface are monitored. The high-density resistivity probe is sensitive to the change of seawater interface. It is useful to real-time monitor and pre-warning the seawater intrusion.

  20. Dynamics of seawater bacterial communities in a shellfish hatchery.

    Science.gov (United States)

    Powell, S M; Chapman, C C; Bermudes, M; Tamplin, M L

    2013-08-01

    Bacterial disease is a significant issue for larviculture of several species of shellfish, including oysters. One source of bacteria is the seawater used throughout the hatchery. In this study carried out at a commercial oyster hatchery in Tasmania, Australia, the diversity of the bacterial community and its relationship with larval production outcomes were studied over a 2-year period using terminal restriction fragment length polymorphism and tag-encoded pyrosequencing. The bacterial communities were very diverse, dominated by the Alphaproteobacteria, Gammaproteobacteria, Flavobacteria and Cyanobacteria. The communities were highly variable on scales of days, weeks and seasons. The difference between the intake seawater and treated clean seawater used in the hatchery was smaller than the observed temporal differences in the seawater throughout the year. No clear correlation was observed between production outcomes and the overall bacterial community structure. However, one group of Cyanobacterial sequences was more abundant when mass mortality events occurred than when healthy spat were produced although they were always present.

  1. 辽东半岛南部的海水入侵及其生态修复探讨%Discussion on seawater intrusion and ecological restoration of southern Liaodong Peninsula

    Institute of Scientific and Technical Information of China (English)

    王欣; 韩刚; 乔友乾

    2012-01-01

    通过深入分析海水入侵的平面及垂向分布特征及总结海水入侵的发育规律,提出了针对辽东半岛南部海水入侵防治的生态修复技术,即:采取工程与生态结合的方式及适应性生态改良的措施,以达到从根本上有效防治海水入侵的效果,为半岛经济的可持续发展与腾飞保驾护航。%Through a thorough analysis on the plane and vertical distribution characteristics of seawater intrusion and summarized the develop- ment rules of seawater intrusion, this paper proposed ecological restoration technology according to the seawater intrusion prevention of southern Liaodong Peninsula, namely: taking the ways combining with engineering and ecology and the adaptability ecological improvement measures, in order to fundamentally and effectively prevent seawater intrusion effect, kept the sustainable development and rapid development of peninsula e- conomy safe.

  2. Controls of evaporative irrigation return flows in comparison to seawater intrusion in coastal karstic aquifers in northern Sri Lanka: Evidence from solutes and stable isotopes.

    Science.gov (United States)

    Chandrajith, Rohana; Diyabalanage, Saranga; Premathilake, K M; Hanke, Christian; van Geldern, Robert; Barth, Johannes A C

    2016-04-01

    Groundwater in Miocene karstic aquifers in the Jaffna Peninsula of Sri Lanka is an important resource since no other fresh water sources are available in the region. The subsurface is characterized by highly productive limestone aquifers that are used for drinking and agriculture purposes. A comprehensive hydrogeochemical study was carried out to reveal the processes affecting the groundwater quality in this region. Major and trace element composition and environmental isotope ratios of oxygen and hydrogen (δ(18)OH2O and δ(2)HH2O) were determined in 35 groundwater samples for this investigation. The ion abundance of groundwater in the region was characterized by an anion sequence order with HCO3->Cl->SO4->NO3-. For cations, average Na(+)+K(+) contents in groundwater exceeded those of Ca(2+)+Mg(2+) in most cases. Ionic relationships of major solutes indicated open system calcite dissolution while seawater intrusions are also evident but only close to the coast. The solute contents are enriched by agricultural irrigation returns and associated evaporation. This was confirmed by the stable isotope composition of groundwater that deviated from the local meteoric water line (LMWL) and formed its own regression line denoted as the local evaporation line (LEL). The latter can be described by δ(2)HH2O=5.8×δ(18)OH2O -- 2.9. Increased contents of nitrate-N (up to 5mg/L), sulfate (up to 430mg/L) and fluoride (up to 1.5mg/L) provided evidences for anthropogenic inputs of solutes, most likely from agriculture activities. Among trace elements Ba, Sr, As and Se levels in the Jaffna groundwater were higher compared to that of the dry zone metamorphic aquifers in Sri Lanka. Solute geochemistry and stable isotope evidences from the region indicates that groundwater in the area is mainly derived from local modern precipitation but modified heavily by progressive evaporative concentration rather than seawater intrusion.

  3. Assessing Current and Future Performance of the Alamitos Gap Seawater Intrusion Barrier with a New Flow and Transport Model, Los Angeles and Orange Counties, CA

    Science.gov (United States)

    Sigda, J. M.; Deeds, N.; Jordan, D. L.; Sengebush, R.

    2010-12-01

    Seawater intrusion has threatened aquifers that supply Los Angeles residents since the 1920s, but now millions depend on effective resource management, especially for the four injection barriers. Even with ~6,000 acre-ft/yr injected through the Alamitos Gap barrier, which straddles the San Gabriel River, chloride concentrations have continued to increase in several aquifers inland of the barrier. On behalf of the Orange County Water District, the Water Replenishment District of Southern California, and the Los Angeles Department of Public Works, INTERA created a new flow and solute transport model for permitting, management, and performance assessment of the injection barrier. We devised a new conceptual model, water balance, geologic model, and numerical flow and solute transport models in five months to meet a regulatory deadline. Quickly developing a hydrogeologic framework was challenging because erosion and deposition on the uplifted transgression-regression system of aquitards and aquifers created pathways within the Gap for seawater to travel inland. The pathways, called mergence zones, connect the seawater-intruded Recent Aquifer with several of the deeper aquifers used for water supply. Capturing their locations and geometries was critical to effectively simulating past and future seawater intrusion. We extended the new hydrogeologic framework beyond and below previous frameworks by combining traditional geologic interpretation, GIS analysis, and an innovative geologic modeling software tool. Using the new conceptual and geologic models as a foundation, INTERA constructed a three-dimensional transient groundwater flow model, the Alamitos Barrier Flow Model (ABFM), using the MODFLOW 2000 code. The ABFM was calibrated in three ways: (1) a steady-state calibration to average heads for the 1999-2009 period, (2) transient calibration to the heads observed from 1999 through 2009, and (3) final flow calibration adjustments based on the chloride transport

  4. Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System

    Directory of Open Access Journals (Sweden)

    Renuka Prasad.B

    2011-03-01

    Full Text Available The continuously emerging, operationally and managerially independent, geographically distributedcomputer networks deployable in an evolutionarily manner have created greater challenges in securingthem. Several research works and experiments have convinced the security expert that Network IntrusionDetection Systems (NIDS or Network Intrusion Prevention Systems (NIPS alone are not capable ofsecuring the Computer Networks from internal and external threats completely. In this paper we presentthe design of Intrusion Collaborative System which is a combination of NIDS,NIPS, Honeypots, softwaretools like nmap, iptables etc. Our Design is tested against existing attacks based on Snort Rules andseveral customized DDOS , remote and guest attacks. Dynamic rules are generated during every unusualbehavior that helps Intrusion Collaborative System to continuously learn about new attacks. Also aformal approach to deploy Live Intrusion Collaboration Systems based on System of Systems Concept isProposed.

  5. 21st-Century Sea Level Rise, Economic Growth, and Seawater Intrusion in Coastal Aquifers of California

    Science.gov (United States)

    Loaiciga, H. A.; Pingel, T.

    2008-12-01

    21st-century sea-level rise predictions for California's coastal waters range from 0.10 m to 0.80 m. In coastal semiarid aquifers of California with low topographic relief and heavy groundwater pumping this might lead to pervasive landward migration of seawater plumes. In other coastal aquifers with pronounced seaward hydraulic gradient, the effect of sea-level rise might not be as pronounced. This paper implements a variable- fluid-density, 3-D, finite element numerical flow and transport model to assess the evolution of coastal aquifer salinity during the 21st century due to sea level rise by ice melting and oceanic thermal expansion, and by extraction driven by economic and population growth in semiarid coastal regions of California. The paper focuses on contrasting two different hydrogeologic settings in two heavily mined coastal aquifer with a state- of-the-art numerical simulation model.

  6. Diversity and geochemical structuring of bacterial communities along a salinity gradient in a carbonate aquifer subject to seawater intrusion.

    Science.gov (United States)

    Héry, Marina; Volant, Aurélie; Garing, Charlotte; Luquot, Linda; Elbaz Poulichet, Françoise; Gouze, Philippe

    2014-12-01

    In aquifers subject to saline water intrusion, the mixing zone between freshwater and saltwater displays strong physico-chemical gradients. Although the microbial component of these specific environments has been largely disregarded, the contribution of micro-organisms to biogeochemical reactions impacting water geochemistry has previously been conjectured. The objective of this study was to characterize and compare bacterial community diversity and composition along a vertical saline gradient in a carbonate coastal aquifer using high throughput sequencing of 16S rRNA genes. At different depths of the mixing zone, stable geochemical and hydrological conditions were associated with autochthonous bacterial communities harboring clearly distinct structures. Diversity pattern did not follow the salinity gradient, although multivariate analysis indicated that salinity was one of the major drivers of bacterial community composition, with organic carbon, pH and CO2 partial pressure. Correlation analyses between the relative abundance of bacterial taxa and geochemical parameters suggested that rare taxa may contribute to biogeochemical processes taking place at the interface between freshwater and saltwater. Bacterial respiration or alternative metabolisms such as sulfide oxidation or organic acids production may be responsible for the acidification and the resulting induced calcite dissolution observed at a specific depth of the mixing zone.

  7. Modeling seawater intrusion in overexploited aquifers in the absence of sufficient data: application to the aquifer of Nea Moudania, northern Greece

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Pericles

    2016-08-01

    In many coastal areas, overexploitation of groundwater resources has led both to the quantitative degradation of local aquifers and the deterioration of groundwater quality due to seawater intrusion. To investigate the behavior of coastal aquifers under these conditions, numerical modeling is usually implemented; however, the proper implementation of numerical models requires a large amount of data, which are often not available due to the time-consuming and costly process of obtaining them. In the present study, the investigation of the behavior of coastal aquifers under the lack of adequate data is attempted by developing a methodological framework consisting of a series of numerical simulations: a steady-state, a false-transient and a transient simulation. The sequence and the connection between these simulations constitute the backbone of the whole procedure aimed at adjusting the various model parameters, as well as obtaining the initial conditions for the transient simulation. The validity of the proposed methodology is tested through evaluation of the model calibration procedure and the estimation of the simulation errors (mean error, mean absolute error, root mean square error, mean relative error) using the case of Nea Moudania basin, northern Greece. Furthermore, a sensitivity analysis is performed in order to minimize the error estimates and thus to maximize the reliability of the models. The results of the whole procedure affirm the proper implementation of the developed methodology under specific conditions and assumptions due to the lack of sufficient data, while they give a clear picture of the aquifer's quantitative and qualitative status.

  8. Modeling seawater intrusion in overexploited aquifers in the absence of sufficient data: application to the aquifer of Nea Moudania, northern Greece

    Science.gov (United States)

    Siarkos, Ilias; Latinopoulos, Pericles

    2016-12-01

    In many coastal areas, overexploitation of groundwater resources has led both to the quantitative degradation of local aquifers and the deterioration of groundwater quality due to seawater intrusion. To investigate the behavior of coastal aquifers under these conditions, numerical modeling is usually implemented; however, the proper implementation of numerical models requires a large amount of data, which are often not available due to the time-consuming and costly process of obtaining them. In the present study, the investigation of the behavior of coastal aquifers under the lack of adequate data is attempted by developing a methodological framework consisting of a series of numerical simulations: a steady-state, a false-transient and a transient simulation. The sequence and the connection between these simulations constitute the backbone of the whole procedure aimed at adjusting the various model parameters, as well as obtaining the initial conditions for the transient simulation. The validity of the proposed methodology is tested through evaluation of the model calibration procedure and the estimation of the simulation errors (mean error, mean absolute error, root mean square error, mean relative error) using the case of Nea Moudania basin, northern Greece. Furthermore, a sensitivity analysis is performed in order to minimize the error estimates and thus to maximize the reliability of the models. The results of the whole procedure affirm the proper implementation of the developed methodology under specific conditions and assumptions due to the lack of sufficient data, while they give a clear picture of the aquifer's quantitative and qualitative status.

  9. Coupled human-water system dynamics of saltwater intrusion in the low coastal plain of the Po River, Ravenna, Italy

    Science.gov (United States)

    Lauriola, Ilaria; Ciriello, Valentina; Antonellini, Marco; Pande, Saket

    2017-04-01

    Human activities affect the whole hydrological cycle with possible severe consequences on ecosystem services. Human-water interaction follows complex dynamics that can't be addressed only through the analysis of water withdrawals and contamination processes. As such, comprehensive analysis strategies based on a socio-hydrology approach may allow to deeply understand the co-evolution of human and water systems. Here, we focus on the low coastal plain of the Po river in the south of Ravenna (Italy), which is adjacent to the North Adriatic sea. In particular, our study regards a basin characterized by a land reclamation drainage system, given the low topography which reaches in some places 1 m below sea level. In this area, the thin phreatic coastal aquifer is affected by a relevant salinization process and characterized by the presence of valuable water-dependent ecosystems such as pine forests and wetlands. Groundwater salinization is mainly caused by seawater intrusion due to the hydraulic gradient landwards that is enhanced by land subsidence, land use and drainage allowing for agriculture and settlements. Such a complex scenario involves environmental, social and economic interests. We study the intricate system of relationships occurring between a set of socio-hydrological state variables of interest based on the dynamic analysis of land use changes in the study area that mainly affect groundwater recharge and the availability of freshwater for ecosystem and agriculture activities.

  10. Dynamics of bacterial populations during bench-scale bioremediation of oily seawater and desert soil bioaugmented with coastal microbial mats.

    Science.gov (United States)

    Ali, Nidaa; Dashti, Narjes; Salamah, Samar; Sorkhoh, Naser; Al-Awadhi, Husain; Radwan, Samir

    2016-03-01

    This study describes a bench-scale attempt to bioremediate Kuwaiti, oily water and soil samples through bioaugmentation with coastal microbial mats rich in hydrocarbonoclastic bacterioflora. Seawater and desert soil samples were artificially polluted with 1% weathered oil, and bioaugmented with microbial mat suspensions. Oil removal and microbial community dynamics were monitored. In batch cultures, oil removal was more effective in soil than in seawater. Hydrocarbonoclastic bacteria associated with mat samples colonized soil more readily than seawater. The predominant oil degrading bacterium in seawater batches was the autochthonous seawater species Marinobacter hydrocarbonoclasticus. The main oil degraders in the inoculated soil samples, on the other hand, were a mixture of the autochthonous mat and desert soil bacteria; Xanthobacter tagetidis, Pseudomonas geniculata, Olivibacter ginsengisoli and others. More bacterial diversity prevailed in seawater during continuous than batch bioremediation. Out of seven hydrocarbonoclastic bacterial species isolated from those cultures, only one, Mycobacterium chlorophenolicum, was of mat origin. This result too confirms that most of the autochthonous mat bacteria failed to colonize seawater. Also culture-independent analysis of seawater from continuous cultures revealed high-bacterial diversity. Many of the bacteria belonged to the Alphaproteobacteria, Flavobacteria and Gammaproteobacteria, and were hydrocarbonoclastic. Optimal biostimulation practices for continuous culture bioremediation of seawater via mat bioaugmentation were adding the highest possible oil concentration as one lot in the beginning of bioremediation, addition of vitamins, and slowing down the seawater flow rate.

  11. Estimation of spatial distrubition of groundwater level and risky areas of seawater intrusion on the coastal region in Çarşamba Plain, Turkey, using different interpolation methods.

    Science.gov (United States)

    Arslan, Hakan

    2014-08-01

    Groundwater level plays a significant role in coastal plains. Heavy pumping and excessive use of near-coast groundwater can increase the intrusion of seawater into the aquifers. In the present study, groundwater levels were measured at 59 groundwater wells at different times during pre- and post-irrigation seasons (April and September of the year 2012) in Çarşamba Plain, Turkey. To select the best method, two deterministic interpolation methods (inverse distance weighing (IDW) with the weights of 1, 2, and 3 and radial basis function (RBF) with spline with tension (SPT) and completely regularized spline (CRS)) and two stochastic methods (ordinary kriging (OK) with spherical, exponential, and Gaussian variograms) and cokriging (COK)) were compared and then the best interpolation method was used to evaluate the spatial distribution of groundwater levels in different seasons and seasonal changes. A total of nine different techniques were tested. Also, risky areas of seawater intrusion in coastal area were determined using the best methods for two periods. The performance of these interpolation methods is evaluated by using a validation test method. Statistical indices of correlation (R (2)), mean absolute error (MAE), and root-mean-square error (RMSE) were used to select and validate the best methods. Comparisons between predicted and observed values indicated RBF as the optimal method for groundwater level estimation in April and September. When the best method RBF and the worst method IDW were compared, significant differences were observed in the spatial distribution of groundwater. Results of the study also revealed that excessive groundwater withdrawals during the post-irrigation season dropped the groundwater levels up to 2.0 m in some sections. With regard to seawater intrusion, 9,103 ha of land area was determined to be highly risky and risky.

  12. Dynamics of Dissolved Organic Matter and Microbes in Seawater through Sub-Micron Particle Size Analyses

    Digital Repository Service at National Institute of Oceanography (India)

    Goes, J.I.; Balch, W.M.; Vaughn, J.M.; Gomes, H.R.

    , 1997). In view of the above, understanding the processes regulating the dynamics and distribution of DOM in seawater, assumes tremendous importance for global biogeochemistry and climate change studies. Phytoplankton are the primary source of oceanic.... The exact relationship between the lift force and the channel flow velocity is not well- characterized and calibrations with standard monodispersed particles (>1?m) are necessary to calibrate an FFFF fractogram into a size distribution plot. The FFFF...

  13. DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM

    Directory of Open Access Journals (Sweden)

    Aneetha.A.S

    2012-05-01

    Full Text Available Detection of unexpected and emerging new threats has become a necessity for secured internet communication with absolute data confidentiality, integrity and availability. Design and development of such a detection system shall not only be new, accurate and fast but also effective in a dynamic environment encompassing the surrounding network. In this paper, an algorithm is proposed for anomaly detection through modifying the Self – Organizing Map (SOM, by including new neighbourhood updating rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment. The algorithm initially starts with null network and grows with the original data space as initial weight vectors. New nodes are created using distance threshold parameter and their neighbourhood is identified using connection strength. Employing learning rule, the weight vector updation is carried out for neighbourhood nodes. Performance of the new algorithm is evaluated for using standard bench mark dataset. The result is compared with other neural network methods, shows 98% detection rate and 2% false alarm rate.

  14. 海水经船闸入侵淡水运河的三维数值模拟%Three-dimensional Numerical Simulation on Seawater Intrusion into Freshwater Canal Through Ship Lock

    Institute of Scientific and Technical Information of China (English)

    姜治兵; 陆虹; 杨青远

    2016-01-01

    In order to study the law of salt transportation in the operation of ship lock and its influence on salinity in freshwater area, we set up a three⁃dimensional numerical model for k⁃εtwo⁃phase mixed flow. In the model, control equation groups are dispersed by finite volume method, velocity⁃pressure coupling by SIMPLEC algorithm, time term by single⁃order implicit expression, and convection term by second⁃order upwind scheme, with computing area divided by hexahedral mesh. This model is verified by comparison with prototype experimental results of sea water intrusion into a ship lock, and simulated data are well in agreement with measured data of salinity in lock chamber. The simulation results about the process of seawater intrusion into freshwater zone show that 1) distribution of salini⁃ty in upstream waterway can be divided to 3 sections:density current section, transition section and diffusion sec⁃tion, whose salt transporting speed reduces in order;2) salinity periodically changes at each section and it gradual⁃ly tends to be at a dynamic balance after ship lock operates for a period;3) as for a given cycle, saline intrusion quantity is big at early stage of ship lock operation, then, it gradually reduces and tends to be stable. The research results offer scientific reference for the design and operation of ship lock.%为研究船闸运行过程中盐分的输运规律及其对淡水水域的盐度影响,建立了三维k⁃ε两相混合流数值模型,模型控制方程组采用有限体积法进行离散,流速与压力耦合采用SIMPLEC算法,时间项采用一阶隐式格式,流项采用二阶迎风格式,计算区域采用六面体网格划分。采用某船闸的海水入侵原型试验成果对数值模型进行了验证,闸室内盐度的模拟值与实测值吻合较好。海水入侵淡水水域模拟结果表明:上游航道盐度分布可分为异重流段、过渡段和扩散段,各段盐分输运速度依次

  15. Long-term pumping test to study the impact of an open-loop geothermal system on seawater intrusion in a coastal aquifer: the case study of Bari (Southern Italy)

    Science.gov (United States)

    Clementina Caputo, Maria; Masciale, Rita; Masciopinto, Costantino; De Carlo, Lorenzo

    2016-04-01

    The high cost and scarcity of fossil fuels have promoted the increased use of natural heat for a number of direct applications. Just as for fossil fuels, the exploitation of geothermal energy should consider its environmental impact and sustainability. Particular attention deserves the so-called open loop geothermal groundwater heat pump (GWHP) system, which uses groundwater as geothermal fluid. From an economic point of view, the implementation of this kind of geothermal system is particularly attractive in coastal areas, which have generally shallow aquifers. Anyway the potential problem of seawater intrusion has led to laws that restrict the use of groundwater. The scarcity of freshwater could be a major impediment for the utilization of geothermal resources. In this study a new methodology has been proposed. It was based on an experimental approach to characterize a coastal area in order to exploit the low-enthalpy geothermal resource. The coastal karst and fractured aquifer near Bari, in Southern Italy, was selected for this purpose. For the purpose of investigating the influence of an open-loop GWHP system on the seawater intrusion, a long-term pumping test was performed. The test simulated the effects of a prolonged withdrawal on the chemical-physical groundwater characteristics of the studied aquifer portion. The duration of the test was programmed in 16 days, and it was performed with a constant pumping flowrate of 50 m3/h. The extracted water was outflowed into an adjacent artificial channel, by means of a piping system. Water depth, temperature and electrical conductivity of the pumped water were monitored for 37 days, including also some days before and after the pumping duration. The monitored parameters, collected in the pumping and in five observation wells placed 160 m down-gradient with respect to the groundwater flow direction, have been used to estimate different scenarios of the impact of the GWHP system on the seawater intrusion by mean of a

  16. Groundwater Protection System in Seawater Intrusion Region based on "Three Red Lines"%基于“三条红线”的海水入侵区地下水保护体系

    Institute of Scientific and Technical Information of China (English)

    魏钰洁; 左其亭; 窦明

    2012-01-01

    With the rapid economic development of the coastal areas,the use of fresh water resources,especially fresh groundwa-ter,is increasing continuously. Meanwhile, a series of environmental geological hazards occur frequently due to the over extraction of groundwater, such as land subsidence and seawater intrusion. This paper proposes a groundwater protection system in the seawater intrusion region based on a case study in Yantai city. The groundwater protection system is based on the guidance of the Strictest Water Resources Management System and the rule of "Three Red Lines" ,and implements the joint operation of multi-source water supply to obtain the regulation schemes and protecting countermeasures of groundwater. In addition, the groundwater protection system can provide scientific references for groundwater exploitation,utilization,protection and management in practice.%随着沿海经济的快速发展,当地对淡水资源、特别是地下淡水的开发利用强度不断加大,地下水超采日益严峻,地面沉降、海水入侵等环境地质灾害频繁发生.现以烟台市区为例,应用最严格水资源管理制度指导思想,以“三条红线”为约束,通过实施多水源联合调度,提出了海水入侵区地下水调控方案和保护对策,在此基础上构建海水入侵区地下水保护体系,用以科学指导地下水开发、利用、保护和管理实际工作.

  17. The impact of turbulence and phytoplankton dynamics on foam formation, seawater viscosity and chlorophyll concentration in the eastern English Channel

    Directory of Open Access Journals (Sweden)

    Irma Kesaulya

    2008-06-01

    Full Text Available The space-time dynamics of chlorophyll a concentration and seawater excess viscosity has been investigated in the hydrographically contrasting inshore and offshore water masses of the eastern English Channel. This was done during the phytoplankton spring bloom dominated by Phaeocystis globosa before and after the very large-scale formation of foam induced by an increase in wind-driven turbulence and the related wave breakings. The results suggest that the dynamics of chlorophyll a concentration and seawater excess viscosity are differentially controlled by the formation of foam through the intensity of the spring bloom and wind-generated turbulence.

  18. 海水侵蚀下钢筋混凝土耐久性的交流阻抗谱%Study of the Durability of Reinforced Concrete under the Long-term Intrusion of Seawater by AC Impedance Spectroscopy

    Institute of Scientific and Technical Information of China (English)

    贺鸿珠; 陈志源; 史美伦

    2000-01-01

    Reinforced concrete under the long-term intrusion of seawater has been studied by the K-Ktransform of AC impedance spectroscopy. The stability and durability of the reinforced concrete can bemeasured by the relative deviation of the values measured from that calculated by K-K transform. Withthe increase of the time of the intrusion, the concrete and the rebar is less and less stable and durable.Under the same condition, concrete with fly ash is more stable than ordinary concrete.%应用交流阻抗谱中的Kramers-Kronig变换对受海水长期侵蚀的混凝土和钢筋分别进行了研究.混凝土和钢筋的稳定性可用K-K变换值与实测值之间相对偏差的大小来进行衡量.随着海水侵蚀时间的增加,混凝土和钢筋的稳定性越来越差.在同样条件下,掺粉煤灰混凝土的稳定性优于普通混凝土.

  19. Population dynamics of marine ciliate Euplotes vannus (Protozoa, Ciliophora) in different artificial seawaters

    Institute of Scientific and Technical Information of China (English)

    XU Henglong; ZHU Mingzhuang; JIANG Yong; GAO Shan; MIN Gi-Sik; AL-RASHEID Khaled A.S.

    2011-01-01

    To study population dynamics of marine ciliates in different artificial seawaters (ASW), the population growth dynamics of a common marine ciliate Euplotes vannus were investigated using beef extract media and rice media for five types of ASW and natural seawater (NSW). The results show that: (1) the population growth rate was in the order of NSW>Flack ASW>Nakamula ASW>Schmadz ASW>Oshima ASW>Subow ASW and was considerably higher in rice media than in beef extract media (apart from Subow ASW); (2) the maximum density of E. vannus in stationary phase in each treatment was ranked as Flack ASW>Nakamula ASW>Schmadz ASW>NSW>Oshima ASW>Subow ASW, and was again higher in rice media than in beef extract media (except for Subow ASW); (3) the exponential and stationary phases were longer in rice media than in beef extract media; (4) strains of E. vannus that had been domesticated for >1 year in ASW grew significantly slower, with lower maximum density and longer stationary phase than those isolated and maintained in NSW. It was demonstrated that: (1) E. vannus may grow well in Flack, Nakamula and Schmads ASW compared with NSW (mainly in terms of growth rate); and (2) Oshima ASW is the preferred choice for stock cultures of E. vannus, but the ASWs Flack, Nakamula and Schmadz are preferred for mass culture. These findings suggest that these three ASWs are effective for the cultivation of marine protozoa for experimental studies on ecology, toxicology and molecular biology.

  20. Sensitivity analysis on chaotic dynamical system by Non-Intrusive Least Square Shadowing (NILSS)

    CERN Document Server

    Ni, Angxiu

    2016-01-01

    This paper develops the tangent Non-Intrusive Least Square Shadowing (NILSS) method, which computes sensitivity for chaotic dynamical systems. In NILSS, a tangent solution is represented as a linear combination of a inhomogeneous tangent solution and some homogeneous tangent solutions. Then we solve a least square problem under this new representation. As a result, this new variant is easier to implement with existing solvers. For chaotic systems with large degrees of freedom but low dimensional attractors, NILSS has low computation cost. NILSS is applied to two chaotic PDE systems: the Lorenz 63 system, and a CFD simulation of a backward-facing step. The results show that NILSS computes the correct derivative with a lower cost than the conventional Least Square Shadowing method and the conventional finite difference method.

  1. Formation dynamics of subsurface hydrocarbon intrusions following the Deepwater Horizon blowout

    Science.gov (United States)

    Socolofsky, Scott A.; Adams, E. Eric; Sherwood, Christopher R.

    2011-01-01

    Hydrocarbons released following the Deepwater Horizon (DH) blowout were found in deep, subsurface horizontal intrusions, yet there has been little discussion about how these intrusions formed. We have combined measured (or estimated) observations from the DH release with empirical relationships developed from previous lab experiments to identify the mechanisms responsible for intrusion formation and to characterize the DH plume. Results indicate that the intrusions originate from a stratification-dominated multiphase plume characterized by multiple subsurface intrusions containing dissolved gas and oil along with small droplets of liquid oil. Unlike earlier lab measurements, where the potential density in ambient water decreased linearly with elevation, at the DH site it varied quadratically. We have modified our method for estimating intrusion elevation under these conditions and the resulting estimates agree with observations that the majority of the hydrocarbons were found between 800 and 1200 m.

  2. Monitoring and modeling infiltration–recharge dynamics of managed aquifer recharge with desalinated seawater

    Directory of Open Access Journals (Sweden)

    Y. Ganot

    2017-09-01

    Full Text Available We study the relation between surface infiltration and groundwater recharge during managed aquifer recharge (MAR with desalinated seawater in an infiltration pond, at the Menashe site that overlies the northern part of the Israeli Coastal Aquifer. We monitor infiltration dynamics at multiple scales (up to the scale of the entire pond by measuring the ponding depth, sediment water content and groundwater levels, using pressure sensors, single-ring infiltrometers, soil sensors, and observation wells. During a month (January 2015 of continuous intensive MAR (2.45  ×  106 m3 discharged to a 10.7 ha area, groundwater level has risen by 17 m attaining full connection with the pond, while average infiltration rates declined by almost 2 orders of magnitude (from  ∼  11 to  ∼  0.4 m d−1. This reduction can be explained solely by the lithology of the unsaturated zone that includes relatively low-permeability sediments. Clogging processes at the pond-surface – abundant in many MAR operations – are negated by the high-quality desalinated seawater (turbidity  ∼  0.2 NTU, total dissolved solids  ∼  120 mg L−1 or negligible compared to the low-permeability layers. Recharge during infiltration was estimated reasonably well by simple analytical models, whereas a numerical model was used for estimating groundwater recharge after the end of infiltration. It was found that a calibrated numerical model with a one-dimensional representative sediment profile is able to capture MAR dynamics, including temporal reduction of infiltration rates, drainage and groundwater recharge. Measured infiltration rates of an independent MAR event (January 2016 fitted well to those calculated by the calibrated numerical model, showing the model validity. The successful quantification methodologies of the temporal groundwater recharge are useful for MAR practitioners and can serve as an input for groundwater flow models.

  3. The Dynamic Characteristic Analysis of the Water Lubricated Bearing-Rotor System in Seawater Desalination Pump

    Directory of Open Access Journals (Sweden)

    Xiaoyan Ye

    2014-05-01

    Full Text Available In order to study the water lubricated bearing-rotor system in seawater desalination pump, this paper is based on the coupling between the lubricating flow field and the rotor dynamics. The fluid-solid interaction (FSI method, Rigid Body, was adopted to study the journal orbit of the bearing-rotor system under the periodic unbalancing load. The influences of geometric and working parameter to the journal orbit were combined to analyze the stability and reliability of the bearing-rotor system. The result shows that increasing the rotating speed would increase the journal whirling amplitude and the system sensitivity to the external excitation and unbalancing load were promoted; increasing the aspect ratio would reduce the journal whirling amplitude and cause the system to be more unstable; increasing the inlet pressure would reduce the journal whirling amplitude and cause the system to be more unstable; increasing the unbalancing load would reduce the stability margin and the system is easy to be unstable if obstructed; increasing the radial clearance would reduce the journal whirling amplitude and cause the system to be more unstable. The attitude angle has no influence on the journal whirling amplitude but would influence the stability of system and the value of attitude angle should not be large.

  4. PENGARUH PENUTUPAN MANGROVE TERHADAP PERUBAHAN GARIS PANTAI DAN INTRUSI AIR LAUT DI HILIR DAS CIASEM DAN DAS CIPUNEGARA, KABUPATEN SUBANG (Effect of Mangrove Vegetation Cover to the Shoreline Change and Seawater Intrusion at Downstream of Ciasem

    Directory of Open Access Journals (Sweden)

    Andi Gustiani Salim

    2016-09-01

    type of land use shore via satellite image interpretation and field inspections, analysis of soil physical conditions, observation of seawater intrusion, and analysis of shoreline change due to abrasion or accretion. The results showed in the period of 1989 to 2013, mangrove ponds in Subang decreased from 3402.6 ha to 2384.9 ha, whereas an increase in pond area without mangroves was from 5745 ha to 8741.5 ha. Analysis of a shoreline change showed abrasion in Ujung Pamanukan and Ciasem gulf, it reached 1.2 km inland. Accretion was found in the Blanakan gulf reached 1.3 km in the period of 1989-2013, while at the Cipunagara estuary reached 1.7 km. The ground water in the Muara and Legon Wetan village included brackish water because it had the DHL that was greater than 1500 μS/cm and TDS in Legon Wetan reached > 1000 ppm, whereas TDS in Muara village closed to 1,000. Comparison of bicarbonate-chloride concentrations in the Muara and Legon Wetan village showed R > 1 so that high levels of salt in groundwater is caused by seawater intrusion. On the other hand, there was occur in the Tegalurung village that the use of shores was dominated by mangrove ponds had DHL and TDS value groundwater that was classified as plain water.

  5. Wind dynamics' influence on south Spain airborne olive-pollen during African intrusions.

    Science.gov (United States)

    García-Mozo, H; Hernández-Ceballos, M A; Trigo, M M; Galán, C

    2017-12-31

    Given its proximity to northern Africa, southern Spain is regularly affected by high-altitude African intrusions. This determines a well-defined wind dynamics at surface levels. Although this weather event-mainly recorded in spring and summer-coincides with the flowering season of many wind pollinated species, its potential influence on long term airborne pollen transport has been not investigated in detail. We analyse their influence on olive pollen transport at surface level in south Spain. Daily and bi-hourly olive pollen data from 2010 to 2015, recorded at two sites 150km apart, Málaga (coast) and Córdoba (inland), were analysed together with 1) air masses at 300m above ground level (m.a.g.l.), 2) surface wind direction and 3) surface wind speed over the same period. Air masses at 3000m.a.g.l. were used to identify the periods under the influence of African intrusions. The combined analysis has enabled the identification of different pollen patterns and source contributions. In Málaga, hourly pollen peaks were recorded during the early morning coinciding with the arrival of north-westerly winds (developing sea-land breezes), with a minimal impact of local pollen sources; in Córdoba, by contrast, pollen concentrations reflected the joint contribution of local and long term sources, being the maximum concentrations associated with the arrival of southerly air masses in the afternoon. These results help to understand the potential distant sources and back-trajectories of olive pollen detected. In our case pollen from sources located at the west-northwest areas in the case of Malaga, and from the south in Cordoba. These results reinforce the idea that combined studies between synoptic meteorological and aerobiological data together with different atmospheric height air masses data, offer us a better explanation and understanding of the behaviour and the potential sources of recorded airborne data in a given place. Copyright © 2017 Elsevier B.V. All rights

  6. Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering

    Directory of Open Access Journals (Sweden)

    Manish Somani

    2013-06-01

    Full Text Available Intrusion Detection is the process used to identify intrusions. If we think of the current scenario then several new intrusion that cannot be prevented by the previous algorithm, IDS is introduced to detect possible violations of a security policy by monitoring system activities and response in all times for betterment. If we detect the attack type in a particular communication environment, a response can be initiated to prevent or minimize the damage to the system. So it is a crucial concern. In our framework we present an efficient framework for intrusion detection which is based on Association Rule Mining (ARM and K-Means Clustering. K- Means clustering is use for separation of similar elements and after that association rule mining is used for better detection. Detection Rate (DR, False Positive Rate (FPR and False Negative Rate (FNR are used to measure performance and analysis experimental results.

  7. Wavelet Analysis of the Dynamic Characteristics of Saltwater Intrusion in the Beibu Gulf, Southern China

    Science.gov (United States)

    Li, Q.

    2016-12-01

    The Nanliujiang Waterway (NW), a major outlet of the Beibu gulf, is a crucial source of water supply for Beihai City in Southern China. This waterway is frequently affected by saltwater intrusion from the Beibu Gulf of southern China, which has caused serious water shortage in recent years. For the planning and management of water supply at this waterway it is necessary to understand the characteristics of saltwater intrusion particularly in the low flow period of the year. However, as a result of multiple impacts from tide, river discharge, wind, topography, channel bathometry, and some other factors, the saltwater intrusion into this waterway is highly non-linear. In order to account for the non-linear characteristics, the wavelet method was used to analyse the period characteristics of tidal range, river discharge, and salinity and the impact of tidal range and river discharge on the salinity. Results show that the tidal range at Bailong station and the salinity at Beihai-port station both exhibit a stable 13.5-day period and the salinity in the NW is largely impacted by the tidal range during low stream flow periods. River flows from upstream of the waterway don't show any stable period characteristic. It, however, is critical in mitigating the salinity for water supply during saltwater intrusion. A minimum total flow of 2600 m3/s from upstream at Daguangsha and Yinpang stations has been practiced as a threshold for safe water supply. This study has found that the present time when salinity is below the maximum permissible salinity of 238 ml/g for water supply increases as the river discharge from upstream increases and up to 40-60% of the time the salinity at water supply pumping station is below 238 mg/l when the upstream flow is greater than 2600 m3/s. Planning and management of water supply operation at the NW is politically, economically and mostly importantly technically challenging, findings from this study can provide some guidance for operation and

  8. The effect of feed salinity on the biofouling dynamics of seawater desalination.

    Science.gov (United States)

    Yang, Hui-Ling; Pan, Jill R; Huang, Chihpin; Lin, Justin Chun-Te

    2011-05-01

    A persistent cell labeling dye and a novel microbial counting method were used to explore the effects of salinity on a microbial population in a reverse osmosis (RO) desalination system, and these clearly distinguished microbial cell multiplication from cell adherence. The results indicated that microbial multiplication is more active at the front of a seawater RO pressure vessel, while adhesion dominates the back of the vessel. A severe reduction in RO permeate flux and total dissolved solid (TDS) rejection were detected at low salinity, attributed to marked cell multiplication and release of extracellular polymeric substances, whilst a relatively stable flux was observed at medium and high salinity. The results from PCR-DGGE revealed the variation in microbial species distribution on the membrane with salinity. The results imply the critical role of membrane modification in biofouling mitigation in the desalination process.

  9. Design of Intrusion Detection Model Based on FP-Growth and Dynamic Rule Generation with Clustering

    Directory of Open Access Journals (Sweden)

    Manish Somani

    2013-06-01

    Full Text Available ntrusion Detection is the process used to identifyintrusions. If we think of the current scenario thenseveralnew intrusion that cannot be prevented bythe previous algorithm, IDS is introduced to detectpossible violations of a security policy by monitoringsystem activities and response in all times forbetterment. If we detect the attack type in aparticular communication environment, a responsecan be initiated to prevent or minimize the damageto the system. So it is a crucial concern. In ourframework we present an efficient framework forintrusion detection which is based on AssociationRule Mining (ARM and K-Means Clustering. K-Means clustering is use for separation of similarelements and after that association rule mining isused for better detection. Detection Rate (DR, FalsePositive Rate (FPR and False Negative Rate (FNRare used to measure performance and analysisexperimental results

  10. Intrusion dynamics of particle plumes in stratified water with weak crossflow: Application to deep ocean blowouts

    Science.gov (United States)

    Wang, Dayang; Adams, E. Eric

    2016-06-01

    We present an experimental study of particle plumes in ambient stratification and a mild current. In an inverted framework, the results describe the fate of oil droplets released from a deep ocean blowout. A continuous stream of dense glass beads was released from a carriage towed in a salt-stratified tank. Nondimensional particle slip velocity UN ranged from 0.1 to 1.9, and particles with UN ≤ 0.5 were observed to enter the intrusion layer. The spatial distributions of beads, collected on a bottom sled towed with the source, present a Gaussian distribution in the transverse direction and a skewed distribution in the along-current direction. Dimensions of the distributions increase with decreasing UN. The spreading relations can be used as input to far-field models describing subsequent transport of particles or, in an inverted framework, oil droplets. The average particle settling velocity, Uave, was found to exceed the individual particle slip velocity, Us, which is attributed to the initial plume velocity near the point of release. Additionally, smaller particles exhibit a "group" or "secondary plume" effect as they exit the intrusion as a swarm. The secondary effect becomes more prominent as UN decreases, and might help explain observations from the 2000 Deep Spill field experiment where oil was found to surface more rapidly than predicted based on Us. An analytical model predicting the particle deposition patterns was validated against experimental measurements, and used to estimate near-field oil transport under the Deepwater Horizon spill conditions, with/without chemical dispersants.

  11. A Numerical Investigation of Vapor Intrusion — the Dynamic Response of Contaminant Vapors to Rainfall Events

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G.; Suuberg, Eric M.

    2013-01-01

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1 m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in

  12. A numerical investigation of vapor intrusion--the dynamic response of contaminant vapors to rainfall events.

    Science.gov (United States)

    Shen, Rui; Pennell, Kelly G; Suuberg, Eric M

    2012-10-15

    The U.S. government and various agencies have published guidelines for field investigation of vapor intrusion, most of which suggest soil gas sampling as an integral part of the investigation. Contaminant soil gas data are often relatively more stable than indoor air vapor concentration measurements, but meteorological conditions might influence soil gas values. Although a few field and numerical studies have considered some temporal effects on soil gas vapor transport, a full explanation of the contaminant vapor concentration response to rainfall events is not available. This manuscript seeks to demonstrate the effects on soil vapor transport during and after different rainfall events, by applying a coupled numerical model of fluid flow and vapor transport. Both a single rainfall event and seasonal rainfall events were modeled. For the single rainfall event models, the vapor response process could be divided into three steps: namely, infiltration, water redistribution, and establishment of a water lens atop the groundwater source. In the infiltration step, rainfall intensity was found to determine the speed of the wetting front and wash-out effect on the vapor. The passage of the wetting front led to an increase of the vapor concentration in both the infiltration and water redistribution steps and this effect is noted at soil probes located 1m below the ground surface. When the mixing of groundwater with infiltrated water was not allowed, a clean water lens accumulated above the groundwater source and led to a capping effect which can reduce diffusion rates of contaminant from the source. Seasonal rainfall with short time intervals involved superposition of the individual rainfall events. This modeling results indicated that for relatively deeper soil that the infiltration wetting front could not flood, the effects were damped out in less than a month after rain; while in the long term (years), possible formation of a water lens played a larger role in determining

  13. Saltwater intrusion as potential driver of phosphorus release from limestone bedrock in a coastal aquifer

    Science.gov (United States)

    Flower, Hilary; Rains, Mark; Lewis, David; Zhang, Jia-Zhong; Price, René

    2017-01-01

    An important but often overlooked consequence of saltwater intrusion is the potential increase of groundwater soluble reactive phosphorus concentrations. The phosphorus sorption dynamics of two limestone rocks of different composition were investigated by simulating seawater intrusion over a wide range of mixing ratios between freshwater and saltwater. Both rocks exhibited a logarithmic loss of sorption efficiency in mixtures containing more than approximately 3 mM Cl- concentration (100 mg Cl-/L; about ion exchange front, which is actually landward of the saltwater intrusion front as it is commonly defined. Sorption efficiency in our experiments continued to decline as salinity increased, until Cl- concentration reached a second threshold of 50 or 200 mM (1700 or 7700 mg Cl-/L), depending on the rock composition, particularly iron content. Further increase in salinity would produce little increase in groundwater soluble reactive phosphorus concentration. Our results have implications for soluble reactive phosphorus availability in estuaries that receive mixing zone groundwater discharge.

  14. A Dynamic Optimization Strategy for the Operation of Large Scale Seawater Reverses Osmosis System

    Directory of Open Access Journals (Sweden)

    Aipeng Jiang

    2014-01-01

    Full Text Available In this work, an efficient strategy was proposed for efficient solution of the dynamic model of SWRO system. Since the dynamic model is formulated by a set of differential-algebraic equations, simultaneous strategies based on collocations on finite element were used to transform the DAOP into large scale nonlinear programming problem named Opt2. Then, simulation of RO process and storage tanks was carried element by element and step by step with fixed control variables. All the obtained values of these variables then were used as the initial value for the optimal solution of SWRO system. Finally, in order to accelerate the computing efficiency and at the same time to keep enough accuracy for the solution of Opt2, a simple but efficient finite element refinement rule was used to reduce the scale of Opt2. The proposed strategy was applied to a large scale SWRO system with 8 RO plants and 4 storage tanks as case study. Computing result shows that the proposed strategy is quite effective for optimal operation of the large scale SWRO system; the optimal problem can be successfully solved within decades of iterations and several minutes when load and other operating parameters fluctuate.

  15. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    Science.gov (United States)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  16. Constraining the dynamics of 2014-15 Bardarbunga-Holuhraun intrusion and eruption using seismic noise

    Science.gov (United States)

    Caudron, Corentin; Donaldson, Clare; White, Robert

    2016-04-01

    The 2010 Eyjafjallajokull volcanic eruption explosively emitted a large quantity of ash in the atmosphere and paralysed the European airspace for weeks. Several seismic scientific studies already contributed to the understanding of this complex eruption (e.g., Tarasewicz et al., 2012). Although an excellent network of seismometers recorded this eruption, some volcanological and seismological aspects are still poorly understood. In order to gain further constraints on the dynamics of this ground-breaking eruptions, we mine the seismic dataset using the seismic ambient noise technique between pairs of stations and the Seismic Amplitude Ratio Analysis (SARA). Our preliminary results reveal a strong contamination of the Cross Correlation Functions (CCF) by the volcanic tremor, particularly above 0.5 Hz even for station pairs located >50 km from the volcano. Although this volcanic tremor precludes the monitoring of the seismic velocities, it literally illuminated the medium. The two phases of the eruptions (i.e., effusive and explosive) are clearly distinguished in these functions due to their different locations. During the explosive phase, an intriguing shift of the main peaks of the cross correlation functions is evidenced (early May 2010). It is remarkably consistent with the downward migration proposed by Tarasewicz et al. (2012) and is interpreted as a migration of the volcanic tremor. SARA methodology, which is continuously imaging and tracking any significant seismicity at a 10-min time scale (Taisne et al., 2010), is applied in the 5-15 Hz frequency band in order to image to continuously migrating microseismicity. The analysis displays several shallow migrations (above 5 km of depth, in March 2010) preceding the effusive phase of the eruption. Interestingly, the results also evidence a fast and deep migration (> 5 km) starting a few hours before the beginning of the explosive phase (13 April 2010). These preliminary results may shed light on the triggering of

  17. Numerically modelling the sea-water and bubble plume dynamics found from the QICS project in Ardmucknish Bay

    Science.gov (United States)

    Dewar, M.; Sellami, N.; Chen, B.; Stahl, H.; Blackford, J.

    2013-12-01

    The QICS experiment carried out through spring 2012 investigated the nature and probability of leakage from a carbon dioxide (CO2) storage reservoir through a controlled CO2 release beneath a Scottish sea loch. This experiment allowed the measurement of the environmental impact, the development of various systems for monitoring, detecting and modelling leakage scenarios [1]. The ECO2 project involves the assessment of risk to the marine environment from sub-seabed CO2 storage sites [2] which means there is a strong link in aims for these two projects. Modelling the formation, dynamics and dissolution of CO2 gas bubbles in seawater allows the physiochemical impact on the marine environment to be predicted. This can be compared with data measured during the QICS experiment, proving the accuracy and viability of the models for full scale leakage scenarios. This study focuses on the role of bubble interactions on the plume formation and development; a two phase small scale plume model is improved by a sub-model of break up and coalescence of bubbles to simulate the bubble dynamics within a plume formation based on bubble measurements from the QICS experiment. The impact on the waters is shown through dissolution by the pCO2 and pH changes [3] and the model is validated against, and further developed utilising experimental measurements taken within the QICS project. [1] QICS, QICS: Quantifying and Monitoring Potential Ecosystem Impacts of Geological Carbon Storage. (Accessed 15.07.13), http://www.bgs.ac.uk/qics/home.html [2] ECO2, ECO2 - Sub-seabed CO2 Storage: Impact on Marine Ecosystems. (Accessed 16.07.13), http://www.eco2-project.eu [3] Dewar, M., et al. Small-scale modelling of the physiochemical impacts of CO2 leaked from sub-seabed reservoirs or pipe-lines with in the North Sea and surrounding waters. Mar. Pollut. Bull. (2013), http://dx.doi.org/10.1016/j.marpolbu l.2013.03.005

  18. Ground water hydrochemical characteristics:seawater intruded area in eastern and southern coast of Laizhou Bay

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Eastern and southern coastal zones of Laizhou Bay are the mostrepresentative seawater intruded areas in the world, with two intrusion sources of contemporary seawater and paleobrine. In order to reveal the complicated hydrochemical changing process and the mechanism of fresh groundwater being polluted by saltwater, we conducted long-term observation and hydroehemical analysis at four observing sections of typical salt-fresh water transitional zone. The study indicates that seawater and brine intrusion processes have different hydrochemical features, and that ion exchange and adsorption actions between water and aquifer produce great influence on the intrusion.

  19. Formation and Dissociation of Methane Hydrates from Seawater in Consolidated Sand: Mimicking Methane Hydrate Dynamics beneath the Seafloor

    Directory of Open Access Journals (Sweden)

    Prasad B. Kerkar

    2013-11-01

    Full Text Available Methane hydrate formation and dissociation kinetics were investigated in seawater-saturated consolidated Ottawa sand-pack under sub-seafloor conditions to study the influence of effective pressure on formation and dissociation kinetics. To simulate a sub-seafloor environment, the pore-pressure was varied relative to confining pressure in successive experiments. Hydrate formation was achieved by methane charging followed by sediment cooling. The formation of hydrates was delayed with increasing degree of consolidation. Hydrate dissociation by step-wise depressurization was instantaneous, emanating preferentially from the interior of the sand-pack. Pressure drops during dissociation and in situ temperature controlled the degree of endothermic cooling within sediments. In a closed system, the post-depressurization dissociation was succeeded by thermally induced dissociation and pressure-temperature conditions followed theoretical methane-seawater equilibrium conditions and exhibited excess pore pressure governed by the pore diameter. These post-depressurization equilibrium values for the methane hydrates in seawater saturated consolidated sand-pack were used to estimate the enthalpy of dissociation of 55.83 ± 1.41 kJ/mol. These values were found to be lower than those reported in earlier literature for bulk hydrates from seawater (58.84 kJ/mol and pure water (62.61 kJ/mol due to excess pore pressure generated within confined sediment system under investigation. However, these observations could be significant in the case of hydrate dissociation in a subseafloor environment where dissociation due to depressurization could result in an instantaneous methane release followed by slow thermally induced dissociation. The excess pore pressure generated during hydrate dissociation could be higher within fine-grained sediments with faults and barriers present in subseafloor settings which could cause shifting in geological layers.

  20. Numerical analysis of seawater circulation in carbonate platforms: II. The dynamic interaction between geothermal and brine reflux circulation

    Science.gov (United States)

    Jones, G.D.; Whitaker, F.F.; Smart, P.L.; Sanford, W.E.

    2004-01-01

    Density-driven seawater circulation may occur in carbonate platforms due to geothermal heating and / or reflux of water of elevated salinity. In geothermal circulation lateral contrasts in temperature between seawater and platform groundwaters warmed by the geothermal heat flux result in upward convective flow, with colder seawater drawn into the platform at depth. With reflux circulation, platform-top waters concentrated by evaporation flow downward, displacing less dense underlying groundwaters. We have used a variable density groundwater flow model to examine the pattern, magnitude and interaction of these two different circulation mechanisms, for mesosaline platform-top waters (50???) and brines concentrated up to saturation with respect to gypsum (150???) and halite (246???). Geothermal circulation, most active around the platform margin, becomes restricted and eventually shut-off by reflux of brines from the platform interior towards the margin. The persistence of geothermal circulation is dependent on the rate of brine reflux, which is proportional to the concentration of platform-top brines and also critically dependent on the magnitude and distribution of permeability. Low permeability evaporites can severely restrict reflux whereas high permeability units in hydraulic continuity enhance brine transport. Reduction in permeability with depth and anisotropy of permeability (kv < < kh) focuses flow laterally in the shallow subsurface (<1 km), resulting in a horizontally elongated brine plume. Aquifer porosity and dispersivity are relatively minor controls on reflux. Platform brines can entrain surficial seawater when brine generating conditions cease but the platform-top remains submerged, a variant of reflux we term "latent reflux". Brines concentrated up to gypsum saturation have relatively long residence times of at least 100 times the duration of the reflux event. They thus represent a long-term control on post-reflux groundwater circulation, and

  1. Hydrogeochemical Recognization of Seawater Intrusion Process at the Typical Profile in Laizhou Bay%山东莱州湾南岸典型剖面海(咸)水入侵过程的水文地球化学识别

    Institute of Scientific and Technical Information of China (English)

    胡云壮; 李红; 李影; 施佩歆; 杨吉龙; 胡自远; 刘宏伟

    2015-01-01

    Laizhou Bay area, Shandong Province, is a typical area for seawater intrusion studies. In order to fur-ther research of the seawater intrusion in this area, the typical profile of Changyi-Liutuanin the south coast of Lai-zhou Bay is chosen to be studied. Various water samples (i.e. river water, fresh water,brackish water, salt water, brine water and seawater) were collected to analyze the characteristics of major hydrochemical compositions, combining environment isotopes (d18O-d2H), and the ratios of major ions and saturation index of the main miner-als. According to the hydrochemical characteristics of different waters, the mixing effect occurres firstly during the seawater (salt water) intrusion in the studying area. And then, the cation exchange and adsorption effect, the dissolution and precipitation effect take places in varying degrees. And the saltwater, brackish water formed through fresh groundwater mixing with brine water according to the special ion ratios. Some deep fresh water has also been affected by the brine water intrusion, based on the distribution characters of the saltwater and Cl--δ18O relationship. Through testing and comprehensive analysis of hydrogen and oxygen isotopes,we propose that fresh groundwater in the studying area originate from atmospheric precipitation obviously, and the brine water of Quaternary sea water origin is effected by the evaporation effect,"Oxygen elegant"is quite serious. The saturabil-ities of the main minerals show that rock salt are in the unsaturated condition, and gypsum and dolomite in the underground fresh water and brackish water are unsaturated, but they are saturated in salt water and brine water;calcite in all waters are substantially saturated.%山东莱州湾地区是我国海水入侵研究的典型地区之一,为了进一步促进对莱州湾海水入侵的认识,本次研究选择莱州湾南岸的典型剖面(昌邑-柳疃)为研究对象,系统采集了不同类型水样(河水、淡

  2. Diagnosing and Reconstructing Real-World Hydroclimatic Dynamics from Time Sequenced Data: The Case of Saltwater Intrusion into Coastal Wetlands in Everglades National Park

    Science.gov (United States)

    Huffaker, R.; Munoz-Carpena, R.

    2016-12-01

    There are increasing calls to audit decision-support models used for environmental policy to ensure that they correspond with the reality facing policy makers. Modelers can establish correspondence by providing empirical evidence of real-world dynamic behavior that their models skillfully simulate. We present a pre-modeling diagnostic framework—based on nonlinear dynamic analysis—for detecting and reconstructing real-world environmental dynamics from observed time-sequenced data. Phenomenological (data-driven) modeling—based on machine learning regression techniques—extracts a set of ordinary differential equations governing empirically-diagnosed system dynamics from a single time series, or from multiple time series on causally-interacting variables. We apply the framework to investigate saltwater intrusion into coastal wetlands in Everglades National Park, Florida, USA. We test the following hypotheses posed in the literature linking regional hydrologic variables with global climatic teleconnections: (1) Sea level in Florida Bay drives well level and well salinity in the coastal Everglades; (2) Atlantic Multidecadal Oscillation (AMO) drives sea level, well level and well salinity; and (3) AMO and (El Niño Southern Oscillation) ENSO bi-causally interact. The thinking is that salt water intrusion links ocean-surface salinity with salinity of inland water sources, and sea level with inland water; that AMO and ENSO share a teleconnective relationship (perhaps through the atmosphere); and that AMO and ENSO both influence inland precipitation and thus well levels. Our results support these hypotheses, and we successfully construct a parsimonious phenomenological model that reproduces diagnosed nonlinear dynamics and system interactions. We propose that reconstructed data dynamics be used, along with other expert information, as a rigorous benchmark to guide specification and testing of hydrologic decision support models corresponding with real-world behavior.

  3. Simulation of sea water intrusion in coastal aquifers: Some typical responses

    Indian Academy of Sciences (India)

    Amlan Das; Bithin Datta

    2001-08-01

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented in this paper are based on the density-dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a specified study area. Response evaluations consider the effects of vertical recharge on seawater intrusion, effects of boundary conditions, and effects of spatially varying pumping from the aquifer. The 3-D simulations demonstrate the viability of using a planned strategy of spatially varying withdrawals from the aquifer to manage seawater intrusion. It is demonstrated that series of pumps near the ocean-face boundary induce a hydraulic head distribution that can be effectively used for controlling seawater intrusion.

  4. Seawater transport during coral biomineralization

    Science.gov (United States)

    Gagnon, Alexander C.; Adkins, Jess F.; Erez, Jonathan

    2012-05-01

    Cation transport during skeletal growth is a key process controlling metal/calcium (Me/Ca) paleoproxy behavior in coral. To characterize this transport, cultured corals were transferred into seawater enriched in the rare earth element Tb3 + as well as stable isotopes of calcium, strontium, and barium. Subsequent NanoSIMS ion images of each coral skeleton were used to follow uptake dynamics. These images show a continuous region corresponding to new growth that is homogeneously enriched in each tracer. Isotope ratio profiles across the new growth boundary transition rapidly from natural abundance ratios to a ratio matching the enriched culture solution. The location of this transition is the same for each element, within analytical resolution. The synchronous incorporation of all these cations, including the dissimilar ion terbium, which has no known biological function in coral, suggests that: (1) there is cation exchange between seawater and the calcifying fluid, and (2) these elements are influenced by similar transport mechanisms consistent with direct and rapid seawater transport to the site of calcification. Measured using isotope ratio profiles, seawater transport rates differ from place to place on the growing coral skeleton, with calcifying fluid turnover times from 30 min to 5.7 h. Despite these differences, all the elements measured in this study show the same transport dynamics at each location. Using an analytical geochemical model of biomineralization that includes direct seawater transport we constrain the role of active calcium pumping during calcification and we show that the balance between seawater transport and precipitation can explain observed Me/Ca variability in deep-sea coral.

  5. Adsorption/desorption of phosphorus on limestone from the Biscayne Aquifer under freshwater and seawater conditions.

    Science.gov (United States)

    Areas of seawater intrusion are known geochemically active regions particularly in limestone aquifers, where carbonate mineral dissolution and ion exchange reactions are important. Both of these processes can lead to a release of phosphorus from the aquifer matrix to the groundwater as seawater int...

  6. Three-dimensional hydrostratigraphical modelling to support evaluation of recharge and saltwater intrusion in a coastal groundwater system in Vietnam

    OpenAIRE

    2014-01-01

    Saltwater intrusion is generally related to seawater-level rise or induced intrusion due to excessive groundwater extraction in coastal aquifers. However, the hydrogeological heterogeneity of the subsurface plays an important role in (non-)intrusion as well. Local hydrogeological conditions for recharge and saltwater intrusion are studied in a coastal groundwater system in Vietnam where geological formations exhibit highly heterogeneous lithologies. A three-dimensional (3D) hydrostratigraphic...

  7. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  8. Multi-Objective Management of Saltwater Intrusion in Groundwater. Optimization under Uncertainty

    NARCIS (Netherlands)

    Tran, T.M.

    2004-01-01

    Coastal aquifers are very vulnerable to seawater intrusion through, for example, the overdraft of groundwater exploitation or insufficient recharge from upstream. Problems of salt-intrusion into groundwater have become a considerable concern in many countries with coastal areas. There have been a nu

  9. Multi-Objective Management of Saltwater Intrusion in Groundwater. Optimization under Uncertainty

    OpenAIRE

    2004-01-01

    Coastal aquifers are very vulnerable to seawater intrusion through, for example, the overdraft of groundwater exploitation or insufficient recharge from upstream. Problems of salt-intrusion into groundwater have become a considerable concern in many countries with coastal areas. There have been a number of studies that have tried to simulate groundwater flow system in regions under threat of saltwater intrusion into coastal aquifers. These aquifer systems are characterized by either a single ...

  10. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  11. Dynamics of seawater carbonate chemistry, production, and calcification of a coral reef flat, central Great Barrier Reef

    Directory of Open Access Journals (Sweden)

    R. Albright

    2013-10-01

    Full Text Available Ocean acidification is projected to shift coral reefs from a state of net accretion to one of net dissolution this century. Presently, our ability to predict global-scale changes to coral reef calcification is limited by insufficient data relating seawater carbonate chemistry parameters to in situ rates of reef calcification. Here, we investigate diel and seasonal trends in carbonate chemistry of the Davies Reef flat in the central Great Barrier Reef and relate these trends to benthic carbon fluxes by quantifying net ecosystem calcification (nec and net community production (ncp. Results show that seawater carbonate chemistry of the Davies Reef flat is highly variable over both diel and seasonal cycles. pH (total scale ranged from 7.92 to 8.17, pCO2 ranged from 272 to 542 μatm, and aragonite saturation state (Ωarag ranged from 2.9 to 4.1. Diel cycles in carbonate chemistry were primarily driven by ncp, and warming explained 35% and 47% of the seasonal shifts in pCO2 and pH, respectively. Daytime ncp averaged 37 ± 19 mmol C m−2 h−1 in summer and 33 ± 13 mmol C m−2 h−1 in winter; nighttime ncp averaged −30 ± 25 and −7 ± 6 mmol C m−2 h−1 in summer and winter, respectively. Daytime nec averaged 11 ± 4 mmol CaCO3 m−2 h−1 in summer and 8 ± 3 mmol CaCO3 m−2 h−1 in winter, whereas nighttime nec averaged 2 ± 4 mmol and −1 ± 3 mmol CaCO3 m−2 h−1 in summer and winter, respectively. Net ecosystem calcification was highly sensitive to changes in Ωarag for both seasons, indicating that relatively small shifts in Ωarag may drive measurable shifts in calcification rates, and hence carbon budgets, of coral reefs throughout the year.

  12. Dynamics of seawater carbonate chemistry, production, and calcification of a coral reef flat, Central Great Barrier Reef

    Directory of Open Access Journals (Sweden)

    R. Albright

    2013-05-01

    Full Text Available Ocean acidification is projected to shift coral reefs from a state of net accretion to one of net dissolution this century. Presently, our ability to predict global-scale changes to coral reef calcification is limited by insufficient data relating seawater carbonate chemistry parameters to in situ rates of reef calcification. Here, we investigate natural trends in carbonate chemistry of the Davies Reef flat in the central Great Barrier Reef on diel and seasonal timescales and relate these trends to benthic carbon fluxes by quantifying net ecosystem calcification (nec and net community production (ncp. Results show that seawater carbonate chemistry of the Davies Reef flat is highly variable over both diel and seasonal timescales. pH (total scale ranged from 7.92 to 8.17, pCO2 ranged from 272 to 542 μatm, and aragonite saturation state (Ωarag ranged from 2.9 to 4.1. Diel cycles in carbonate chemistry were primarily driven by ncp, and warming explained 35% and 47% of the seasonal shifts in pCO2 and pH, respectively. Daytime ncp averaged 36 ± 19 mmol C m−2 h−1 in summer and 33 ± 13 mmol C m−2 h−1 in winter; nighttime ncp averaged −22 ± 20 and −7 ± 6 mmol C m−2 h−1 in summer and winter, respectively. Daytime nec averaged 11 ± 4 mmol CaCO3 m−2 h−1 in summer and 8 ± 3 mmol CaCO3 m−2 h−1 in winter, whereas nighttime nec averaged 2 ± 4 mmol and −1 ± 3 mmol CaCO3 m−2 h−1 in summer and winter, respectively. Net ecosystem calcification was positively correlated with Ωarag for both seasons. Linear correlations of nec and Ωarag indicate that the Davies Reef flat may transition from a state of net calcification to net dissolution at Ωarag values of 3.4 in summer and 3.2 in winter. Diel trends in Ωarag indicate that the reef flat is currently below this calcification threshold 29.6% of the time in summer and 14.1% of the time in winter.

  13. Model of intrusion prevention system based on dynamic IP blacklist%基于动态IP黑名单的入侵防御系统模型

    Institute of Scientific and Technical Information of China (English)

    卢先锋; 杨频; 梁刚

    2011-01-01

    通过分析网络入侵防御系统(network intrusion prevention system,NIPS)在处理超大网络攻击流量时存在的不足和性能瓶颈,提出并建立一种基于动态IP黑名单技术的NIPS模型,使NIPS维护一个存储攻击主机IP地址和其威胁度信息的哈希表,通过威胁度评估算法周期计算攻击源IP的威胁度并更新到哈希表内,预过滤模块将根据IP黑名单和过滤策略来对整个网络数据包进行预先过滤.实验结果表明,该模型在处理超大网络攻击流量时比传统NIPS更加快速高效,并且能更好地保护NIPS身后的网络.%NIPS (network intrusion prevention systems) often has a high loss rate and low-performance when handling the huge attack traffic.A model of NIPS based on dynamic IP blacklist is proposed to solve this problems.NIPS maintain a hash table (IP blacklist)while keep the attacker's IP address and their threat values.Through the attacker's IP's threat evaluation algorithm, NIPS will periodically compute the attacker's threat values and save them into the hash table.While huge network flow reaches, NIPS can rapidly filter the flow beforehand by means ofusing the IP blacklist hash table.The experiments showed that using this model can improve the performance of NIPS and make the protected network safer.

  14. Seawater predesalination with electrodialysis

    NARCIS (Netherlands)

    Galama, A.H.; Saakes, M.; Bruning, H.; Rijnaarts, H.H.M.; Post, J.W.

    2014-01-01

    The suitability of ED for seawater desalination was investigated and we quantified the energy losses that play a role in electrodialysis. The combination of electrodialysis (ED) and brackish water reverse osmosis (BWRO) is presented as an alternative desalination strategy for seawater reverse osmosi

  15. Seawater predesalination with electrodialysis

    NARCIS (Netherlands)

    Galama, A.H.; Saakes, M.; Bruning, H.; Rijnaarts, H.H.M.; Post, J.W.

    2014-01-01

    The suitability of ED for seawater desalination was investigated and we quantified the energy losses that play a role in electrodialysis. The combination of electrodialysis (ED) and brackish water reverse osmosis (BWRO) is presented as an alternative desalination strategy for seawater reverse

  16. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  17. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  18. Utilizing multichannel electrical resistivity methods to examine the dynamics of the fresh water–seawater interface in two Hawaiian groundwater systems

    Science.gov (United States)

    Dimova, Natasha T.; Swarzenski, Peter W.; Dulaiova, Henrieta; Glenn, Craig R.

    2012-01-01

    Multichannel electrical resistivity (ER) measurements were conducted at two contrasting coastal sites in Hawaii to obtain new information on the spatial scales and dynamics of the fresh water–seawater interface and rates of coastal groundwater exchange. At Kiholo Bay (located on the dry, Kona side of the Big Island) and at a site in Maunalua Bay (Oahu), there is an evidence for abundant submarine groundwater discharge (SGD). However, the hydrologic and geologic controls on coastal groundwater discharge are likely to be different at these two sites. While at Kiholo Bay SGD is predominantly through lava tubes, at the Maunalua Bay site exchange occurs mostly through nearshore submarine springs. In order to calculate SGD fluxes, it is important to understand the spatial and temporal scales of coastal groundwater exchange. From ER time series data, subsurface salinity distributions were calculated using site-specific formation factors. A salinity mass balance box model was then used to calculate rates of point source (i.e., spatially discreet) and total fresh water discharge. From these data, mean SGD rates were calculated for Kiholo Bay (∼9,200 m3/d) and for the Maunalua Bay site (∼5,900 m3/d). While such results are on the same order of magnitude to geochemical tracer-derived SGD rates, the ER SGD rates provide enhanced details of coastal groundwater exchange that can enable a more cohesive whole watershed perspective.

  19. Nature/culture/seawater.

    Science.gov (United States)

    Helmreich, Stefan

    2011-01-01

    Seawater has occupied an ambiguous place in anthropological categories of "nature" and "culture." Seawater as nature appears as potentiality of form and uncontainable flux; it moves faster than culture - with culture frequently figured through land-based metaphors - even as culture seeks to channel water's (nature's) flow. Seawater as culture manifests as a medium of pleasure, sustenance, travel, disaster. I argue that, although seawater's qualities in early anthropology were portrayed impressionistically, today technical, scientific descriptions of water's form prevail. For example, processes of globalization - which may also be called "oceanization" - are often described as "currents," "flows," and "circulations." Examining sea-set ethnography, maritime anthropologies, and contemporary social theory, I propose that seawater has operated as a “theory machine” for generating insights about human cultural organization. I develop this argument with ethnography from the Sargasso Sea and in the Sea Islands. I conclude with a critique of appeals to water's form in social theory.

  20. Dynamic model of intrusion of magma and/or magmatic fluids in the large-scale deformation source of the Campi Flegrei caldera (Italy).

    Science.gov (United States)

    Crescentini, Luca; Amoruso, Antonella; Luongo, Annamaria

    2015-04-01

    The Campi Flegrei (CF) caldera is located in a densely populated area close to Naples (Southern Italy). It is renowned as a site of continual slow vertical movements. After the last eruption in 1538, the caldera generally subsided until 1969 when minor uplift occurred. In the early 1970s this uplift became significant (~1.5 m max). A further large uplift episode occurred from 1982 to 1984 (~1.8 m max), and subsequently smaller uplift episodes have occurred since then. Amoruso et al. (2014a,b) have recently shown that the CF surface deformation field from 1980 to 2013 can be decomposed into two stationary parts. Large-scale deformation can be explained by a quasi-horizontal source, oriented NW to SE and mathematically represented by a pressurized finite triaxial ellipsoid (PTE) ~4 km deep, possibly related to the injection of magma and/or magmatic fluids from a deeper magma chamber into a sill, or pressurization of interconnected (micro)cavities. Residual deformation not accounted for by PTE is confined to the Solfatara fumarolic area and can be mathematically explained by a small (point) pressurized oblate spheroid (PS) ~2 km below the Solfatara fumarolic field, that has been equated with a poroelastic response of the substratum to pore pressure increases near the injection point of hot magmatic fluids into the hydrothermal system. A satisfying feature of this double source model is that the geometric source parameters of each are constant over the period 1980-2013 with the exception of volume changes (potencies). Several papers have ascribed CF deformation to the injection of magmatic fluids at the base of the hydrothermal system. All models predict complex spatial and temporal evolution of the deformation pattern and consequently contrast with the observed deformation pattern stationarity. Also recently proposed dynamic models of sill intrusion in a shallow volcanic environment do not satisfy the observed CF deformation pattern stationarity. We have developed an

  1. Dynamics of amino acids in the conditioning film developed on glass panels immersed in the surface seawaters of Dona Paula Bay

    Digital Repository Service at National Institute of Oceanography (India)

    Bhosle, N.B.; Garg, A.; Fernandes, L.; Citon, P.

    The conditioning film developed on glass panels immersed in surface seawater over a period of 24 h was analysed for total organic carbon (OC), total organic nitrogen (ON), and total hydrolyzable amino acid (THAA) concentrations and composition...

  2. Microbial activities and dissolved organic matter dynamics in oil-contaminated surface seawater from the Deepwater Horizon oil spill site.

    Directory of Open Access Journals (Sweden)

    Kai Ziervogel

    Full Text Available The Deepwater Horizon oil spill triggered a complex cascade of microbial responses that reshaped the dynamics of heterotrophic carbon degradation and the turnover of dissolved organic carbon (DOC in oil contaminated waters. Our results from 21-day laboratory incubations in rotating glass bottles (roller bottles demonstrate that microbial dynamics and carbon flux in oil-contaminated surface water sampled near the spill site two weeks after the onset of the blowout were greatly affected by activities of microbes associated with macroscopic oil aggregates. Roller bottles with oil-amended water showed rapid formation of oil aggregates that were similar in size and appearance compared to oil aggregates observed in surface waters near the spill site. Oil aggregates that formed in roller bottles were densely colonized by heterotrophic bacteria, exhibiting high rates of enzymatic activity (lipase hydrolysis indicative of oil degradation. Ambient waters surrounding aggregates also showed enhanced microbial activities not directly associated with primary oil-degradation (β-glucosidase; peptidase, as well as a twofold increase in DOC. Concurrent changes in fluorescence properties of colored dissolved organic matter (CDOM suggest an increase in oil-derived, aromatic hydrocarbons in the DOC pool. Thus our data indicate that oil aggregates mediate, by two distinct mechanisms, the transfer of hydrocarbons to the deep sea: a microbially-derived flux of oil-derived DOC from sinking oil aggregates into the ambient water column, and rapid sedimentation of the oil aggregates themselves, serving as vehicles for oily particulate matter as well as oil aggregate-associated microbial communities.

  3. Nanoporous Carbon Nitride: A High Efficient Filter for Seawater Desalination

    OpenAIRE

    Weifeng LI; Yang, Yanmei; Zhou, Hongcai; Zhang, Xiaoming; Zhao, Mingwen

    2015-01-01

    The low efficiency of commercially-used reverse osmosis (RO) membranes has been the main obstacle in seawater desalination application. Here, we report the auspicious performance, through molecular dynamics simulations, of a seawater desalination filter based on the recently-synthesized graphene-like carbon nitride (g-C2N) [Nat. Commun., 2015, 6, 6486]. Taking advantage of the inherent nanopores and excellent mechanical properties of g-C2N filter, highly efficient seawater desalination can be...

  4. Mathematical analysis of a viscoelastic-gravitational layered earth model for magmatic intrusion in the dynamic case

    Directory of Open Access Journals (Sweden)

    Alicia Arjona

    2015-11-01

    Full Text Available Volcanic areas present a lower effective viscosity than usually in the Earth's crust. It makes necessary to consider inelastic properties in deformation modelling. As a continuation of work done previously by some of the authors, this work is concerned with the proof that the perturbed equations representing the viscoelastic-gravitational displacements resulting from body forces embedded in a layered Earth model leads to a well-posed problem even for any kind of domains, with the natural boundary and transmission conditions. A homogeneous or stratified viscoelastic half-space has often been used as a simple earth model to calculate the displacements and gravity changes. Here we give a constructive proof of the existence of weak solutions and we show the uniqueness and the continuous dependence with respect to the initial data of weak solutions of the dynamic coupled viscoelastic-gravitational field equations.

  5. Progress in Seawater Desalination

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ Scientists from the CAS Changchun Institute of Applied Chemistry have made significant progress in developing advanced expertise of seawater desalination. Their work was recently appraised and confirmed by a panel of experts in northeast China's Jilin Province.

  6. Uranium from seawater

    Energy Technology Data Exchange (ETDEWEB)

    Gregg, D.; Folkendt, M.

    1982-09-21

    A novel process for recovering uranium from seawater is proposed and some of the critical technical parameters are evaluated. The process, in summary, consists of two different options for contacting adsorbant pellets with seawater without pumping the seawater. It is expected that this will reduce the mass handling requirements, compared to pumped seawater systems, by a factor of approximately 10/sup 5/, which should also result in a large reduction in initial capital investment. Activated carbon, possibly in combination with a small amount of dissolved titanium hydroxide, is expected to be the preferred adsorbant material instead of the commonly assumed titanium hydroxide alone. The activated carbon, after exposure to seawater, can be stripped of uranium with an appropriate eluant (probably an acid) or can be burned for its heating value (possible in a power plant) leaving the uranium further enriched in its ash. The uranium, representing about 1% of the ash, is then a rich ore and would be recovered in a conventional manner. Experimental results have indicated that activated carbon, acting alone, is not adequately effective in adsorbing the uranium from seawater. We measured partition coefficients (concentration ratios) of approximately 10/sup 3/ in seawater instead of the reported values of 10/sup 5/. However, preliminary tests carried out in fresh water show considerable promise for an extraction system that uses a combination of dissolved titanium hydroxide (in minute amounts) which forms an insoluble compound with the uranyl ion, and the insoluble compound then being sorbed out on activated carbon. Such a system showed partition coefficients in excess of 10/sup 5/ in fresh water. However, the system was not tested in seawater.

  7. Analysis of transient saltwater intrusion in costal aquifers

    Science.gov (United States)

    Chang, Y.; Yeh, H.

    2009-12-01

    In a costal aquifer, the seawater intrusion is a classic environmental and economical problem in groundwater hydrology. For modeling this phenomenon, the Henry’s formulation was usually adopted to describe the coupled system of flow and transport equations with variable density. However, it is an arduous task to solve such a problem due to the complexity of the coupled governing equations. For practical applicability, the mixed boundary condition which differs from the Dirichlet boundary condition at the coastal side in Henry’s problem is considered in this study. A depth of interface between freshwater and seawater is specified at the coast boundary and the Neumann and Dirichlet conditions are used, respectively, to describe the costal boundary. The perturbation method with a small parameter is used to decouple the groundwater flow and transport equations and derive the solution for the transient saltwater intrusion model. The model will be compared with some results obtained from finite element simulations.

  8. Effects of eustatic sea-level change, ocean dynamics, and iron fertilization on atmospheric pCO2 and seawater composition over the last 130 000 years

    Science.gov (United States)

    Wallmann, K.; Schneider, B.; Sarnthein, M.

    2015-06-01

    We developed and employed an earth system model to explore the forcings of atmospheric pCO2 change and the chemical and isotopic evolution of seawater over the last glacial cycle. Concentrations of dissolved phosphorus, reactive nitrogen, molecular oxygen, dissolved inorganic carbon (DIC), total alkalinity (TA), 13C-DIC and 14C-DIC were calculated for 24 ocean boxes. The bi-directional water fluxes between these model boxes were derived from a 3-D circulation field of the modern ocean (Opa 8.2, NEMO) and tuned such that tracer distributions calculated by the box model were consistent with observational data from the modern ocean. To model the last 130 kyr, we employed records of past changes in sea-level, ocean circulation, and dust deposition. According to the model, about half of the glacial pCO2 drawdown may be attributed to marine regressions. The glacial sea-level low-stands implied steepened ocean margins, a reduced burial of particulate organic carbon, phosphorus, and neritic carbonate at the margin seafloor, a decline in benthic denitrification, and enhanced weathering of emerged shelf sediments. In turn, they led to a distinct rise in the standing stocks of DIC, TA, and nutrients in the global ocean, promoted the glacial sequestration of atmospheric CO2 in the ocean, and added 13C- and 14C-depleted DIC to the ocean as recorded in benthic foraminifera signals. The other half of the glacial drop in pCO2 was linked to reduced deep ocean dynamics, a shoaling of Atlantic meridional overturning circulation, and a rise in iron fertilization. The increased transit time of deep waters in the glacial ocean led to significant 14C depletions with respect to the atmosphere. The deglacial rapid and stepwise rise in atmospheric pCO2 was induced by upwelling both in the Southern Ocean and subarctic North Pacific and promoted by a drop in dust-borne iron discharge to the Southern Ocean. The deglacial sea-level rise led to a gradual decline in nutrient, DIC, and TA stocks

  9. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  10. Cluster based Intrusion Detection System for Manets

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-07-01

    Full Text Available Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. They communicate in dynamic topology which continuously changes as nodes are not stable. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. But still there is some scope of malicious actions. So, Intrusion detection systems are proposed to detect any intruder in the network and its malicious activities. Cluster based intrusion detection system is also designed to restrict the intruders activities in clusters of mobile nodes. In clusters each node run some intrusion detection code to detect local as well as global intrusion. In this paper we have taken insight of intrusion detection systems and different attacks on Manet security. Then we proposed how overhead involved in cluster based intrusion detection system can be reduced.

  11. 基于时间自动机的入侵意图动态识别方法%A Dynamic Intrusive Intention Recognition Method Based on Timed Automata

    Institute of Scientific and Technical Information of China (English)

    彭武; 胡昌振; 姚淑萍; 王志刚

    2011-01-01

    入侵意图识别是在具体的网络环境下,根据攻击者的攻击行为和系统防护措施来推理和判断攻击者想要达到的最终目标.针对网络安全领域中的攻防对抗和动态特性,提出一种入侵意图的动态识别方法.该方法利用D-S证据理论融合入侵检测系统的报警信息来提炼攻击者的行为及其可信度,并结合系统响应信息应用时间自动机来实时描述脆弱性的状态变迁过程.然后在层次化的攻击路径图中,根据节点的状态和节点间的依赖关系计算攻击者真实入侵意图的概率.实验结果验证了此方法的有效性.%Intrusive intention recognition is to reason and determine the ultimate purpose which an attacker wants to achieve according to his attack actions and protection measures in a specific network.In order to deal with the dynamical character of offense-defense confrontation in the network security field, an intrusive intention recognition method based on timed automata is proposed in this paper. At first a hierarchical attack path graph generation method is presented to recognize intrusive intention in order to reduce complexity of understanding and analysis. Then D-S evidence theory is applied to fuse alerts of intrusion detection system to abstract the attacker's actions and compute their confidence.How to describe state transition process of vulnerability under attack actions and system responses is presented with time automata carefully. Next in the hierarchical attack path graph, the algorithm to infer intrusive intention based on the state and dependency relationship of nodes is given. Probabilities of attack intentions are fluctuated with the ongoing intrusive actions and responses using our algorithms. According to these consequences, some recommendations can be proposed to improve the network security situation. Finally several experiments are done in a local network, and the results of the experiments prove the feasibility and

  12. Seawater Acclimation of Spirulina

    Institute of Scientific and Technical Information of China (English)

    Shaochen GUAN; Yixuan LI; Gan WANG; Lang QIN; Yi ZHU; Yunbo LUO

    2012-01-01

    Abstract [Objective] This study aimed to seek the cultivation method for Spirulina with seawater. [Method] Spirulina was habituated culture progressively with pre- pared seawater acclimation solution. The morphological changes of Spirulina were observed and its biochemical indicators were measured. [Result] A new algae species was obtained, which had better stability and greater average length than Spirulina in fresh water. Compared with the Spirulina in fresh water, the new al- gae species showed no significant change in chlorophyll content, but a 62.8% in- crease in the concentration of phycocyanin. [Conclusion] The method could save resources and cost, which lays the foundation for large scale production and processing of Spirulina.

  13. Network intrusion detection

    Institute of Scientific and Technical Information of China (English)

    Oboile Tirelo; YANG Chun-hua

    2003-01-01

    Nowadays, network computer systems play an increasingly important role in society and economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is why the computer security has become an essential concern for network administrators. Too often, intrusions wreak havoc inside LANs and the time and cost to repair the damage can grow to extreme proportions. Instead of using passive measures to fix and patch security holes once they have been exploited, it is more effective to adopt a protective approach to intrusions. In addition to the well-established intrusion prevention techniques such as data encryption and message integrity, user authentication and user authorization, as well as the avoidance of security flaws inherent to many off-the-shelf applications, intrusion detection techniques can be viewed as an addition safeguard for network computers. The paper discusses traditional and new security designs, the approach to implementing best-practice security measures and the method to trace the malicious computer attackers.

  14. Making Artificial Seawater More Natural

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ Marine fish will die if placed in fresh water and they cannot live in simple salt water. Instead, they need water that contains a mixture of different ingredients, as found in natural seawater. Conventional methods of making artificial seawater have shortcomings, because the water so achieved is only composed of mineral elements and lacks organic components similar to those in natural seawater.

  15. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    Science, pages 576–585. Springer Berlin / Heidelberg, June 2010. • Jing Xiao-Pei and Wang Hou -Xiang. “A new immunity intrusion detection model based on...2008. • Hongying Zheng, Meiju Hou , and Yu Wang. “An efficient hybrid clustering-PSO algorithm for anomaly intrusion detection.” Journal of Software...Technology, 2(6):1790– 1799, 2010. [34] Lee, Suchul, Hyunchul Kim, Dhiman Barman, Sungryoul Lee, Chong -kwon Kim, Ted Kwon, and Yanghee Choi. “NeTraMark: a

  16. The effect of seawater concentration on seawater' s microstructure and dynamics%海水浓度的变化对其微观结构和动力学性质的影响

    Institute of Scientific and Technical Information of China (English)

    王晓琳; 韩海波; 郭斌

    2011-01-01

    To enhance the efficiency of a new seawater desalination technique based on rotating coupling electromagnetic theory, and to optimize its parameters and to select the proper electronic and reverse osmosis membranes, we investigate the effects of seawater concentration on the seawater' s microstructure and dynamics by molecular dynamics (MD) simulations in details. The results indicate that with the increment of ion concentration, the ion-ion interaction strengthens, while the ion-water and water-water interactions weaken, resulting in reducing seawater short-range order. The number of the contact ion pairs as well as the solvent separated ones increases. The hydrogen bond network is gradually indistinct, and the self-diffusion coefficient of water molecule decreases. Therefore, the increment of ion concentration is disadvantageous to seawater desalination.%为了提高新型旋转耦合电磁海水淡化技术的效率,优化旋转电磁发生装置的工作参数和选择合适的电子膜与反渗透膜,采用分子动力学模拟方法详细地研究了海水浓度的变化对其微观结构和动力学性质的影响.结果表明:随着离子浓度的增加,离子间相互作用增强,而离子-水分子、水分子-水分子的相互作用强度均减弱,海水的短程有序性降低;接触离子对和桥接离子对均增加;溶液中氢键网络逐渐模糊,水分子的自扩散系数减小.因此,海水浓度增大不利于海水淡化的进行.

  17. Glyphosate persistence in seawater.

    Science.gov (United States)

    Mercurio, Philip; Flores, Florita; Mueller, Jochen F; Carter, Steve; Negri, Andrew P

    2014-08-30

    Glyphosate is one of the most widely applied herbicides globally but its persistence in seawater has not been reported. Here we quantify the biodegradation of glyphosate using standard "simulation" flask tests with native bacterial populations and coastal seawater from the Great Barrier Reef. The half-life for glyphosate at 25 °C in low-light was 47 days, extending to 267 days in the dark at 25 °C and 315 days in the dark at 31 °C, which is the longest persistence reported for this herbicide. AMPA, the microbial transformation product of glyphosate, was detected under all conditions, confirming that degradation was mediated by the native microbial community. This study demonstrates glyphosate is moderately persistent in the marine water under low light conditions and is highly persistent in the dark. Little degradation would be expected during flood plumes in the tropics, which could potentially deliver dissolved and sediment-bound glyphosate far from shore.

  18. A Numerical Model of Seawater Volume and Velocity Dynamic for Marine Currents Power Plant in the Bangka Strait, North Sulawesi, Indonesia

    Science.gov (United States)

    Rompas, P. T. D.; Taunaumang, H.; Sangari, F. J.

    2017-03-01

    One of equipment as prime movers in the marine current power plant is turbine. Marine current turbines require a data of marine currents velocity in its design. The objective of this study was to get the velocities distribution of marine currents in the Bangka strait. The method used survey, observation, and measurement in the Bangka strait. The data of seawater density conducted measurement in the Bangka strait. The data of width and depth of the strait collected from the map of Bangka strait and its depth of the sea. Problem solving of the study used a numerical model. The velocities distribution of marine current obtained from a numerical model in the form of numerical program. The results showed that the velocities distribution at seawater column when low and high tide currents which the maximum happened at 0.1 Sv were 0-0.9 and 0-1.0 m/s respectively, while at 0.3 Sv were 0-2.7 and 0-3.0 m/s respectively. The results will be a product in analyzing the potential kinetic energy that used to design profile of the turbines as prime mover for marine currents power plant in the Bangka strait, North Sulawesi, Indonesia.

  19. SEAWAT model used to evaluate the potential effects of alterations to the hydrologic system on the distribution of salinity in the Biscayne aquifer in Broward County, Florida: U.S. Geological Survey Data Release

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A three-dimensional, variable-density solute-transport model (SEAWAT) was developed to examine causes of saltwater intrusion and predict the effects of future...

  20. Nanoporous Carbon Nitride: A High Efficient Filter for Seawater Desalination

    CERN Document Server

    Li, Weifeng; Zhou, Hongcai; Zhang, Xiaoming; Zhao, Mingwen

    2015-01-01

    The low efficiency of commercially-used reverse osmosis (RO) membranes has been the main obstacle in seawater desalination application. Here, we report the auspicious performance, through molecular dynamics simulations, of a seawater desalination filter based on the recently-synthesized graphene-like carbon nitride (g-C2N) [Nat. Commun., 2015, 6, 6486]. Taking advantage of the inherent nanopores and excellent mechanical properties of g-C2N filter, highly efficient seawater desalination can be achieved by modulating the nanopores under tensile strain. The water permeability can be improved by two orders of magnitude compared to RO membranes, which offers a promising approach to the global water shortage solution.

  1. Wireless Intrusion Prevention Systems

    Directory of Open Access Journals (Sweden)

    Jack TIMOFTE

    2008-01-01

    Full Text Available The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.

  2. Effect of Greenhouse Gases Dissolved in Seawater.

    Science.gov (United States)

    Matsunaga, Shigeki

    2015-12-30

    A molecular dynamics simulation has been performed on the greenhouse gases carbon dioxide and methane dissolved in a sodium chloride aqueous solution, as a simple model of seawater. A carbon dioxide molecule is also treated as a hydrogen carbonate ion. The structure, coordination number, diffusion coefficient, shear viscosity, specific heat, and thermal conductivity of the solutions have been discussed. The anomalous behaviors of these properties, especially the negative pressure dependence of thermal conductivity, have been observed in the higher-pressure region.

  3. Effect of Greenhouse Gases Dissolved in Seawater

    OpenAIRE

    Shigeki Matsunaga

    2015-01-01

    A molecular dynamics simulation has been performed on the greenhouse gases carbon dioxide and methane dissolved in a sodium chloride aqueous solution, as a simple model of seawater. A carbon dioxide molecule is also treated as a hydrogen carbonate ion. The structure, coordination number, diffusion coefficient, shear viscosity, specific heat, and thermal conductivity of the solutions have been discussed. The anomalous behaviors of these properties, especially the negative pressure dependence o...

  4. Refining the Neoproterozoic and Early Paleozoic record of carbon cycling and seawater chemistry using quantitative geochemical models of redox dynamics and carbonate diagenesis

    DEFF Research Database (Denmark)

    Ahm, Anne-Sofie Crüger

    This thesis explores the ancient sedimentary archive of Earth history and examines enigmatic climatic transitions that may have shaped the evolution of animal life. Much of our understanding of the climatic history of Earth is based on chemical and isotopic measurements of ancient sediments. One...... demonstrates that modern weathering processes remobilize reactive Fe in outcrop samples which leads to a loss of specific minerals phases (pyrite) and a gain of others (Fe-oxides). These results highlight the need for caution when using Fe-speciation to catalog past environment redox change from purely outcrop...... through diagenesis and provide more robust estimates for past seawater chemistry. Ancient carbonate rocks with extreme negative carbon isotopes are found worldwide bracketing the Marinoan glaciation (∼635 Ma). There is no scientific consensus as to whether these excursions originate from a primary...

  5. 磨刀门水道盐水强烈上溯规律和动力机制研究%Research of Law and Dynamic Mechanism for Strong Sa-line Water Intrusion in Modaomen Waterway

    Institute of Scientific and Technical Information of China (English)

    包芸; 刘杰斌; 任杰; 许炜铭; 戚志明

    2009-01-01

    通过流体力学场的概念做出磨刀门水道成界图,得到3个月长时间序列的盐水运动上溯距离和潮位的关系,从中发现总是在潮差最小的前后两天盐水上溯有一个突然增加的特点.从2005年初实测资料中整理分析发现,在整个珠江上游径流量较小时,由于分流比的变化,磨刀门水道在小潮期间有两天净泄量几乎为零,从而导致涨落潮的流动状态发生显著变异,涨潮历时为16 h,落潮历时仅为9 h.在此动力作用下盐水快速上溯,随后几天由于小潮期间潮汐动力作用不大,使得盐水滞留在磨刀门水道,直到大潮期间较强的潮汐动力作用将盐水带出,因而造成磨刀门水道异常的盐水上溯规律和严重的咸潮灾害.%Depend on the concept of fluid field, the salinity borderline figure of Modaomen waterway was made, and the relationship between saltwater movement distance and tidal elevation with three months long time series was gotten. The feature that the intrusion strength of saltwater always suddenly increased during the two days before and after time of the smallest tidal range was found. In the analysis of observed data in early 2005, net discharge amount of Modaomen waterway was found to be almost zero during neap tides because of the change of diversion ratio when the small Pearl River runoff, so that the flow state had notable variation that the flood duration had 16 hours and the ebb duration had only 9 hours. Affected by these dynamics, saltwater invaded rapidly. Later a few days during neap tides saltwater remained in Modaomen waterway due to the small tidal dynamic role, until spring tides saltwater was out of Modaomen waterway step by step due to the strong tidal dynamic role. Therefore, the abnormal law of saltwater intrusion was formed and the serious saline intrusion disaster was occurred in the Modaomen waterway.

  6. SEAWAT: A Computer Program for Simulation of Variable-Density Groundwater Flow and Multi-Species Solute and Heat Transport

    Science.gov (United States)

    Langevin, Christian D.

    2009-01-01

    SEAWAT is a MODFLOW-based computer program designed to simulate variable-density groundwater flow coupled with multi-species solute and heat transport. The program has been used for a wide variety of groundwater studies including saltwater intrusion in coastal aquifers, aquifer storage and recovery in brackish limestone aquifers, and brine migration within continental aquifers. SEAWAT is relatively easy to apply because it uses the familiar MODFLOW structure. Thus, most commonly used pre- and post-processors can be used to create datasets and visualize results. SEAWAT is a public domain computer program distributed free of charge by the U.S. Geological Survey.

  7. A Subset Feature Elimination Mechanism for Intrusion Detection System

    OpenAIRE

    Herve Nkiama; Syed Zainudeen Mohd Said; Muhammad Saidu

    2016-01-01

    several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features con...

  8. Experimental and numerical investigation of the effect of basaltic dykes on transient saltwater intrusion

    Science.gov (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, Gerrard

    2015-04-01

    Heterogeneity in porous media is one of the major factors that control mixing zone and saltwater wedge dynamics. Basaltic dykes are natural geological structures that can significantly affect groundwater flow and solute transport in coastal aquifers. Few recent studies have investigated the effects of heterogeneity on the freshwater-saltwater mixing zone. However, most of these studies have focused on steady-state conditions. Furthermore, as per our knowledge no one has so far completed experiments to study the impact of basaltic dykes on transient saltwater intrusion. In this study, we have performed experiments in a laboratory-scale aquifer model to study saltwater intrusion process under different heterogeneous settings; a dyke was set at different locations and several values of thickness and permeability were tested. Using a variable-head groundwater system, a head difference was imposed across the porous media and images of the transient saltwater-wedge were recorded at thirty second intervals. The experimental data sets were simulated using the MODFLOW-family variable density flow code SEAWAT. The results show that under intruding-wedge conditions, the width of the mixing zone is almost two orders of magnitude larger in the presence of the dyke than it is in the homogeneous case, while it is more than ten times larger under receding-wedge conditions. A slight increase of the toe length was observed (around nine percent) in the presence of the dyke under intruding-wedge and receding-wedge conditions. When the permeability of the dyke is further reduced, it acts as an impervious barrier that almost prevents the progression of the saltwater wedge. Thus, saltwater is accumulated along the side boundary, and then forced to drain along the bottom boundary. The results highlight the significant effects of macroscopic variations in aquifer properties (such as volcanic dykes) in the temporal evolution of mixing zone dynamics (widening and narrowing) and the

  9. Experimental modelling of ground deformation associated with shallow magma intrusions

    Science.gov (United States)

    Galland, O.

    2012-04-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this contribution, I will present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored in 3D. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in analyses of ground deformation patterns on volcanoes.

  10. Trace metals pollution in seawater and groundwater in the ship breaking area of Sitakund Upazilla, Chittagong, Bangladesh.

    Science.gov (United States)

    Hasan, Asma Binta; Kabir, Sohail; Selim Reza, A H M; Zaman, Mohammad Nazim; Ahsan, Mohammad Aminul; Akbor, Mohammad Ahedul; Rashid, Mohammad Mamunur

    2013-06-15

    This study reveals potential accumulation of trace metals in the sea and groundwater due to ship breaking activities which take place along the Bay of Bengal in Sitakund Upazilla, Chittagong, Bangladesh. When compared with WHO and Bangladesh domestic standards for water quality, it is revealed that seawater was strongly polluted by Fe and Hg, moderately by Mn and Al, and slightly by Pb and Cd. Groundwater was strongly polluted by Fe, Pb and Hg, moderately by Mn and Al, and slightly by As. Trace element concentrations of all seawater samples exceeded the average concentration of elements in the Earth's seawater. The application of Principal Components Analysis identified two sources of pollution-marine and ship breaking. The mechanism of groundwater pollution inferred that if seawater is polluted, nearby groundwater is also polluted with trace metals due to the influence of seawater intrusion. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Intrusive and Non-Intrusive Instruction in Dynamic Skill Training.

    Science.gov (United States)

    1981-10-01

    Bachrach Environmental Stress Program Center I Dr. Lloyd Hitchcock Naval Medical Research Institute Human Factors Engineering Bethesda, MD 20014 Division...22217 Washington, DC 20350 5 Personnel & Training Research Programs 1 Dr. Alfred F. Smode (Code 458) Training Analysis & Evaluation Group Office of... Alfred R. Fregly Arlington, VA 22217 AFOSR/NL, Bldg. 410] Bolling AFB 1 DR. A.L. SLAFKOSKY Washington, DC 20332 SCIENTIFIC ADVISOR (CODE RD-i) HO

  12. Intrusive growth of sclerenchyma fibers

    NARCIS (Netherlands)

    Snegireva, A.V.; Ageeva, M.V.; Amenitskii, S.I.; Chernova, T.E.; Ebskamp, M.; Gorshkova, T.A.

    2010-01-01

    Intrusive growth is a type of cell elongation when the rate of its longitudinal growth is higher than that of surrounding cells; therefore, these cells intrude between the neighboring cells penetrating the middle lamella. The review considers the classical example of intrusive growth, e.g., elongati

  13. Solvents and vapor intrusion pathways.

    Science.gov (United States)

    Phillips, Scott D; Krieger, Gary R; Palmer, Robert B; Waksman, Javier C

    2004-08-01

    Vapor intrusion must be recognized appropriately as a separate pathway of contamination. Although many issues resemble those of other forms of contamination (particularly its entryway, which is similar to that of radon seepage), vapor intrusion stands apart as a unique risk requiring case-specific action. This article addresses these issues and the current understanding of the most appropriate and successful remedial actions.

  14. A Survey on Intrusion Detection in MANETs.

    Science.gov (United States)

    BakeyaLakshmi, P.; Santhi, K.

    2012-10-01

    A mobile ad hoc network is an infrastructureless network that changes its links dynamically, which makes routing in MANET a difficult process. As Mobile Ad-Hoc Network (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a vital role in the data analysis process. PCA is used to analyze the selected features. This is because, redundant and irrelevant features often reduce performance of the intrusion detection system. It performs better in increasing speed and predictive accuracy. This survey aims to select and analyze the network features using principal component analysis. While performing various experiments, normal and attack states are simulated and the results for the selected features are analyzed.

  15. Iridium in sea-water.

    Science.gov (United States)

    Fresco, J; Weiss, H V; Phillips, R B; Askeland, R A

    1985-08-01

    Iridium in sea-water has been measured (after isolation from the saline matrix by reduction with magnesium) by neutron bombardment, radiochemical purification and high-resolution gamma-ray spectroscopy. The concentration obtained in a Pacific coastal water was 1.02 +/- 0.26 x 10(-14) g per g of sea-water. At such extremely low concentrations, seawater is an extremely unlikely source for anomalously high iridium concentrations measured in the Cretaceous-Tertiary boundary layer of deep-sea sediments.

  16. Iridium in sea-water

    Energy Technology Data Exchange (ETDEWEB)

    Fresco, J.; Weiss, H.V.; Phillips, R.B.; Askeland, R.A.

    1985-08-01

    Iridium in sea-water has been measured (after isolation from the saline matrix by reduction with magnesium) by neutron bombardment, radiochemical purification and high resolution ..gamma..-ray spectroscopy. The concentration obtained in a Pacific coastal water was 1.02 +- 0.26 x 10/sup 14/ g per g of sea-water. At such extremely low concentrations, seawater is an extremely unlikely source for anomalously high iridium concentrations measured in the Cretaceous-Tertiary boundary layer of deep-sea sediments.

  17. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    CERN Document Server

    Farid, Dewan Md; Rahman, Mohammad Zahidur; 10.5121/ijnsa.2010.2202

    2010-01-01

    In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS). We tested the performance of our proposed algorithm with existing learn...

  18. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    Science.gov (United States)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  19. Estimates of ikaite export from sea ice to the underlying seawater in a sea ice-seawater mesocosm

    Science.gov (United States)

    Geilfus, Nicolas-Xavier; Galley, Ryan J.; Else, Brent G. T.; Campbell, Karley; Papakyriakou, Tim; Crabeck, Odile; Lemes, Marcos; Delille, Bruno; Rysgaard, Søren

    2016-09-01

    The precipitation of ikaite and its fate within sea ice is still poorly understood. We quantify temporal inorganic carbon dynamics in sea ice from initial formation to its melt in a sea ice-seawater mesocosm pool from 11 to 29 January 2013. Based on measurements of total alkalinity (TA) and total dissolved inorganic carbon (TCO2), the main processes affecting inorganic carbon dynamics within sea ice were ikaite precipitation and CO2 exchange with the atmosphere. In the underlying seawater, the dissolution of ikaite was the main process affecting inorganic carbon dynamics. Sea ice acted as an active layer, releasing CO2 to the atmosphere during the growth phase, taking up CO2 as it melted and exporting both ikaite and TCO2 into the underlying seawater during the whole experiment. Ikaite precipitation of up to 167 µmol kg-1 within sea ice was estimated, while its export and dissolution into the underlying seawater was responsible for a TA increase of 64-66 µmol kg-1 in the water column. The export of TCO2 from sea ice to the water column increased the underlying seawater TCO2 by 43.5 µmol kg-1, suggesting that almost all of the TCO2 that left the sea ice was exported to the underlying seawater. The export of ikaite from the ice to the underlying seawater was associated with brine rejection during sea ice growth, increased vertical connectivity in sea ice due to the upward percolation of seawater and meltwater flushing during sea ice melt. Based on the change in TA in the water column around the onset of sea ice melt, more than half of the total ikaite precipitated in the ice during sea ice growth was still contained in the ice when the sea ice began to melt. Ikaite crystal dissolution in the water column kept the seawater pCO2 undersaturated with respect to the atmosphere in spite of increased salinity, TA and TCO2 associated with sea ice growth. Results indicate that ikaite export from sea ice and its dissolution in the underlying seawater can potentially hamper

  20. Coastal hypoxia diminished by intrusion of open ocean water after long El Nino Events: Case study of Hong Kong waters

    Science.gov (United States)

    Lui, H. K.; Chen, C. T. A.

    2015-12-01

    Coastal regions suffer from increasing terrestrial inputs of nutrients and organic matter. Consequently, hypoxia (dissolved oxygen (DO) WPS) seawater. For instance, at station SM18 located south of Hong Kong, the summer DO minimum has generally decreased from a saturation state of about 60% to as low as 5% from 1990 to 2013. The almost anoxic condition occurred in 2011 after a La Nina event. On the other hand, the summer DO minimum reached a high value of 79% in 2004 after a long El Nino event. Meanwhile, seawater at the SEATS site also contained the highest proportion of the WPS water, reflecting the large intrusion of the WPS seawater into the SCS. Such a result illustrates a situation that coastal eutrophication and hypoxia could be worsened when the intrusion of open ocean water decreases, and vice versa.

  1. Granitoid intrusions and related deposits

    Institute of Scientific and Technical Information of China (English)

    孟良义; 李绪俊

    1996-01-01

    Taking the Bainaimiao copper and gold deposits, Inner Mongolia and the Wushan copper deposits, Jiangxi Province as examples, a discussion is devoted to the relationship between the granitoid intrusions and related deposits from different lines of evidence: the spatial distribution, country rocks and alteration of the deposits, trace element contents and vertical zoning of elements in deposits, the metallogenic preference of granitoid intrusions, the metallogenic models and stable isotopic geology. It is concluded that the ore-bearing fluids mainly come from granitoid magmas and granitoid intrusions are closely associated with the related deposits in space.

  2. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li Jia-chun; Li Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variations of attack signature. In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  3. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li; Jia-chun; Li; Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variation of attack signature.In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  4. Effect of Greenhouse Gases Dissolved in Seawater

    Directory of Open Access Journals (Sweden)

    Shigeki Matsunaga

    2015-12-01

    Full Text Available A molecular dynamics simulation has been performed on the greenhouse gases carbon dioxide and methane dissolved in a sodium chloride aqueous solution, as a simple model of seawater. A carbon dioxide molecule is also treated as a hydrogen carbonate ion. The structure, coordination number, diffusion coefficient, shear viscosity, specific heat, and thermal conductivity of the solutions have been discussed. The anomalous behaviors of these properties, especially the negative pressure dependence of thermal conductivity, have been observed in the higher-pressure region.

  5. Modeling saltwater intrusion in highly heterogeneous coastal aquifers

    Science.gov (United States)

    Safi, Amir; El-Fadel, Mutasem; Doummar, Joanna; Abou Najm, Majdi; Alameddine, Ibrahim

    2016-04-01

    In this study, a 3D variable-density flow and solute transport model SEAWAT was used to examine the impact of macroscopic variation in a soil matrix on widening or narrowing the thickness of the saltwater-freshwater mixing zone. Located along the Eastern Mediterranean (Beirut), the pilot aquifer consists of karstified limestone of Cretaceous age overlain by Upper Tertiary and Quaternary unconsolidated deposits. The model used the advanced pilot-points parameterization coupled with PEST to characterize spatial heterogeneity. Historically simulated water levels were relied upon to reduce potential numerical instabilities induced by insensitive parameters in transient calibration. The latter demonstrated a high degree of heterogeneity in the middle parts of the aquifer and along western coastlines with specification of a high hydraulic conductivity and low storativity in fault networks. The response of the aquifer to seasonal stresses such as climate cycles, pumping rates and recharge rates was manifested as high fluctuations in potentiometric surface due to potential fast flow pathways along faults. The final distribution of saltwater intrusion supports two mechanisms 1) lateral encroachment of recent seawater into the western zone of the aquifer which is of most concern due to high horizontal hydraulic conductivity in the wave direction and 2) upconing in the northwest and southwest of the aquifer due to large vertical hydraulic conductivities that tend to exacerbate the vertical movement of salinity. Acknowledgments This study is part of a program on climate change and seawater intrusion along the Eastern Mediterranean funded by the International Development Research Center (IDRC) of Canada at the American University of Beirut (AUB). Special thanks are extended to Dr. Charlotte Macalister at IDRC for her support and feedback in implementing this program.

  6. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Dewan Md. Farid

    2010-04-01

    Full Text Available In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposedalgorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS. We tested the performance of our proposed algorithm with existing learning algorithms by employing on the KDD99 benchmark intrusion detection dataset. The experimental results prove that the proposed algorithm achieved high detection rates (DR andsignificant reduce false positives (FP for different types of network intrusions using limited computational resources

  7. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-02-22

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed.

  8. Distributed intrusion detection for mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning

    2008-01-01

    Mobile ad hoc networking(MANET)has become an exciting and important technology in recent years,because of the rapid proliferation of wireless devices.Mobile ad hoc networks is highly vulnerable to attacks due to the open medium,dynamically changing network topology,cooperative algorithms,and lack of centralized monitoring and management point.The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features.A distributed intrusion detection approach based on timed automata is given.A cluster-based detection scheme is presented,where periodically a node is elected as the monitor node for a cluster.These monitor nodes can not only make local intrusion detection decisions,but also cooperatively take part in global intrusion detection.And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing(DSR).The monitor nodes can verify the behaviour of every nodes by timed automata,and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent,the approach is much more efficient while maintaining the same level of effectiveness.Finally,the intrusion detection method is evaluated through simulation experiments.

  9. Assessing impacts of climate change, sea level rise, and drainage canals on saltwater intrusion to coastal aquifer

    Directory of Open Access Journals (Sweden)

    P. Rasmussen

    2013-01-01

    Full Text Available Groundwater abstraction from coastal aquifers is vulnerable to climate change and sea level rise because both may potentially impact saltwater intrusion and hence groundwater quality depending on the hydrogeological setting. In the present study the impacts of sea level rise and changes in groundwater recharge are quantified for an island located in the Western Baltic Sea. The low-lying central area of the investigated part of the island was extensively drained and reclaimed during the second half of the 19th century by a system of artificial drainage canals that significantly affects the flow dynamics of the area. The drinking water, mainly for summer cottages, is abstracted from 11 wells drilled to a depth of around 20 m into the upper 5–10 m of a confined chalk aquifer, and the total pumping is only 5–6% of the drainage pumping. Increasing chloride concentrations have been observed in several abstraction wells and in some cases the WHO drinking water standard has been exceeded. Using the modeling package MODFLOW/MT3D/SEAWAT the historical, present and future freshwater-sea water distribution is simulated. The model is calibrated against hydraulic head observations and validated against geochemical and geophysical data from new investigation wells, including borehole logs, and from an airborne transient electromagnetic survey. The impact of climate changes on saltwater intrusion is found to be sensitive to the boundary conditions of the investigated system. For the flux-controlled aquifer to the west of the drained area only changes in groundwater recharge impacts the freshwater–sea water interface whereas sea level rise does not result in increasing sea water intrusion. However, on the barrier islands to the east of the reclaimed area, below which the sea is hydraulically connected to the drainage canals, and the boundary of the flow system therefore controlled, the projected changes in sea level, groundwater recharge and stage of the

  10. Faraday's Law and Seawater Motion

    Science.gov (United States)

    De Luca, R.

    2010-01-01

    Using Faraday's law, one can illustrate how an electromotive force generator, directly utilizing seawater motion, works. The conceptual device proposed is rather simple in its components and can be built in any high school or college laboratory. The description of the way in which the device generates an electromotive force can be instructive not…

  11. Geophysical characterization of saltwater intrusion in a coastal aquifer: The case of Martil-Alila plain (North Morocco)

    Science.gov (United States)

    Himi, Mahjoub; Tapias, Josefiina; Benabdelouahab, Sara; Salhi, Adil; Rivero, Luis; Elgettafi, Mohamed; El Mandour, Abdenabi; Stitou, Jamal; Casas, Albert

    2017-02-01

    Several factors can affect the quantity and the quality of groundwater resources, but in coastal aquifers seawater intrusion is often the most significant issue regarding freshwater supply. Further, saltwater intrusion is a worldwide issue because about seventy percent of the world's population lives in coastal regions. Generally, fresh groundwater not affected by saltwater intrusion is characterized by low salinity and therefore low electrical conductivity (EC) values. Consequently, high values of EC in groundwater along the coastline are usually associated to seawater intrusion. This effect is amplified if the coastal aquifer is overexploited with a subsequent gradual displacement of the freshwater-saltwater interface towards the continent. Delineation of marine intrusion in coastal aquifers has traditionally relied upon observation wells and collection of water samples. This approach may miss important hydrologic features related to saltwater intrusion in areas where access is difficult and where wells are widely spaced. Consequently, the scarcity of sampling points and sometimes their total absence makes the number of data available limited and most of the time not representative for mapping the spatial and temporal variability of groundwater salinity. In this study, we use a series of geophysical methods for characterizing the aquifer geometry and the extension of saltwater intrusion in the Martil-Alila coastal region (Morocco) as a complement to geological and hydrogeochemical data. For this reason, we carried out three geophysical surveys: Gravity, Electrical Resistivity and Frequency Domain Electromagnetic. The geometry of the basin has been determined from the interpretation of a detailed gravity survey. Electrical resistivity models derived from vertical electrical soundings allowed to characterize the vertical and the lateral extensions of aquifer formations. Finally, frequency domain electromagnetic methods allowed delineating the extension of the

  12. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  13. Intrusion Detection using unsupervised learning

    Directory of Open Access Journals (Sweden)

    Kusum bharti

    2010-08-01

    Full Text Available Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge datasets. But sometime kmean clustering fails to give best result because of class dominance problem and no class problem. So for removing these problems we are proposing two new algorithms for cluster to class assignment. According to our experimental results the proposed algorithm are having high precision and recall for low class instances.

  14. Building Intrusion Tolerant Software System

    Institute of Scientific and Technical Information of China (English)

    PENG Wen-ling; WANG Li-na; ZHANG Huan-guo; CHEN Wei

    2005-01-01

    In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in constructing multilevel secure software architecture, by detecting with hash value, by placing an "antigen" word next to the return address on the stack that is similar to human immune system, and by adding "Honey code" nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.

  15. Distributed intrusion detection system based on fuzzy rules

    Science.gov (United States)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  16. Research of Intrusion Detection Technology and its Formal Modeling

    Directory of Open Access Journals (Sweden)

    PENG Yali

    2009-10-01

    Full Text Available The intrusion detection technology is one of the most important dynamic security technologies, which can be used in the critical security system construction and the basic service protection. Apparently, applying formal specification to the procedure of developing an intrusion detection system can fulfill their security requirement and win the confidence of users of the secured systems. Taking a DDoS intrusion detection system as an example, we establish integrity sub-regular database through analyzing the default characteristics and universal characteristics in communication of DDoS attack, which can guarantee fast and effective detection in each appeared DDoS attack. At the same time, we use the association rules mining algorithm mine new rules and their association pattern to detect the unknown attack, and illustrate how Z can be used to specify and model the security-critical systems.

  17. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  18. A software tool for network intrusion detection

    CSIR Research Space (South Africa)

    Van der Walt, C

    2012-10-01

    Full Text Available This presentation illustrates how a recently developed software tool enables operators to easily monitor a network and detect intrusions without requiring expert knowledge of network intrusion detections....

  19. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system. Th

  20. Final OSWER Vapor Intrusion Guidance

    Science.gov (United States)

    EPA is preparing to finalize its guidance on assessing and addressing vapor intrusion, which is defined as migration of volatile constituents from contaminated media in the subsurface (soil or groundwater) into the indoor environment. In November 2002, EPA issued draft guidance o...

  1. Experiences with network intrusion detection

    NARCIS (Netherlands)

    Coolen, R.; Luiijf, H.A.M.; Geloven, W.J.F. van; Bakker, E.A.

    2002-01-01

    This paper describes our experience with several commercial Network Intrusion Detection Systems (NIDSs)deployed in a network connected to the Internet. Specific problems in the operation of NIDS are highlighted, and a number of solutions to identified problems will be presented. Finally, we shall pr

  2. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O;

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  3. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    Science.gov (United States)

    Galley, Alan G.

    2003-06-01

    trondhjemite phases. The trondhjemite phases contain numerous internal contacts indicating emplacement as composite sills. Common structural features of the composite intrusions include early xenolith phases, abundant small comagmatic dikes, fractures and veins and, in places, columnar jointing. Internal phases may differ greatly in texture from fine- to coarse-grained, aphyric and granophyric through seriate to porphyritic. Mineralogical and isotopic evidence indicates that early phases of each composite intrusion are affected by pervasive to fracture-controlled high-temperature (350-450 °C) alteration reflecting seawater-rock interaction. Trondhjemite phases contain hydrothermal-magmatic alteration assemblages within miarolitic cavities, hydrothermal breccias and veins. This hydrothermal-magmatic alteration may, in part, be inherited from previously altered wall rocks. Two of the four intrusions are host to Cu-Mo-rich intrusive breccias and porphyry-type mineralization which formed as much as 14 Ma after the main subvolcanic magmatic activity. The recognition of these Precambrian, subvolcanic composite intrusions is important for greenfields VMS exploration, as they define the location of thermal corridors within extensional oceanic-arc regimes which have the greatest potential for significant VMS mineralization. The VMS mineralization may occur for 2,000 m above the intrusions. In some cases, VMS mineralization has been truncated or enveloped by late trondhjemite phases of the composite intrusions. Evidence that much of the trondhjemitic magmatism postdates the principal VMS activity is a critical factor when developing heat and fluid flow models for these subseafloor magmatic-hydrothermal systems.

  4. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Science.gov (United States)

    Trickl, Thomas; Vogelmann, Hannes; Fix, Andreas; Schäfler, Andreas; Wirth, Martin; Calpini, Bertrand; Levrat, Gilbert; Romanens, Gonzague; Apituley, Arnoud; Wilson, Keith M.; Begbie, Robert; Reichardt, Jens; Vömel, Holger; Sprenger, Michael

    2016-07-01

    A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison). The measurements were carried out at four observational sites: Payerne (Switzerland), Bilthoven (the Netherlands), Lindenberg (north-eastern Germany), and the Zugspitze mountain (Garmisch-Partenkichen, German Alps), and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg). The dryness hardens the findings of a preceding study ("Part 1", Trickl et al., 2014) that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in "Part 1" from the Zugspitze CO observations. The trajectories qualitatively explain

  5. Effects of eustatic sea-level change, ocean dynamics, and nutrient utilization on atmospheric pCO2 and seawater composition over the last 130 000 years: a model study

    Science.gov (United States)

    Wallmann, K.; Schneider, B.; Sarnthein, M.

    2016-02-01

    We have developed and employed an Earth system model to explore the forcings of atmospheric pCO2 change and the chemical and isotopic evolution of seawater over the last glacial cycle. Concentrations of dissolved phosphorus (DP), reactive nitrogen, molecular oxygen, dissolved inorganic carbon (DIC), total alkalinity (TA), 13C-DIC, and 14C-DIC were calculated for 24 ocean boxes. The bi-directional water fluxes between these model boxes were derived from a 3-D circulation field of the modern ocean (Opa 8.2, NEMO) and tuned such that tracer distributions calculated by the box model were consistent with observational data from the modern ocean. To model the last 130 kyr, we employed records of past changes in sea-level, ocean circulation, and dust deposition. According to the model, about half of the glacial pCO2 drawdown may be attributed to marine regressions. The glacial sea-level low-stands implied steepened ocean margins, a reduced burial of particulate organic carbon, phosphorus, and neritic carbonate at the margin seafloor, a decline in benthic denitrification, and enhanced weathering of emerged shelf sediments. In turn, low-stands led to a distinct rise in the standing stocks of DIC, TA, and nutrients in the global ocean, promoted the glacial sequestration of atmospheric CO2 in the ocean, and added 13C- and 14C-depleted DIC to the ocean as recorded in benthic foraminifera signals. The other half of the glacial drop in pCO2 was linked to inferred shoaling of Atlantic meridional overturning circulation and more efficient utilization of nutrients in the Southern Ocean. The diminished ventilation of deep water in the glacial Atlantic and Southern Ocean led to significant 14C depletions with respect to the atmosphere. According to our model, the deglacial rapid and stepwise rise in atmospheric pCO2 was induced by upwelling both in the Southern Ocean and subarctic North Pacific and promoted by a drop in nutrient utilization in the Southern Ocean. The deglacial sea

  6. Zircon Recycling in Arc Intrusions

    Science.gov (United States)

    Miller, J.; Barth, A.; Matzel, J.; Wooden, J.; Burgess, S.

    2008-12-01

    Recycling of zircon has been well established in arc intrusions and arc volcanoes, but a better understanding of where and how zircons are recycled can help illuminate how arc magma systems are constructed. To that end, we are conducting age, trace element (including Ti-in-zircon temperatures; TzrnTi) and isotopic studies of zircons from the Late Cretaceous (95-85 Ma) Tuolumne Intrusive Suite (TIS) in the Sierra Nevada Batholith (CA). Within the TIS zircons inherited from ancient basement sources and/or distinctly older host rocks are uncommon, but recycled zircon antecrysts from earlier periods of TIS-related magmatism are common and conspicuous in the inner and two most voluminous units of the TIS, the Half Dome and Cathedral Peak Granodiorites. All TIS units have low bulk Zr ([Zr]825°C), [Zr] in the TIS is a factor of 2 to 3 lower than saturation values. Low [Zr] in TIS rocks might be attributed to a very limited supply of zircon in the source, by disequilibrium melting and rapid melt extraction [1], by melting reactions involving formation of other phases that can incorporate appreciable Zr [2], or by removal of zircon at an earlier stage of magma evolution. Based on a preliminary compilation of literature data, low [Zr] is common to Late Cretaceous N.A. Cordilleran granodioritic/tonalitic intrusions (typically Tzrnsat [3]. A corollary is that slightly older zircon antecrysts that are common in the inner units of the TIS could be considered inherited if they are derived from remelting of slightly older intrusions. Remelting at such low temperatures in the arc would require a source of external water. Refs: [1] Sawyer, J.Pet 32:701-738; [2] Fraser et al, Geology 25:607-610; [3] Harrison et al, Geology 35:635- 638

  7. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  8. Petrology and oxygen isotope geochemistry of a fossil seawater hydrothermal system within the Solea graben, northern Troodos ophiolite, Cyprus

    Science.gov (United States)

    Schiffman, Peter; Smith, Brian M.

    1988-05-01

    Hydrothermal mineral zonations and O isotope patterns of the northern Troodos complex do not parallel the ophiolite pseudostratigraphy, but reflect the convective geometry of an Upper Cretaceous seawater hydrothermal system. Large areas of the sheeted intrusive complex (SIC), including the subaxial region of the Solea graben, are composed of 18O-rich, subgreenschist mineral assemblages and may represent regions of diffuse seawater recharge. Other areas of the SIC are recrystallized to distinctive epidosite rocks: granular, high-variance assemblages of epidote + quartz ± chlorite that are depleted in 18O, Al2O3, Na2O, K2O, Zr, Cu, and Zn and are enriched in CaO and Sr compared with other mafic volcanic and dike rocks of the Solea graben. Epidosite alteration occurred at temperatures of ˜310-370°C and involved fluids with δ18O values and salinities similar to those of Upper Cretaceous seawater. The epidosite zones are discordant with earlier, mineral/O isotope zonations and with the axis of spreading in the Solea graben, suggesting a postspreading, off-axis origin. The seawater hydrothermal system responsible for Solea graben massive sulfide deposits was probably driven by hypabyssal intrusions (not exposed), emplaced in a terminal, failed spreading episode. The geometries of O isotope surfaces within the Solea graben imply that the epidosites formed in fossil upflow and deep recharge conduits. Depletions in base metals show that epidosite alteration liberated Cu and Zn to mineralizing fluids within the fossil upflow zone.

  9. Three-dimensional hydrostratigraphical modelling to support evaluation of recharge and saltwater intrusion in a coastal groundwater system in Vietnam

    Science.gov (United States)

    Tam, Vu Thanh; Batelaan, Okke; Le, Tran Thanh; Nhan, Pham Quy

    2014-12-01

    Saltwater intrusion is generally related to seawater-level rise or induced intrusion due to excessive groundwater extraction in coastal aquifers. However, the hydrogeological heterogeneity of the subsurface plays an important role in (non-)intrusion as well. Local hydrogeological conditions for recharge and saltwater intrusion are studied in a coastal groundwater system in Vietnam where geological formations exhibit highly heterogeneous lithologies. A three-dimensional (3D) hydrostratigraphical solid model of the study area is constructed by way of a recursive classification procedure. The procedure includes a cluster analysis which uses as parameters geological formation, lithological composition, distribution depth and thickness of each lithologically distinctive drilling interval of 47 boreholes, to distinguish and map well-log intervals of similar lithological properties in different geological formations. A 3D hydrostratigraphical fence diagram is then generated from the constructed solid model and is used as a tool to evaluate recharge paths and saltwater intrusion to the groundwater system. Groundwater level and chemistry, and geophysical direct current (DC) resistivity measurements, are used to support the hydrostratigraphical model. Results of this research contribute to the explanation of why the aquifer system of the study area is almost uninfluenced by saltwater intrusion, which is otherwise relatively common in coastal aquifers of Vietnam.

  10. Seawater intrusion and behaviour of dissolved boron, fluoride, calcium, magnesium and nutrients in Vashisti Estuary

    Digital Repository Service at National Institute of Oceanography (India)

    Zingde, M.D; Ram, A.; Sharma, P.; Abidi, S.A.H.

    Behaviour of dissolved B, F, Ca, Mg and nutrients in partially stratified estuary of Vashiti River, Karnataka, India has been studied under stable conditions of riverine flow. The dominance of Mg over Ca concentration in river water resulted...

  11. A Novel Approach For Protecting Exposed Intranet From Intrusions

    Directory of Open Access Journals (Sweden)

    K.B.Chandradeep

    2010-07-01

    Full Text Available This paper proposes a novel approach for protecting groups of computers in an intranet from maliciousattacks. The proposed scheme uses a distributed intrusion detection system as the primary source ofsecurity mechanism along with micro-firewalls at the host level to enable dynamic policy update for theintranet as and when the threat pattern changes. The authentication mechanism used for authenticatingthe hosts along with the communication mechanism used for communicating the policy update to thehosts is presented.

  12. Classification and Importance of Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Rajasekaran K

    2012-08-01

    Full Text Available An intrusion detection system (IDS is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Due to a growing number of intrusion events and also because the Internet and local networks have become so ubiquitous, organizations are increasingly implementing various systems that monitor IT security breaches. This includes an overview of the classification of intrusion detection systems and introduces the reader to some fundamental concepts of IDS methodology: audit trail analysis and on-the-fly processing as well as anomaly detection and signature detection approaches. This research paper discusses the primary intrusion detection techniques and the classification of intrusion Detection system.

  13. CONTAMINATION OF GROUNDWATER IN SRIKAKULAM COASTAL BELT DUE TO SALT WATER INTRUSION

    Directory of Open Access Journals (Sweden)

    S. Chandra Mouli

    2011-02-01

    Full Text Available Many urban centers of the country are located on the coastal tract apart from thousands of villages and industrial settlements. Water resources in coastal areas assume a special significance since anydevelopmental activity will largely depend upon availability of fresh water to meet domestic, industrial and agricultural requirements.Thisincreases the dependency upon groundwater for meeting the freshwater demand. As the region is close to the coast, the variations in the levels of water table due to excess withdrawals from wells and bore wells will cause the intrusion of seawater into the groundwater. In the present paper deals with the study of saltwater intrusion in the coastal tract of Srikakulam district, on an areal basis. From the results obtained the variation in the effect of contamination with respect to distance from shore is studied and a comparison of the contamination in open wells and bore wells is also carried out.

  14. Association Rules Applied to Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user's behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance.

  15. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    Pabitra Nath

    2010-04-01

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index of the medium affects the reflectance of the incident light signal and thus modulates the back-reflected signal. Refractive index variation as small as 0.002 RIU can be measured using the present technique. The advantages of the technique are its simplicity, cost efficiency and usefulness in monitoring refractive indices of acidic solutions.

  16. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  17. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country.

  18. Primary biodegradation of petroleum hydrocarbons in seawater

    Energy Technology Data Exchange (ETDEWEB)

    Comber, M.I.H.; Den Haan, K.H.; Djemel, N.; Eadsforth, C.V.; King, D.; Paumen, M.L.; Parkerton, T.; Dmytrasz, B.

    2012-12-15

    This report describes primary biodegradation experiments performed to determine the persistence of higher molecular weight petroleum hydrocarbons in seawater. Results from the biodegradation experiments show that the majority of tested petroleum hydrocarbons have half-lives in seawater less than 60 days.

  19. A quantitative investigation on sea water intrusions and its related remediation strategy in the Penghu Island, Taiwan

    Science.gov (United States)

    Lee, Jhe-Wei; Chou, Ssu-Yu; Lo, Wei-Cheng

    2017-04-01

    Penghu islands is one of Taiwan's three major volcanic group, with basalt from cooled lava forming major rocks of each island. This research was undertaken to investigate the current stage of groundwater hydrology, usage, and salinization in Penghu. We evaluated, in qualitative and quantitative manners, the potential causes of groundwater salinization based on our test results, which provides useful information to build the geological model for numerical studies in Penghu. We applied MODFLOW and its sub-mode MT3DMS to simulate the groundwater level and seawater intrusion in Penghu, and proposed the remediation strategy for groundwater resource protection. According to the information collected as well as the results obtained, there are three issues of groundwater salinization that should be well addressed in Penghu. The first is to characterize the mechanism of groundwater salinization in confine and unconfined aquifers, respectively; the second is to identify the attribute of groundwater salinization; the third is to delineate the spatial distribution of the groundwater control zone and the area of groundwater salinization. These issues were solved through two different aspects in this research: field investigation and groundwater modeling. In the field investigation, we sampled 15 wells three times to examine groundwater quality. Our analysis indicated that the potential causes for groundwater salinization can be essentially categorized into three parts: (1) seawater intrusion, (2) the existence of residual ancient brine water, and (3) the calcium ion and magnesium ion released from stratum. To obtain better understanding of the interchange between rain and groundwater, we also performed hydrogen and oxygen isotopic analysis additionally, which is beneficial to assess the recharge source of the groundwater subarea. In reference to remediation strategy, recharge into aquifer is not recommended since there is no sufficient surface water storage, and therefore a

  20. Automated nutrient analyses in seawater

    Energy Technology Data Exchange (ETDEWEB)

    Whitledge, T.E.; Malloy, S.C.; Patton, C.J.; Wirick, C.D.

    1981-02-01

    This manual was assembled for use as a guide for analyzing the nutrient content of seawater samples collected in the marine coastal zone of the Northeast United States and the Bering Sea. Some modifications (changes in dilution or sample pump tube sizes) may be necessary to achieve optimum measurements in very pronounced oligotrophic, eutrophic or brackish areas. Information is presented under the following section headings: theory and mechanics of automated analysis; continuous flow system description; operation of autoanalyzer system; cookbook of current nutrient methods; automated analyzer and data analysis software; computer interfacing and hardware modifications; and trouble shooting. The three appendixes are entitled: references and additional reading; manifold components and chemicals; and software listings. (JGB)

  1. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  2. Numerical and physical modeling of cutoff walls against saltwater intrusion

    Science.gov (United States)

    Crestani, Elena; Camporese, Matteo; Salandin, Paolo

    2017-04-01

    Seawater intrusion is a relevant problem for many communities living in small islands, where the amount of fresh water available for human consumption depends on the delicate equilibrium between the natural groundwater recharge from rainfall and the surrounding sea. However, it can represent a significant issue also for coastal regions where groundwater is extracted for water supply: an excessive extraction to meet growing demands for drinking water and irrigation purposes leads to a decrease of seaward flows of fresh water and consequently to an increase of seawater intrusion into coastal aquifers. Cutoff walls represent one of the possible strategies that can be adopted to reduce seawater intrusion into coastal aquifers and to limit the inland progression of the saltwater wedge. In this study, on the basis of several preliminary simulations developed by the SUTRA code, a cutoff wall occluding 70% of the aquifer depth is designed for a physical experiment, whose setup details are reported as follows. The physical model represents the terminal part of a coastal aquifer and consists of a flume 500 cm long, 30 cm wide and 60 cm high, filled for an height of 49 cm with glass beads with a d50 of 0.6 mm and a uniformity coefficient d60/d10 1.5. The resulting porous medium is homogeneous, with porosity of about 0.37 and hydraulic conductivity of about 1.3 10-3 m/s. Upstream from the sandbox, a tank filled by freshwater provides recharge for the aquifer. The downstream tank simulates the sea and red food dye is added to the saltwater to easily visualize the salt wedge. The volume of the downstream tank is about five times the upstream one, and, due to the small filtration discharge, minimizing salt concentration variations due to the incoming freshwater flow. The hydraulic gradient during the tests is constant, due to the fixed water level in the tanks. Water levels and discharged flow rate are continuously monitored. The cutoff wall was realized with sodium bentonite

  3. Vapour Intrusion into Buildings - A Literature Review

    Science.gov (United States)

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  4. Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting

    CERN Document Server

    Tran, Tich Phuoc; Tran, Dat; Nguyen, Cuong Duc

    2009-01-01

    This article applies Machine Learning techniques to solve Intrusion Detection problems within computer networks. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and high number of false alarms. To overcome such performance limitations, we propose a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), which integrates an adaptive boosting technique and a semi parametric neural network to obtain good tradeoff between accuracy and generality. As the result, learning bias and generalization variance can be significantly minimized. Substantial experiments on KDD 99 intrusion benchmark indicate that our model outperforms other state of the art learning algorithms, with significantly improved detection accuracy, minimal false alarms and relatively small computational complexity.

  5. Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining

    Directory of Open Access Journals (Sweden)

    Syurahbil

    2009-01-01

    Full Text Available Problem statement: To distinguish the activities of the network traffic that the intrusion and normal is very difficult and to need much time consuming. An analyst must review all the data that large and wide to find the sequence of intrusion on the network connection. Therefore, it needs a way that can detect network intrusion to reflect the current network traffics. Approach: In this study, a novel method to find intrusion characteristic for IDS using decision tree machine learning of data mining technique was proposed. Method used to generate of rules is classification by ID3 algorithm of decision tree. Results: These rules can determine of intrusion characteristics then to implement in the firewall policy rules as prevention. Conclusion: Combination of IDS and firewall so-called the IPS, so that besides detecting the existence of intrusion also can execute by doing deny of intrusion as prevention.

  6. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  7. A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Deepa Guleria

    2012-07-01

    Full Text Available Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and high number of false alarms. An intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper we study the Machine Learning and data mining techniques to solve Intrusion Detection problems within computer networks and compare the various approaches with conditional random fields and address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach.

  8. The Geologic History of Seawater

    Science.gov (United States)

    Holland, H. D.

    2003-12-01

    Aristotle proposed that the saltness of the sea was due to the effect of sunlight on water. Robert Boyle took strong exception to this view and - in the manner of the Royal Society - laid out a program of research in the opening paragraph of his Observations and Experiments about the Saltness of the Sea (1674) (Figure 1): (20K)Figure 1. Title page of Robert Boyle's Tracts consisting of Observations about the Saltness of the Sea and other essays (1674). The Cause of the Saltness of the Sea appears by Aristotle's Writings to have busied the Curiosity of Naturalists before his time; since which, his Authority, perhaps much more than his Reasons, did for divers Ages make the Schools and the generality of Naturalists of his Opinion, till towards the end of the last Century, and the beginning of ours, some Learned Men took the boldness to question the common Opinion; since when the Controversie has been kept on foot, and, for ought I know, will be so, as long as ‘tis argued on both sides but by Dialectical Arguments, which may be probable on both sides, but are not convincing on either. Wherefore I shall here briefly deliver some particulars about the Saltness of the Sea, obtained by my own trials, where I was able; and where I was not, by the best Relations I could procure, especially from Navigators.Boyle measured and compiled a considerable set of data for variations in the saltness of surface seawater. He also designed an improved piece of equipment for sampling seawater at depth, but the depths at which it was used were modest: 30 m with his own instrument, 80 m with another, similar sampler. However, the younger John Winthrop (1606-1676), an early member of the Royal Society, an important Governor of Connecticut, and a benefactor of Harvard College, was asked to collect seawater from the bottom of the Atlantic Ocean during his crossing from England to New England in the spring of 1663. The minutes of the Royal Society's meeting on July 20, 1663, give the

  9. Seawater circulating system in an aquaculture laboratory

    Digital Repository Service at National Institute of Oceanography (India)

    Chatterji, A.; Ingole, B.S.; Parulekar, A.H.

    The note gives an account, for the first time in India, of an Aquaculture Laboratory with open type seawater circulating system developed at the National Institute of Oceanography, Goa, India. Besides describing the details of the system...

  10. Seawater carbonate chemistry, Kahekili, west Maui

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Time-series of seawater carbonate chemistry variables, including salinity, dissolved inorganic nutrients, pH, total alkalinity, and dissolved inorganic carbon from...

  11. Experimental studies on urea degradation in seawater

    Digital Repository Service at National Institute of Oceanography (India)

    Rajendran, A.; Joseph, T.; Reddy, C.V.G.

    The rate of urea degradation in seawater was studied under various conditions and the kinetics of urea degradation was evaluated. Urea decomposition experiments showed that the rates and quantity of ammonium oxidation were slower in the relatively...

  12. Long-Term Viscoelastic Response of E-glass/Bismaleimide Composite in Seawater Environment

    Science.gov (United States)

    Yian, Zhao; Zhiying, Wang; Keey, Seah Leong; Boay, Chai Gin

    2015-12-01

    The effect of seawater absorption on the long-term viscoelastic response of E-glass/BMI composite is presented in this paper. The diffusion of seawater into the composite shows a two-stage behavior, dominated by Fickian diffusion initially and followed by polymeric relaxation. The Glass transition temperature (Tg) of the composite with seawater absorption is considerably lowered due to the plasticization effect. However the effect of water absorption at 50 °C is found to be reversible after drying process. The time-temperature superposition (TTS) was performed based on the results of Dynamic Mechanical Analysis to construct the master curve of storage modulus. The shift factors exhibit Arrhenius behavior when temperature is well below Tg and Vogel-Fulcher-Tammann (VFT) like behavior when temperature gets close to glass transition region. As a result, a semi-empirical formulation is proposed to account for the seawater absorption effect in predicting long-term viscoelastic response of BMI composites based on temperature dependent storage modulus and TTS. The predicted master curves show that the degradation of storage modulus accelerates with both seawater exposure and increasing temperature. The proposed formulation can be applied to predict the long-term durability of any thermorheologically simple composite materials in seawater environment.

  13. Leaching Characteristics of Lithium Adsorbents in Seawater and its Implication of Marine Environmental Impacts

    Science.gov (United States)

    Yoon, H. O.; Kim, J. A.; Jeong, S.; Chung, K. S.; Ryu, J. H.

    2016-12-01

    The lithium-manganese oxide adsorbent material have been developed by KIGAM (Korea Institute of Geoscience and Mineral Resources) to recovery the lithium from seawater and pilot plant was conducted in Okgye Harbor, Gangneung, Korea. There is the possibility of release toxic substances to marine environments from lithium recovery adsorbents during the operation of lithium recovery process on the marine station. Therefore, the changes in marine environmental impact should be predicted to assure marine environmental integrity for application of lithium recovery adsorbents in real sea. In this study, the batch-scale experiments was conducted using natural seawater (NSW) and artificial seawater (ASW) to determine the leaching characteristics of lithium recovery adsorbents. Solid-liquid ratio was determine by considering the unit area of exposing lithium recovery adsorbents in pilot plant, NSW and ASW were exchanged every two days for 14 days to simulate the real marine environment. After agitating with 30 rpm to simulate water movement under 10 and 25°C (average seawater temperature in winter and summer in Okgye Harbor, respectively), dynamic leached substances (heavy metals) and their leaching rate were determined. This study provides the practical design factors, maximum dose of lithium recovery adsorbents, duration, and frequency, for lithium recovery from seawater based on marine environmental risk. Acknowledgments: This research was supported by the national research project titled "The Development of Technology for Extraction of Resources Dissolved in Seawater" of the Korea Institute of Geoscience and Mineral Resources (KIGAM) funded by the Ministry of Ocean and Fisheries.

  14. Surfactant induced complex formation and their effects on the interfacial properties of seawater.

    Science.gov (United States)

    Guzmán, Eduardo; Santini, Eva; Benedetti, Alessandro; Ravera, Francesca; Ferrari, Michele; Liggieri, Libero

    2014-11-01

    The effect of a cationic surfactant, hexadecyltrimethylammonium bromide (CTAB), on the interfacial properties of seawater has been studied by dynamic and equilibrium surface tension and by dilational rheology essays. Important modifications of the surface tension and dilational rheology response have been observed already at the very low CTAB concentrations, where the effects due to the high ionic strength are negligible. The comparison with the effects of CTAB in different seawater models, or in natural seawater fractions, points out the establishment of strong interactions between the surfactant molecules and the lipophilic fraction of organic material dispersed/dissolved in seawater, affecting the interfacial activity of the molecules. Considering the biochemical richness of seawater, these results can be explained assuming interaction mechanisms and adsorption schemes similar to those speculated for protein and other macromolecules in the presence of surfactants, which in fact show similar features. Thus already at the low concentrations the surfactant molecules form highly surface-active complexes with part of the organic fraction of seawater. At the larger surfactant concentrations these complexes compete for adsorption with an excess of free CTAB molecules which, according to the thermodynamic conditions, are most favoured to occupy the liquid interface. The results of this study underline the important role of the sea organic content in enhancing the surface-activity of surfactants, which is relevant for a deeper understand of the direct and indirect effects of these types of pollutants on the physico-chemical environment in the sea coastal areas and develop mitigation strategies.

  15. Insights into saline intrusion and freshwater resources in coastal karstic aquifers using a lumped Rainfall-Discharge-Salinity model (the Port-Miou brackish spring, SE France)

    Science.gov (United States)

    Arfib, Bruno; Charlier, Jean-Baptiste

    2016-09-01

    The aim of this study was to develop a conceptual model of saline intrusion within coastal karst aquifers by analyzing Rainfall-Discharge-Salinity data and to assess freshwater resources using a lumped modeling approach. In a first step, we analyzed 4 years of data (rainfall, discharge and salinity times series) of the Port-Miou brackish submarine spring in South France (400 km2). A conceptual model of the aquifer was then designed to differentiate a deep brackish reservoir and a shallower fresh one. Salinity variations at the spring are assumed to be controlled mainly by dilution originating from the fresh water in the shallower reservoir. In a second step, a lumped modeling approach was developed based on the conceptual model to simulate discharge as well as salinity over time. We proposed a reservoir-model to take into account slow and fast components in the shallower part of the aquifer and a saline intrusion in the deeper one. This Rainfall-Discharge-Salinity model was calibrated and validated for two periods of 1.5 years at a daily time step and was also tested to reproduce a multi-annual evolution of the available discharge and salinity time series. Good simulation results were obtained to reproduce water and mass budgets as well as discharge and salinity dynamics during several hydrological cycles. The simultaneous modeling of hydrodynamics and quality data showed the robustness of the model in addition to its easy implementation. Our results led us to propose a new type of seawater mixing mechanism for brackish springs: the dilution type, in addition to the well-known Ventury suction and Head balance types. The application of the lumped model on the Port-Miou brackish spring validated the hydrogeological processes deduced from experimental data, given an initial quantification of the freshwater resources available in such complex brackish karstic aquifers.

  16. Synthetic seawater as stress-corrosion test medium

    Science.gov (United States)

    Humphries, T. S.; Nelson, E. E.

    1980-01-01

    Seawater minimizes pitting corrosion of aluminum-alloy test samples. Of three corrosion-inhibiting methods evaluated using (a) chromate inhibitors in saltwater, (b) surface treating sample via anodizing or alodine treatment, and (c) synthetic seawater, synthetic seawater was most effective test medium, since it is more uniform than fresh seawater.

  17. The role of estrogen in intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Chervonsky, Liza; Felmingham, Kim L; Bryant, Richard A

    2013-11-01

    Intrusive memories are highly vivid, emotional and involuntary recollections which cause significant distress across psychological disorders including posttraumatic disorder (PTSD). Recent evidence has potentially extended our understanding of the development of intrusive memories by identifying biological factors which significantly impact on memories for emotionally arousing stimuli. This study investigated the role of stress on the development of intrusions for negative and neutral images, and indexed the potential contributions of sex (estrogen and progesterone) and stress (noradrenaline and cortisol) hormones. Whilst viewing the images, half the participants underwent a cold pressor stress (CPS) procedure to induce stress while the control participants immersed their hands in warm water. Saliva samples were collected to index estrogen, progesterone and noradrenergic and cortisol response. Participants (55 university students, 26 men, 29 women) viewed a series of negatively arousing and neutral images. Participants completed recall and intrusions measures 2 days later. Negative images resulted in greater recall and more intrusions than neutral images. In the cold water condition females recalled fewer neutral memories than males. Cortisol increase predicted decreased recall of negative memories in males, and estrogen predicted increased intrusions of negative images in women. These findings are consistent with evidence that circulating levels of ovarian hormones influence memory for emotionally arousing events, and provides the first evidence of the influence of sex hormones on intrusive memories. These results provide one possible explanation for the higher incidence of anxiety disorders in women.

  18. A Real Time Intrusion Aggregation And Prevention Technique

    Directory of Open Access Journals (Sweden)

    Fouzia Sultana

    2013-03-01

    Full Text Available Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts produced by low-level intrusion detection systems, firewalls, etc. belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts can be generated for the clusters that contain all the relevant information whereas the amount of data (i.e., alerts can be reduced substantially. Meta-alerts may then be the basis for reporting to security experts or for communication within a distributed intrusion detection system. We propose a novel technique for online alert aggregation which is based on a dynamic, probabilistic model of the current attack situation. Basically, it can be regarded as a data stream version of a maximum likelihood approach for the estimation of the model parameters. With three benchmark data sets, we demonstrate that it is possible to achieve reduction rates of up to 99.96 percent while the number of missing meta-alerts is extremely low. In addition, meta-alerts are generated with a delay of typically only a few seconds after observing the first alert belonging to a new attack instance. Two types of intrusions are detected in this work: Firstly a spam attack is detected based on the blacklisted IP addresses from Stop Forum Spam and secondly packet level intrusion is detected based on KDDcup data. A packet sniffer is designed which keeps sniffing and extracting all the packets that are exchanged over internet interface. The packets are filtered and the headers are extracted. The headers are further subdivided into TCP, IP and UDP headers. ICMP packets are then separated. The data is matched with the database intrusion entries using fast string matching techniques and possible attack entries are marked with different color codes. An attack signature may be visible in any header of the same packet. In such cases, the alerts are aggregated and a single

  19. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  20. Internet Intrusion Detection System Service in a Cloud

    Directory of Open Access Journals (Sweden)

    Amirreza Zarrabi

    2012-09-01

    Full Text Available Intrusion Detection Systems (IDS have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and signs of attack. IDS aroused the concern of users as an important computer network security technology. In recent times, with the advent of Cloud Computing, the concepts of Software as a Service (SaaS, where vendors provide key software products as services over the internet that can be accessed by users to perform complex tasks, have become increasingly popular. Cloud Computing is a method to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. We introduce a Cloud Intrusion Detection System Services (CIDSS which is developed based on Cloud Computing and can make up for the deficiency of traditional intrusion detection, and proved to be great scalable. CIDSS can be utilized to overcome the critical challenge of keeping the client secure from cyber attacks while benefit the features which are presented by Cloud Computing technology.

  1. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  2. Application of time-domain electromagnetic method in mapping saltwater intrusion of a coastal alluvial aquifer, North Oman

    Science.gov (United States)

    El-Kaliouby, Hesham; Abdalla, Osman

    2015-04-01

    One-third of the population of Oman depends on the groundwater extracted from the alluvium deposits located along the coast of the Gulf of Oman. However, groundwater depletion and seawater intrusion constitute major challenges along the coastal water accumulations in Oman. The objective of this study is to locate the extent of seawater intrusion and to map the shallow alluvial aquifer in the region, where water accumulates from the rain or the flooding at AlKhod dam. In order to assess the effect of groundwater infiltration, which recharges the aquifer and fights the seawater invasion, a quantitative approach for the groundwater quality and distribution is required to provide reasonable knowledge on the spatial distribution of the aquifers, their thickness and the type of sediments. When groundwater wells and their subsurface geologic and electrical logs are not available or not deep enough, surface geophysical surveys can be considered due to their low cost and short acquisition time. The application of time-domain electromagnetic (TDEM) method in Al-Khod area, Oman has proven to be a successful tool in mapping the fresh/saline water interface and for locating the depth of fresh water aquifer. The depths and inland extents of the saline zone were mapped along three N-S TDEM profiles. The depths to the freshwater table and saline interface calculated from TDEM closely match the available well data.

  3. A Subset Feature Elimination Mechanism for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Herve Nkiama

    2016-04-01

    Full Text Available several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features contribute to represent the traffic, therefore reducing and selecting a number of adequate features may improve the speed and accuracy of the intrusion detection system. In this study, a feature selection mechanism has been proposed which aims to eliminate non-relevant features as well as identify the features which will contribute to improve the detection rate, based on the score each features have established during the selection process. To achieve that objective, a recursive feature elimination process was employed and associated with a decision tree based classifier and later on, the suitable relevant features were identified. This approach was applied on the NSL-KDD dataset which is an improved version of the previous KDD 1999 Dataset, scikit-learn that is a machine learning library written in python was used in this paper. Using this approach, relevant features were identified inside the dataset and the accuracy rate was improved. These results lend to support the idea that features selection improve significantly the classifier performance. Understanding the factors that help identify relevant features will allow the design of a better intrusion detection system.

  4. Grey-theory based intrusion detection model

    Institute of Scientific and Technical Information of China (English)

    Qin Boping; Zhou Xianwei; Yang Jun; Song Cunyi

    2006-01-01

    To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling.With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.

  5. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  6. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  7. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  8. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  9. A phased approach to network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1991-01-01

    This paper describes the design and development of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The development of this system is based on three basic assumptions: (1) that statistical analysis of computer system and user activates may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, (2) that expert system techniques can be applied to security auditing and intrusion detection, and (3) that successful intrusion detection may take place while monitoring a limited set of network activities. The Network Anomaly Detection and Intrusion Reporter (NADIR) design intent was to duplicate and improve the audit record review activities which had previously been undertaken by security personnel, to replace the manual review of audit logs with a near realtime expert system.

  10. Immune Based Intrusion Detector Generating Algorithm

    Institute of Scientific and Technical Information of China (English)

    DONG Xiao-mei; YU Ge; XIANG Guang

    2005-01-01

    Immune-based intrusion detection approaches are studied. The methods of constructing self set and generating mature detectors are researched and improved. A binary encoding based self set construction method is applied. First,the traditional mature detector generating algorithm is improved to generate mature detectors and detect intrusions faster. Then, a novel mature detector generating algorithm is proposed based on the negative selection mechanism. Accord ing to the algorithm, less mature detectors are needed to detect the abnormal activities in the network. Therefore, the speed of generating mature detectors and intrusion detection is improved. By comparing with those based on existing algo rithms, the intrusion detection system based on the algorithm has higher speed and accuracy.

  11. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  12. Intrusion Detection System Using Advanced Honeypots

    CERN Document Server

    Singh, Ram Kumar

    2009-01-01

    The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. In addition to maintaining low latency for the client, filtering unauthorized accesses has become one of the major concerns of a server maintainer. This implementation of an Intrusion Detection System distinguishes between the traffic coming from clients and the traffic originated from the attackers, in an attempt to simultaneously mitigate the problems of both latency and security. We then present the results of a series of stress and scalability tests, and suggest a number of potential uses for such a system. As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. Using honeypots provides effective solution to increase the security.

  13. Influence of Seawater Temperature on Phytoplankton Growth in Jiaozhou Bay, China

    Institute of Scientific and Technical Information of China (English)

    杨东方; 高振会; 陈豫; 王培刚; 孙培艳

    2004-01-01

    The phytoplankton reproduction capacity (PRC), as a new concept regarding chlorophyll-a and primary production (PP) is described. PRC is different from PP, carbon assimilation number (CAN) or photosynthetic rate (PB). PRC quantifies phytoplankton growth with a special consideration of the effect of seawater temperature. Observation data in Jiaozhou Bay, Qingdao, China, collected from May 1991 to February 1994 were used to analyze the horizontal distribution and seasonal variation of the PRC in Jiaozhou Bay in order to determine the characteristics, dynamic cycles and trends of phytoplankton growth in Jiaozhou Bay; and to develop a corresponding dynamic model of seawater temperature vs. PRC. Simulation curves showed that seawater temperature has a dual function of limiting and enhancing PRC. PRC's periodicity and fluctuation are similar to those of the seawater temperature. Nutrient silicon in Jiaozhou Bay satisfies phytoplankton growth from June 7 to November 3. When nutrients N, P and Si satisfy the phytoplankton growth and solar irradiation is sufficient, the PRC would reflect the influence of seawater temperature on phytoplankton growth. Moreover, the result quantitatively explains the scenario of one-peak or two-peak phytoplankton reproduction in Jiaozhou Bay, and also quantitatively elucidates the internal mechanism of the one- or two-peak phytoplankton reproduction in the global marine areas.

  14. Optimal scheduling of biocide dosing for seawater-cooled power and desalination plants

    KAUST Repository

    Mahfouz, Abdullah Bin

    2011-02-13

    Thermal desalination systems are typically integrated with power plants to exploit the excess heat resulting from the power-generation units. Using seawater in cooling the power plant and the desalination system is a common practice in many parts of the world where there is a shortage of freshwater. Biofouling is one of the major problems associated with the usage of seawater in cooling systems. Because of the dynamic variation in the power and water demands as well as the changes in the characteristics of seawater and the process, there is a need to develop an optimal policy for scheduling biocide usage and cleaning maintenance of the heat exchangers. The objective of this article is to introduce a systematic procedure for the optimization of scheduling the dosing of biocide and dechlorination chemicals as well as cleaning maintenance for a power production/thermal desalination plant. A multi-period optimization formulation is developed and solved to determine: the optimal levels of dosing and dechlorination chemicals; the timing of maintenance to clean the heat-exchange surfaces; and the dynamic dependence of the biofilm growth on the applied doses, the seawater-biocide chemistry, the process conditions, and seawater characteristics for each time period. The technical, economic, and environmental considerations of the system are accounted for. A case study is solved to elucidate the applicability of the developed optimization approach. © 2011 Springer-Verlag.

  15. Intrusion-Tolerant Architectures: Concepts and Design

    OpenAIRE

    Paulo Veríssimo; Nuno Ferreira Neves; Miguel Correia

    2003-01-01

    There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the other hand privileged, with few exceptions, intrusion prevention. Intrusion tolerance (IT) is a new app...

  16. Cenozoic seawater Sr/Ca evolution

    Science.gov (United States)

    Sosdian, Sindia M.; Lear, Caroline H.; Tao, Kai; Grossman, Ethan L.; O'Dea, Aaron; Rosenthal, Yair

    2012-10-01

    Records of seawater chemistry help constrain temporal variations in geochemical processes that impact the global carbon cycle and climate through Earth's history. Here we reconstruct Cenozoic seawater Sr/Ca (Sr/Casw) using fossil Conus and turritellid gastropod Sr/Ca. Combined with an oxygen isotope paleotemperature record from the same samples, the gastropod record suggests that Sr/Caswwas slightly higher in the Eocene (˜11.4 ± 3 mmol/mol) than today (˜8.54 mmol/mol) and remained relatively stable from the mid- to late Cenozoic. We compare our gastropod Cenozoic Sr/Casw record with a published turritellid gastropod Sr/Casw record and other published biogenic (benthic foraminifera, fossil fish teeth) and inorganic precipitate (calcite veins) Sr/Caswrecords. Once the uncertainties with our gastropod-derived Sr/Casw are taken into account the Sr/Casw record agrees reasonably well with biogenic Sr/Caswrecords. Assuming a seawater [Ca] history derived from marine evaporite inclusions, all biogenic-based Sr/Casw reconstructions imply decreasing seawater [Sr] through the Cenozoic, whereas the calcite vein Sr/Casw reconstruction implies increasing [Sr] through the Cenozoic. We apply a simple geochemical model to examine the implications of divergence among these seawater [Sr] reconstructions and suggest that the interpretation and uncertainties associated with the gastropod and calcite vein proxies need to be revisited. Used in conjunction with records of carbonate depositional fluxes, our favored seawater Sr/Ca scenarios point to a significant increase in the proportion of aragonite versus calcite deposition in shelf sediments from the Middle Miocene, coincident with the proliferation of coral reefs. We propose that this occurred at least 10 million years after the seawater Mg/Ca threshold was passed, and was instead aided by declining levels of atmospheric carbon dioxide.

  17. Numerical Simulation of Saline Intrusion and Purging in Long Sea Outfalls with Three-Dimensional Model

    Institute of Scientific and Technical Information of China (English)

    WU Wei; YAN Zhong-min; WU Long-hua

    2006-01-01

    Saline intrusion into marine sewage outfalls will greatly decrease the efficiency of sewage disposal. In order to investigate the mechanisms of this flow, in this paper, a three-dimensional numerical model based on FVM (Finite Volume Method) is established. The RNG k-ε model is selected for turbulence modeling. The time-averaged volume fraction equations are introduced to simulate the stratification and interfacial exchange of sewage and seawater in outfalls. Validity of the established three-dimensional numerical model is evaluated by comparisons of numerical results with experimental data. With this three-dimensional numerical model, the internal flow characteristics in outfalls for different sewage discharges are simulated. The results indicate that for a low sewage discharge, saline circulates in the outfall due to intrusion and both the inflowing momentum and the interfacial turbulent mixing are important mechanisms to extrude the saline. For a high sewage discharge, saline intrusion could be avoided. The inflow momentum is the main mechanism to extrude the saline and the interfacial turbulent mixing is not important relatively. Even at a high sewage discharge, the saline wedge would be retained in the main outfall pipe after the risers are purged. It takes a long time for this saline wedge to be extruded by interfacial turbulent mixing.

  18. A system for distributed intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  19. Chinese Primary Standard Seawater: Stability checks and comparisons with IAPSO Standard Seawater

    Science.gov (United States)

    Li, Yanan; Luo, Yan; Kang, Ying; Yu, Tao; Wang, Aijun; Zhang, Chuan

    2016-07-01

    The authors give a brief introduction to the Chinese Primary Standard Seawater, with a description of its preparation procedures. IAPSO Standard Seawater (IAPSO SSW), was taken as a stable reference in the stability check of Chinese Primary Standard Seawater (CP SSW), and linear regression model as well as hypothesis testing were introduced into the analysis of check results; a demonstration check of CP SSW (batch number P8) achieved a positive conclusion. In comparisons of several batches of these two kinds of standard seawater on Practical Salinity, identical seawater samples from a homogeneous source were measured repeatedly. To evaluate the comparison results, performance criteria referred to as En numbers were adopted, the maximum of which was 0.42, indicating that no significant differences lay between these two kinds of SSWs when used to determine Practical Salinity. Measures taken to assure the reliability of measurement results are presented.

  20. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  1. RAPID DETERMINATION OF RADIOSTRONTIUM IN SEAWATER SAMPLES

    Energy Technology Data Exchange (ETDEWEB)

    Maxwell, S.

    2013-01-16

    A new method for the determination of radiostrontium in seawater samples has been developed at the Savannah River National Laboratory (SRNL) that allows rapid preconcentration and separation of strontium and yttrium isotopes in seawater samples for measurement. The new SRNL method employs a novel and effective pre-concentration step that utilizes a blend of calcium phosphate with iron hydroxide to collect both strontium and yttrium rapidly from the seawater matrix with enhanced chemical yields. The pre-concentration steps, in combination with rapid Sr Resin and DGA Resin cartridge separation options using vacuum box technology, allow seawater samples up to 10 liters to be analyzed. The total {sup 89}Sr + {sup 90}Sr activity may be determined by gas flow proportional counting and recounted after ingrowth of {sup 90}Y to differentiate {sup 89}Sr from {sup 90}Sr. Gas flow proportional counting provides a lower method detection limit than liquid scintillation or Cerenkov counting and allows simultaneous counting of samples. Simultaneous counting allows for longer count times and lower method detection limits without handling very large aliquots of seawater. Seawater samples up to 6 liters may be analyzed using Sr Resin for {sup 89}Sr and {sup 90}Sr with a Minimum Detectable Activity (MDA) of 1-10 mBq/L, depending on count times. Seawater samples up to 10 liters may be analyzed for {sup 90}Sr using a DGA Resin method via collection and purification of {sup 90}Y only. If {sup 89}Sr and other fission products are present, then {sup 91}Y (beta energy 1.55 MeV, 58.5 day half-life) is also likely to be present. {sup 91}Y interferes with attempts to collect {sup 90}Y directly from the seawater sample without initial purification of Sr isotopes first and {sup 90}Y ingrowth. The DGA Resin option can be used to determine {sup 90}Sr, and if {sup 91}Y is also present, an ingrowth option with using DGA Resin again to collect {sup 90}Y can be performed. An MDA for {sup 90}Sr of <1 m

  2. Improve seawater cooling with titanium finned tubes

    Energy Technology Data Exchange (ETDEWEB)

    O' Donnell J. (High Performance Tube, Inc., Warren, NJ (United States))

    1992-10-01

    Seawater offers an endless supply of cooling water for these coastal processing facilities. But users must address seawater's corrosive nature in selecting construction materials for heat exchangers. Copper-nickel or carbon steel tubing fails continually under seawater service. This paper reports that titanium tubes, once thought to be too expensive a material for heat exchanger tubing, offer a unique combination of high material strength, excellent resistance to corrosion, and endurance to erosion by seawater. Titanium's superior physical properties in combination with enhanced surface area of low finned tubing perform the same heat duty with half the lineal footage of traditional heat exchanger tubes. High density low finned tubes multiply heat transfer capacity by a factor of two compared to plain tube. The technology applies in retrofit and original equipment manufacture (OEM) situations. It works best when the ratio of heat transfer coefficients is 2:1 or higher between the seawater coolant and shellside flow being cooled.

  3. Seawater chemistry and the advent of biocalcification

    Science.gov (United States)

    Brennan, S.T.; Lowenstein, T.K.; Horita, J.

    2004-01-01

    Major ion compositions of primary fluid inclusions from terminal Proterozoic (ca. 544 Ma) and Early Cambrian (ca. 515 Ma) marine halites indicate that seawater Ca2+ concentrations increased approximately threefold during the Early Cambrian. The timing of this shift in seawater chemistry broadly coincides with the "Cambrian explosion," a brief drop in marine 87Sr/86Sr values, and an increase in tectonic activity, suggesting a link between the advent of biocalcification, hydrothermal mid-ocean-ridge brine production, and the composition of seawater. The Early Cambrian surge in oceanic [Ca2+] was likely the first such increase following the rise of metazoans and may have spurred evolutionary changes in marine biota. ?? 2004 Geological Society of America.

  4. Seawater chemistry and the advent of biocalcification

    Science.gov (United States)

    Brennan, Sean T.; Lowenstein, Tim K.; Horita, Juske

    2004-06-01

    Major ion compositions of primary fluid inclusions from terminal Proterozoic (ca. 544 Ma) and Early Cambrian (ca. 515 Ma) marine halites indicate that seawater Ca2+ concentrations increased approximately threefold during the Early Cambrian. The timing of this shift in seawater chemistry broadly coincides with the “Cambrian explosion,” a brief drop in marine 87Sr/86Sr values, and an increase in tectonic activity, suggesting a link between the advent of biocalcification, hydrothermal mid-ocean-ridge brine production, and the composition of seawater. The Early Cambrian surge in oceanic [Ca2+] was likely the first such increase following the rise of metazoans and may have spurred evolutionary changes in marine biota.

  5. Seawater Chemistry and the Advent of Biocalcification

    Energy Technology Data Exchange (ETDEWEB)

    Brennan, S. T. [U.S. Geological Survey, Menlo Park, CA; Lowenstein, T K. [State University of New York, Binghamton; Horita, Juske [ORNL

    2004-01-01

    Major ion compositions of primary fluid inclusions from terminal Proterozoic (ca. 544 Ma) and Early Cambrian (ca. 515 Ma) marine halites indicate that seawater Ca{sup 2+} concentrations increased approximately threefold during the Early Cambrian. The timing of this shift in seawater chemistry broadly coincides with the 'Cambrian explosion,' a brief drop in marine {sup 87}Sr/{sup 86}Sr values, and an increase in tectonic activity, suggesting a link between the advent of biocalcification, hydrothermal mid-ocean-ridge brine production, and the composition of seawater. The Early Cambrian surge in oceanic [Ca{sup 2+}] was likely the first such increase following the rise of metazoans and may have spurred evolutionary changes in marine biota.

  6. Flue gas desulphurization (FGD) by seawater

    Energy Technology Data Exchange (ETDEWEB)

    Arce Arce, A.; Baalina Insua, A.; Rodriguez Suarez, E.; Santaballa Lopez, J.A. [Universidad de Santiago de Compostela, Santiago de Compostela (Spain). Dept. de Ingenieria Quimica

    1995-12-31

    Emission of large sulphur dioxide quantities proceeding from combustion processes is one of the most important sources of environmental pollution. These emissions may be controlled and reduced by means of the flue gases treatment before releasing them into the atmosphere. In this sense, seawater scrubbing process applied in the flue gas desulphurization (FGD) have a great industrial application and constitute an interesting method for atmospheric pollution control. In the seawater scrubbing, SO{sub 2} is absorbed and returned to the sea in the original form of sulphate salts. This paper presents an experimental research on sulphur dioxide scrubbing processes in a packed tower that uses seawater as absorbent agent, with the aim of studying the absorption conditions with different packing and effluent characteristics, in order to understand the real conditions in which FGD occurs. 5 refs., 5 figs., 3 tabs.

  7. Extracting Minerals from Seawater: An Energy Analysis

    Directory of Open Access Journals (Sweden)

    Ugo Bardi

    2010-04-01

    Full Text Available The concept of recovering minerals from seawater has been proposed as a way of counteracting the gradual depletion of conventional mineral ores. Seawater contains large amounts of dissolved ions and the four most concentrated metal ones (Na, Mg, Ca, K are being commercially extracted today. However, all the other metal ions exist at much lower concentrations. This paper reports an estimate of the feasibility of the extraction of these metal ions on the basis of the energy needed. In most cases, the result is that extraction in amounts comparable to the present production from land mines would be impossible because of the very large amount of energy needed. This conclusion holds also for uranium as fuel for the present generation of nuclear fission plants. Nevertheless, in a few cases, mainly lithium, extraction from seawater could provide amounts of metals sufficient for closing the cycle of metal use in the economy, provided that an increased level of recycling can be attained.

  8. Hydrothermal Alteration of Hyaloclastites Adjacent to Sill-Like Intrusives in the HSDP 3-km Core Hole.

    Science.gov (United States)

    McClain, J. S.; Schiffman, P.; Walton, A. W.; Yin, Q.; Pauly, B.

    2008-12-01

    Hyaloclastites at present depths below1880 mbsl on the submarine flanks of Mauna Kea volcano have been intruded by numerous, < 10 m-thick, sill-like bodies. The contact metamorphism of the hyaloclastites has resulted in up to 1 m-thick bleached zones, characterized by the presence of Na-and Mg-enriched alteration rinds on sideromelane clasts as well as the precipitation of drusy hydrothermal clinopyroxene (calcic augite to hedenbergite) and analcime within void spaces. The intrusive activity associated with contact metamorphism appears to have occurred early in the diagenetic history of the hylaoclastites, when they possessed porosities of 40-50%, because (1) early induration and pore-filling by hydrothermal minerals apparently strengthened them, preventing significant grain compaction during subsequent burial, (2) hydrothermal minerals have been coated or overgrown by smectite, zeolites, and palagonite during subsequent diagenesis and microbial innoculation, and (3) 87Sr/86Sr ratios of hydrothermal rinds on glass shards, averaging .7069 ± .0006, imply extensive interaction with seawater, whereas 87Sr/86Sr ratios of adjacent palagonitized glass, averaging .7042 ± .0002, imply interaction with comparatively less fluid, presumably after diagenetic pore-filling. Thermal modeling, which assumes (1) convective cooling, (2) that hydrothermal clinopyroxenes formed at minimum temperatures of 350°C, and (3) that hyaloclastite porosities approached 50% at the time of intrusion, implies that the observed contact aureoles must have been produced by mafic intrusions that maintained temperatures above the solidus rather than being rapidly cooled and frozen. This may have occurred because magma continued to flow in the intrusion conduit, consistent with the suggestion that these intrusions fed overlying pillow flows (Garcia et al., 2007). If this intrusive activity occurred at shallow depths within the edifice of Mauna Kea (Seaman et al. 2004), then hydrothermal clinopyroxene

  9. A New Method for Intrusion Detection using Manifold Learning Algorithm

    Directory of Open Access Journals (Sweden)

    Guoping Hou

    2013-07-01

    Full Text Available Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion features for the ANN. Generally, the intrusion features contain a certain number of useless features, which is useless for the intrusion detection. Large dimensions of the feature data will also affect the intrusion detection performance of the ANN. In order to improve the ANN performance, a new approach for network intrusion detection based on nonlinear feature dimension reduction and ANN is proposed in this work. The manifold learning algorithm was used to reduce the intrusion feature vector. Then an ANN classifier was employed to identify the intrusion. The efficiency of the proposed method was evaluated with the real intrusion data. The test result shows that the proposed approach has good intrusion detection performance.

  10. 莱州湾南岸潍坊北部平原区咸水入侵动态变化分析%Analysis on Dynamic Changes of Salt Water Intrusion in Northern Weibei Plain in South Laizhou Bay

    Institute of Scientific and Technical Information of China (English)

    管清花; 陈学群; 张婧

    2014-01-01

    In this paper,setting northern Weifang plain in southern Laizhou Bay as the typical research area,geo-logical background of salt water formation and distribution have been described.Through water chemistry method, characteristics of water chemistry change of underground brine and the change of saltwater instrusion caused by hu-man activities in northern Weifang plain have been analyzed.Main causes of salt water intrusion has been analyzed as well.%以莱州湾南岸潍坊北部平原地区为典型研究区,阐述了咸水体形成的成因背景与分布特征。通过水化学分析的方法,分析了潍北平原地下水水化学变化特征,及人工开采导致咸水入侵的变化,并分析了咸水入侵的主要成因。

  11. Summary of seawater chemistry taken from the beach pump intakes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The database contains recorded parameters of seawater quality from samples taken in sea turtle rearing tanks and also a daily sample of the incoming seawater from...

  12. Biologically mediated dissolution of volcanic glass in seawater

    NARCIS (Netherlands)

    Staudigel, H; Yayanos, A; Chastain, R; Davies, G.T.; Verdurmen, E.A Th; Schiffmann, P; Bourcier, R; de Baar, H.J.W.

    1998-01-01

    We studied the effects of biological mediation on the dissolution of basaltic glass in seawater. Experiments with typical seawater microbial populations were contrasted with a sterile control, and reactions were monitored chemically and isotopically. Biologically mediated experiments produce twice

  13. Data Mining and Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Zibusiso Dewa

    2016-01-01

    Full Text Available The rapid evolution of technology and the increased connectivity among its components, imposes new cyber-security challenges. To tackle this growing trend in computer attacks and respond threats, industry professionals and academics are joining forces in order to build Intrusion Detection Systems (IDS that combine high accuracy with low complexity and time efficiency. The present article gives an overview of existing Intrusion Detection Systems (IDS along with their main principles. Also this article argues whether data mining and its core feature which is knowledge discovery can help in creating Data mining based IDSs that can achieve higher accuracy to novel types of intrusion and demonstrate more robust behaviour compared to traditional IDSs.

  14. Intrusion Detection System: Security Monitoring System

    Directory of Open Access Journals (Sweden)

    ShabnamNoorani,

    2015-10-01

    Full Text Available An intrusion detection system (IDS is an ad hoc security solution to protect flawed computer systems. It works like a burglar alarm that goes off if someone tampers with or manages to get past other security mechanisms such as authentication mechanisms and firewalls. An Intrusion Detection System (IDS is a device or a software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.Intrusion Detection System (IDS has been used as a vital instrument in defending the network from this malicious or abnormal activity..In this paper we are comparing host based and network based IDS and various types of attacks possible on IDS.

  15. An Adaptive Clustering Algorithm for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    QIU Juli

    2007-01-01

    In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-stationary characteristic of network traffic,we extend and develop an adaptive wavecluster algorithm for intrusion detection.Using the multiresolution property of wavelet transforms,we can effectively identify arbitrarily shaped clusters at different scales and degrees of detail,moreover,applying wavelet transform removes the noise from the original feature space and make more accurate cluster found.Experimental results on KDD-99 intrusion detection dataset show the efficiency and accuracy of this algorithm.A detection rate above 96% and a false alarm rate below 3% are achieved.

  16. An Overview on Intrusion Detection in Manet

    Directory of Open Access Journals (Sweden)

    Rajesh D. Wagh

    2015-05-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now days. A MANETS are the networks that are building, when some mobile nodes come in the mobility range of each other for data transfer and communication. In MANET, nodes are not stable hence the communication topology is not stable due to this vulnerable for attacks. MANET devices are connected via wireless links without using an existing network infrastructure or centralized administration due to which MANETs are not able to diverse types of attacks and intrusions. Hence intrusion detection has attracted many researchers. This paper gives an overview and different methods to detect intrusion in MANET.

  17. An overview to Software Architecture in Intrusion Detection System

    CERN Document Server

    Bahrami, Mehdi

    2012-01-01

    Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software based network intrusion detection systems have difficulty in handling high speed links. This paper reviews of many type of software architecture in intrusion detection systems and describes the design and implementation of a high-performance network intrusion detection system that combines the use of software-based network intrusion detection sensors and a network processor board. The network processor acts as a customized load balancing splitter that cooperates with a set of modified content-based network intrusion detection sensors in processing network traffic.

  18. Effective analysis of cloud based intrusion detection system

    Directory of Open Access Journals (Sweden)

    Sanjay Ram

    2012-08-01

    Full Text Available The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS. People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

  19. Photochemical oxidation of dimethylsulfide in seawater

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Dimethylsulfide (DMS) is generally thought to be lost from the surface oceans by evasion into the atmosphere as well as consumption by microbe. However, photochemical process might be important in the removal of DMS in the oceanic photic zone. A kinetic investigation into the photochemical oxidation of DMS in seawater was performed. The photo-oxidation rates of DMS were influenced by various factors including the medium, dissolved oxygen, photosensitizers, and heavy metal ions. The photo-oxidation rates of DMS were higher in seawater than in distilled water, presumably due to the effect of salinity existing in seawater. Three usual photosensitizers (humic acid, fulvic acid and anthroquinone), especially in the presence of oxygen, were able to enhance the photo-oxidation rate of DMS, with the fastest rate observed with anthroquinone. Photo-oxidation of DMS followed first order reaction kinetics with the rate constant ranging from 2.5×10-5 to 34.3×10-5 s-1. Quantitative analysis showed that approximately 32% of the photochemically removed DMS was converted to dimethylsulfoxide. One of the important findings was that the presence of Hg2+ could markedly accelerate the photo-oxidation rate of DMS in seawater. The mechanism of mercuric catalysis for DMS photolysis was suggested according to the way of CTTM (charge transfer to metal) of DMS-Hg2+ complex.

  20. Stability of phosphorus species in seawater

    Digital Repository Service at National Institute of Oceanography (India)

    DileepKumar, M.; Somasundar, K.; Rajendran, A.

    couples in acidic and basic solutions, respectively, in anoxic conditions. H sub(3) PO sub(4)/H sub(4) P sub(2) O sub(6) and H sub(3) PO sub(2)/P super(0) are the important reducing couples in seawater. HPO and H PO are the stable ones in oxic and anoxic...

  1. A Novel Distributed Intrusion Detection System for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2015-04-01

    Full Text Available In the new interconnected world, we need to secure vehicular cyber-physical systems (VCPS using sophisticated intrusion detection systems. In this article, we present a novel distributed intrusion detection system (DIDS designed for a vehicular ad hoc network (VANET. By combining static and dynamic detection agents, that can be mounted on central vehicles, and a control center where the alarms about possible attacks on the system are communicated, the proposed DIDS can be used in both urban and highway environments for real time anomaly detection with good accuracy and response time.

  2. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  3. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  4. Adaptive Genetic Algorithm Model for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    K. S. Anil Kumar

    2012-09-01

    Full Text Available Intrusion detection systems are intelligent systems designed to identify and prevent the misuse of computer networks and systems. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Thus the emerging network security systems need be part of the life system and this ispossible only by embedding knowledge into the network. The Adaptive Genetic Algorithm Model - IDS comprising of K-Means clustering Algorithm, Genetic Algorithm and Neural Network techniques. Thetechnique is tested using multitude of background knowledge sets in DARPA network traffic datasets.

  5. Intrusion Detection Using Cost-Sensitive Classification

    CERN Document Server

    Mitrokotsa, Aikaterini; Douligeris, Christos

    2008-01-01

    Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not detecting at- tacks. For this reason, we examine how cost-sensitive classification methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditions, cost matrices and different classification models, in terms of expected cost, as well as detection and false alarm rates. We find that even under unfavourable conditions, cost-sensitive classification can improve performance significantly, if only slightly.

  6. Design of Secure Distributed Intrusion Detection Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Intrusion Detection System (IDS) have received a great deal of attention because of their excellent ability of preventing network incidents. Recently, many efficient approaches have been proposed to improve detection ability of IDS. While the self-protection ability of IDS is relatively worse and easy to be exploited by attackers, this paper gives a scheme of Securely Distributed Intrusion Detection System (SDIDS). This system adopts special measurements to enforce the security of IDS components. A new secure mechanism combining role-based access control and attribute certificate is used to resist attack to communication.

  7. Intrusion Detection Approach Using Connectionist Expert System

    Institute of Scientific and Technical Information of China (English)

    MA Rui; LIU Yu-shu; DU Yan-hui

    2005-01-01

    In order to improve the detection efficiency of rule-based expert systems, an intrusion detection approach using connectionist expert system is proposed. The approach converts the AND/OR nodes into the corresponding neurons, adopts the three-layered feed forward network with full interconnection between layers,translates the feature values into the continuous values belong to the interval [0, 1 ], shows the confidence degree about intrusion detection rules using the weight values of the neural networks and makes uncertain inference with sigmoid function. Compared with the rule-based expert system, the neural network expert system improves the inference efficiency.

  8. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  9. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  10. Research on Intrusion Detection Technology of Network(Ⅰ)%网络入侵检测技术研究(上)

    Institute of Scientific and Technical Information of China (English)

    赵红宇

    2002-01-01

    入侵检测是近几年发展起来的新型网络安全策略,它实现了网络系统安全的动态检测和监控.文章介绍了入侵检测系统的体系结构和检测方法,指出了入侵检测系统应具有的功能以及入侵检测系统的分类,分析了现有的入侵检测技术以及多种检测技术在入侵检测系统中的应用.%In recent years, intrusion detection technology is regarded as one of the new strategy for network security. It can realize dynamic protection in computer network. This paper introduces the architecture of Intrusion Detection System and general methods of Intrusion Detection. The functions of Intrusion Detection System are pointed out,and classification of Intrusion Detection System is introduced. This paper analyzes the technology of Intrusion Detection at present ,and the application of detecting technology in Intrusion Detection.

  11. Secular decline of seawater calcium increases seawater buffering and pH

    Science.gov (United States)

    Hain, M.; Sigman, D. M.; Higgins, J. A.; Haug, G. H.

    2015-12-01

    Reconstructed changes in seawater calcium and magnesium concentration ([Ca2+], [Mg2+]) predictably affect the ocean's acid/base and carbon chemistry. Yet inaccurate formulations of chemical equilibrium "constants" are currently in use to account for these changes. Here we develop an efficient implementation of the MIAMI Ionic Interaction Model (Millero and Pierrot, 1998) to predict all chemical equilibrium constants required for carbon chemistry calculations under variable [Ca2+] and [Mg2+] (Hain et al., 2015). We investigate the impact of [Ca2+] and [Mg2+] on the relationships among the ocean's pH, CO2, dissolved inorganic carbon (DIC), saturation state of CaCO3 (Ω), and buffer capacity. Increasing [Ca2+] and/or [Mg2+] enhances "ion pairing," which increases seawater buffering by increasing the concentration ratio of total to "free" (uncomplexed) carbonate ion. An increase in [Ca2+], however, also causes a decline in carbonate ion to maintain a given Ω, thereby overwhelming the ion pairing effect and decreasing seawater buffering. Given the reconstructions of Eocene [Ca2+] and [Mg2+] ([Ca2+]~20mM; [Mg2+]~30 mM), Eocene seawater would have required essentially the same DIC as today to simultaneously explain a similar-to-modern Ω and the estimated Eocene atmospheric CO2 of ~1000 ppm. During the Cretaceous, at ~4 times modern [Ca2+], ocean buffering would have been at a minimum. Overall, during times of high seawater [Ca2+], CaCO3 saturation, pH, and atmospheric CO2 were more susceptible to perturbations of the global carbon cycle. For example, given both Eocene and Cretaceous seawater [Ca2+] and [Mg2+], a doubling of atmospheric CO2 would require less carbon addition to the ocean/atmosphere system than under modern seawater composition. Moreover, increase in seawater buffering since the Cretaceous may have been a driver of evolution by raising energetic demands of biologically controlled calcification and CO2 concentration mechanisms that aid photosynthesis.

  12. A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Binod Kumar Pattanayak

    2014-01-01

    Full Text Available Applications of Mobile Ad Hoc Networks (MANETs have become extensively popular over the years among the researchers. However, the dynamic nature of MANETs imposes a set of challenges to its efficient implementation in practice. One of such challenges represents intrusion detection and prevention procedures that are intended to provide secured performance of ad hoc applications. In this study, we introduce a mobile agent based intrusion detection and prevention architecture for a clustered MANET. Here, a mobile agent resides in each cluster of the ad hoc network and each cluster runs a specific application at any point of time. This application specific approach makes the network more robust to external intrusions directed at the nodes in an ad hoc network.

  13. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  14. Vapor intrusion in urban settings: effect of foundation features and source location.

    Science.gov (United States)

    Yao, Yijun; Pennell, Kelly G; Suuberg, Eric

    2011-01-01

    In many urban settings, groundwater contains volatile organic compounds, such as tricholoroethene, tetrachloroethene, benzene, etc., at concentrations that are at or slightly below non-potable groundwater standards. Some non-potable groundwater standards do not protect against human health risks that might result from vapor intrusion. Vapor intrusion is a process by which vapor phase contaminants present in the subsurface migrate through the soil and ultimately enter a building through foundation cracks. The end result is a decrease in air quality within the building. Predicting whether or not vapor intrusion will occur at rates sufficient to cause health risks is extremely difficult and depends on many factors. In many cities, a wide-range of property uses take place over a relatively small area. For instance, schools, commercial buildings and residential buildings may all reside within a few city blocks. Most conceptual site models assume the ground surface is open to the atmosphere (i.e. green space); however the effect that an impervious surface (e.g. paving) may have on vapor transport rates is not routinely considered. Using a 3-D computational fluid dynamics model, we are investigating how the presence of impervious surfaces affects vapor intrusion rates. To complement our modeling efforts, we are in the initial stages of conducting a field study in a neighborhood where vapor intrusion is occurring.

  15. THE ELEVATION NET FOR THE SALTWATER INTRUSION PHENOMENON ANALYSIS IN THE COASTAL PLAIN OF PISA

    Directory of Open Access Journals (Sweden)

    G. Caroti

    2014-01-01

    The essential foundation to reconstruct the freshwater/saltwater interface, and therefore also for the recognition of the phenomenon of seawater intrusion, is represented by piezometric reconstructions integrated with hydrogeochemical information that can be obtained directly from in-well measurements and indirectly through laboratory tests carried out on samples of water. A serious limitation of the piezometric reconstructions is mostly represented by the margin of approximation with which the elevation of water points has been established, which in turn result in uncertainty in the relationship between piezometric and hydrometric elevation. This paper presents various methodologies, GNSS and conventional, to determine the elevation of piezometers, also evaluating the accuracy obtainable and the requirements in terms of time, personnel and equipment.

  16. Data Mining Approaches for Intrusion Detection

    Science.gov (United States)

    2007-11-02

    In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques...two general data mining algorithms that we have implemented: the association rules algorithm and the frequent episodes algorithm. These algorithms can

  17. Intrusion Detection System Visualization of Network Alerts

    Science.gov (United States)

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  18. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  19. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight wee

  20. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  1. How stratospheric are deep stratospheric intrusions?

    Science.gov (United States)

    Trickl, T.; Vogelmann, H.; Giehl, H.; Scheel, H.-E.; Sprenger, M.; Stohl, A.

    2014-09-01

    Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l.) next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH) and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The CO mixing ratio in

  2. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-06-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 and 2004. These investigations had been based on data filtering by using low relative humidity and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. For quantifying the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dew-point-mirror instrument at the Zugspitze summit station rarely registers relative humidity (RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are dryer by roughly one order of magnitude than indicated in the in-situ measurements. Even in thin layers frequently RH values clearly below 1% have been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO and, thus, the intrusion air mass originate in the shallow "mixing layer" around the

  3. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  4. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  5. Simulation of network intrusion detection system with GPenSim

    OpenAIRE

    2011-01-01

    In recent years, network has penetrated into every aspect of our life with its rapid growth and popularization. More and more serious network security problems have occurred together with this process, especially network intrusion problem. It has seriously affected the normal use of network, so research of network intrusion detection has become one of the hottest research areas. This thesis simulated a network intrusion detection system based on particle filter to solve the network intrusion ...

  6. Towards Multi-Stage Intrusion Detection using IP Flow Records

    OpenAIRE

    Muhammad Fahad Umer; Muhammad Sher; Imran Khan

    2016-01-01

    Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very ...

  7. Efficiency of Svm and Pca to Enhance Intrusion Detection System

    OpenAIRE

    Soukaena Hassan Hashem

    2013-01-01

    Intrusion detection system (IDS) is a system that gathers and analyzes information from various areas within a computer or a network to identify attacks made against these components. This research proposed an Intrusion Detection Model (IDM) for detection intrusion attempts, the proposal is a hybrid IDM because it considers both features of network packets and host features that are sensitive to most intrusions. The dataset used to build the hybrid IDM is the proposed HybD (Hybrid Dataset) da...

  8. Models of ash-laden intrusions in a stratified atmosphere

    Science.gov (United States)

    Hogg, Andrew; Johnson, Chris; Sparks, Steve; Huppert, Herbert; Woodhouse, Mark; Phillips, Jeremy

    2013-04-01

    illustrate the potential for the intrusion to remain as a relatively thin layer and explicitly reveal the significant dynamical role played by the atmospheric wind as the flow is accelerated or decelerated by the action of atmospheric drag.

  9. Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE

    Directory of Open Access Journals (Sweden)

    Basappa B. Kodada

    2012-01-01

    Full Text Available Grid Computing is a kind of important information technology which enables resource sharing globally to solve the large scale problem. It is based on networks and able to enable large scale aggregation and sharing of computational, data, sensors and other resources across institutional boundaries. Integrated Globus Tool Kit with Web services is to present OGSA (Open Grid Services Architecture as the standardservice grid architecture. In OGSA, everything is abstracted as a service, including computers, applications, data as well as instruments. The services and resources in Grid are heterogeneous and dynamic, and they also belong to different domains. Grid Services are still new to business system & asmore systems are being attached to it, any threat to it could bring collapse and huge harm. May be intruder come with a new form of attack. Grid Computing is a Global Infrastructure on the internet has led to asecurity attacks on the Computing Infrastructure. The wide varieties of IDS (Intrusion Detection System are available which are designed to handle the specific types of attacks. The technique of [27] will protect future attacks in Service Grid Computing Environment at the Grid Infrastructure but there is no technique can protect these types of attacks inside the grid at the node level. So this paper proposes the Architecture of IDS-IGCE (Intrusion Detection System – Inside Grid Computing Environment which can provide the protection against the complete threats inside the Grid Environment.

  10. Evaluating And Comparison Of Intrusion In Mobile AD HOC Networks

    Directory of Open Access Journals (Sweden)

    Zougagh Hicham

    2012-04-01

    Full Text Available In recent years, the use of mobile ad hoc network (MANETs has been widespread in many applications.Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. However, these techniques have a limitation on the effects of prevention techniques in general and they are designed for a set of known attacks. They are unlikely to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a need of second mechanism to “detect and response” these newer attacks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. In this article we classify the architecture for IDS that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANETs presented and compared. We then provide some directions for future researches.

  11. Simulation of groundwater-seawater interaction in the coastal surficial aquifer in Bohai Bay, Tianjin, China

    Science.gov (United States)

    Yi, Lixin; Ma, Bo; Liu, Lingling; Tang, Guoqiang; Wang, Tianyu

    2016-08-01

    This paper quantitatively investigates groundwater-seawater interactions and explores the annual variations and spatial distributions in submarine groundwater discharge (SGD) and seawater intrusion (SWI) in the Bohai Sea coastal zone in Tianjin, China. A three-dimensional finite element model, FEMWATER in the GMS environment, is developed to simulate density-dependent flow and transport in coastal groundwater aquifers. A sensitivity analysis is used to explore how the model output varies with the hydrogeological parameters and boundary conditions. The results suggest that both SGD and SWI occur across the sea-aquifer interface. Along the modeled 45 km stretch of coastline, the annual SGD and SWI rates are 4.23 × 107 m3/yr and 0.86 × 107 m3/yr, respectively. The results also indicate that SGD is highest in the winter and lowest in the summer, and SWI exhibits the opposite trend. This change in flow direction across the sea-aquifer interface corresponds to seasonal changes in sea level. SGD mainly occurs in the southern and northern parts of the study area, and SWI primarily occurs in the central part. The results of the sensitivity analysis suggest that the SGD and SWI model outputs are most sensitive to sea level and the hydraulic conductivity in the top layer.

  12. Projected world market for seawater desalination equipment

    Energy Technology Data Exchange (ETDEWEB)

    1984-10-01

    A forecast is presented of the market for seawater desalination plants. The conclusions presented herein are based on a number of sources of information, of which the most important are: responses to questionnaires mailed to 300 cognizant water agencies in 61 countries; the published market growth trend over the period 1971 to 1983; and an analysis of the geography, rainfall, population, industrial growth, and energy availability in the respective countries. Analysis suggests the possibility that financing, although currently a major stumbling block to the purchase of desalting plants, may be effected by an exchange program in which the purchaser of plants will offer some exportable product(s) in exchange. The forecast suggests the likelihood that the seawater desalination market is becoming saturated. A plateau is expected to develop in new plant sales of additional capacity in the immediate future, followed by a downturn by the end of the century. This report, however, emphasizes the importance of the replacement market, which will involve substantial sales to replace worn-out and obsolescent equipment. The combined new-plus-replacement annual sales can be expected to reach 1.25 million m/sup 3//d (330 Mgd) by the year 2000. Seawater reverse osmosis (SWRO) is expected to represent 270,000 m/sup 3//d (70 Mgd) by the end of the century because of technological improvements in membrane systems and components.

  13. Lithium in Brachiopods - proxy for seawater evolution?

    Science.gov (United States)

    Gaspers, Natalie; Magna, Tomas; Tomasovych, Adam; Henkel, Daniela

    2017-04-01

    Marine biogenic carbonates have the potential to serve as a proxy for evolution of seawater chemistry. In order to compile a record of the past and recent δ7Li in the oceans, foraminifera shells, scleractinian corals and belemnites have been used. However, only a foraminifera-based record appears to more accurately reflect the Li isotope composition of ocean water. At present, this record is available for the Cenozoic with implications for major events during this period of time, including K/T event [1]. A record for the entire Phanerozoic has not yet been obtained. In order to extend this record to the more distant past, Li elemental/isotope systematics of brachiopods were investigated because these marine animals were already present in Early Cambrian oceans and because they are less sensitive to diagenesis-induced modifications due to their shell mineralogy (low-Mg calcite). The preliminary data indicates a species-, temperature- and salinity-independent behavior of Li isotopes in brachiopod shells. Also, no vital effects have been observed for different shell parts. The consistent offset of -4‰ relative to modern seawater is in accordance with experimental data [2]. Further data are now being collected for Cenozoic specimens to more rigorously test brachiopods as possible archives of past seawater in comparison to the existing foraminiferal records. [1] Misra & Froelich (2012) Science 335, 818-823 [2] Marriott et al. (2004) Chem Geol 212, 5-15

  14. Mimicking Seawater For Culturing Marine Bacteria

    DEFF Research Database (Denmark)

    Rygaard, Anita Mac; Sonnenschein, Eva; Gram, Lone

    2015-01-01

    Only about 1% of marine bacteria have been brought into culture using traditional techniques. The purpose of this study was to investigate if mimicking the natural bacterial environment can increase culturability.We used marine substrates containing defined algal polymers or gellan gum as solidif......Only about 1% of marine bacteria have been brought into culture using traditional techniques. The purpose of this study was to investigate if mimicking the natural bacterial environment can increase culturability.We used marine substrates containing defined algal polymers or gellan gum...... as solidifying agents, and enumerated bacteria from seawater and algal exudates. We tested if culturability could be influenced by addition of quorum sensing signals (AHLs). All plates were incubated at 15°C. Bacterial counts (CFU/g) from algal exudates from brown algae were highest on media containing algal...... polymers. In general, bacteria isolated from algal exudates preferred more rich media than bacteria isolated from seawater. Overall, culturability ranged from 0.01 to 0.8% as compared to total cell count. Substitution of agar with gellan gum increased the culturability of seawater bacteria approximately...

  15. Effects of seawater ozonation on biofilm development in aquaculture tanks.

    Science.gov (United States)

    Wietz, Matthias; Hall, Michael R; Høj, Lone

    2009-07-01

    Microbial biofilms developing in aquaculture tanks represent a reservoir for opportunistic bacterial pathogens, and procedures to control formation and bacterial composition of biofilms are important for the development of commercially viable aquaculture industries. This study investigated the effects of seawater ozonation on biofilm development on microscope glass slides placed in small-scale aquaculture tanks containing the live feed organism Artemia. Fluorescence in situ hybridization (FISH) demonstrated that ozonation accelerated the biofilm formation cycle, while it delayed the establishment of filamentous bacteria. Gammaproteobacteria and Alphaproteobacteria were the most abundant bacterial groups in the biofilm for both water types, but ozonation influenced their dynamics. With ozonation, the bacterial community structure was relatively stable and dominated by Gammaproteobacteria throughout the experiment (21-66% of total bacteria). Without ozonation, the community showed larger fluctuations, and Alphaproteobacteria emerged as dominant after 18 days (up to 54% of total bacteria). Ozonation of seawater also affected the dynamics of less abundant populations in the biofilm such as Betaproteobacteria, Planctomycetales and the Cytophaga/Flavobacterium branch of phylum Bacteroidetes. The abundance of Thiothrix, a bacterial genus capable of filamentous growth and fouling of larvae, increased with time for both water types, while no temporal trend could be detected for the genus Vibrio. Denaturing gradient gel electrophoresis (DGGE) demonstrated temporal changes in the dominant bacterial populations for both water types. Sequencing of DGGE bands confirmed the FISH data, and sequences were related to bacterial groups commonly found in biofilms of aquaculture systems. Several populations were closely related to organisms involved in sulfur cycling. Improved Artemia survival rates in tanks receiving ozonated water suggested a positive effect of ozonation on animal

  16. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  17. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  18. Acidifying intermediate water accelerates the acidification of seawater on shelves: An example of the East China Sea

    Science.gov (United States)

    Lui, Hon-Kit; Chen, Chen-Tung Arthur; Lee, Jay; Wang, Shu-Lun; Gong, Gwo-Ching; Bai, Yan; He, Xianqiang

    2015-12-01

    This study is the first to present observed acidification rates at the shelf break of the East China Sea (ECS) and in the Okinawa Trough between 1982 and 2007. The use of apparent oxygen utilization (AOU) data to quantify the change in pH due to physical changes and changes in biological activities is demonstrated. The results thus obtained reveal that the drop in pH of the Kuroshio Intermediate Water (KIW) in the ECS is a result of not only the intrusion of atmospheric CO2, but also an increase in AOU concentration. The acidification rates caused by the increasing AOU concentration could contribute up to -0.00086±0.00017 pH unit yr-1 at 900 m in the Okinawa Trough and -0.00082±0.00057 pH unit yr-1 on the shelf break of the ECS. These values are equivalent to 54% and 51%, respectively, of the acidification rate of -0.0016 pH unit yr-1 based on an assumption of the air-sea CO2 equilibrium. When the effects of changing AOU and θ are eliminated, the acidification rate in the basin of the ECS captures the rate of change that is caused by an increase in anthropogenic CO2 concentration. In contrast, when the effects of changing AOU and θ are eliminated, the acidification rate at the shelf break is 69% higher than the rate based on an assumption of the air-sea CO2 equilibrium. Since the seawater on the shelf contains a higher proportion of the South China Sea (SCS) seawater and coastal water than does that in the Okinawa Trough, the result herein may imply that the SCS seawater, coastal water, or a combination of them suffered a higher acidification rate during the studied period. This study, to the best of the authors' knowledge, is the first to demonstrate that changing the carbonate chemistry of both incoming offshore intermediate seawater and coastal water results in the acidification of seawater on a continental shelf. The results herein reveal a situation in which the acidification of coastal seawater may be faster than expected when the reduction of pH of the

  19. Buffer capacity, ecosystem feedbacks, and seawater chemistry under global change

    Science.gov (United States)

    Jury, C. P.; Thomas, F. I.; Atkinson, M. J.; Jokiel, P. L.; Onuma, M. A.; Kaku, N.; Toonen, R. J.

    2013-12-01

    Ocean acidification (OA) results in reduced seawater pH and aragonite saturation state (Ωarag), but also reduced seawater buffer capacity. As buffer capacity decreases, diel variation in seawater chemistry increases. However, a variety of ecosystem feedbacks can modulate changes in both average seawater chemistry and diel seawater chemistry variation. Here we model these effects for a coastal, reef flat ecosystem. We show that an increase in offshore pCO2 and temperature (to 900 μatm and +3°C) can increase diel pH variation by as much as a factor of 2.5 and can increase diel pCO2 variation by a factor of 4.6, depending on ecosystem feedbacks and seawater residence time. Importantly, these effects are different between day and night. With increasing seawater residence time and increasing feedback intensity, daytime seawater chemistry becomes more similar to present-day conditions while nighttime seawater chemistry becomes less similar to present-day conditions. Better constraining ecosystem feedbacks under global change will improve projections of coastal water chemistry, but this study shows the importance of considering changes in both average carbonate chemistry and diel chemistry variation for organisms and ecosystems. Further, we will discuss our recent work examining the effects of diel seawater chemistry variation on coral calcification rates.

  20. Investigating the long-term geodetic response to magmatic intrusions at volcanoes in northern California

    Science.gov (United States)

    Parker, A. L.; Biggs, J.; Annen, C.; Houseman, G. A.; Yamasaki, T.; Wright, T. J.; Walters, R. J.; Lu, Z.

    2014-12-01

    Ratios of intrusive to extrusive activity at volcanic arcs are thought to be high, with estimates ranging between 5:1 and 30:1. Understanding the geodetic response to magmatic intrusion is therefore fundamental to large-scale studies of volcano deformation, providing insight into the dynamics of the inter-eruptive period of the volcano cycle and the building of continental crust. In northern California, we identify two volcanoes - Medicine Lake Volcano (MLV) and Lassen Volcanic Center (LaVC) - that exhibit long-term (multi-decadal) subsidence. We test the hypothesis that deformation at these volcanoes results from processes associated with magmatic intrusions. We first constrain the spatial and temporal characteristics of the deformation fields, establishing the first time-series of deformation at LaVC using InSAR data, multi-temporal analysis techniques and global weather models. Although the rates of deformation at the two volcanoes are similar (~1 cm/yr), our results show that the ratio of vertical to horizontal displacements is significantly different, suggesting contrasting source geometries. To test the origin of deformation, we develop modeling strategies to investigate thermal and viscoelastic processes associated with magmatic intrusions. The first model we develop couples analytical geodetic models to a numerical model of volume loss due to cooling and crystallization based upon temperature-melt fraction relationships from petrological experiments. This model provides evidence that magmatic intrusion at MLV has occurred more recently than the last eruption ~1 ka. The second model we test uses a finite element approach to simulate the time-dependent viscoelastic response of the crust to magmatic intrusion. We assess the magnitude and timescales of ground deformation that may result from these processes, exploring the model parameter space before applying the models to our InSAR observations of subsidence in northern California.

  1. Effects of NaCl and seawater induced salinity on survival and reproduction of three soil invertebrate species.

    Science.gov (United States)

    Pereira, C S; Lopes, I; Sousa, J P; Chelinho, S

    2015-09-01

    The increase of global mean temperature is raising serious concerns worldwide due to its potential negative effects such as droughts and melting of glaciers and ice caps leading to sea level rise. Expected impacts on soil compartment include floodings, seawater intrusions and use of saltwater for irrigation, with unknown effects on soil ecosystems and their inhabitants. The present study aimed at evaluating the effects of salinisation on soil ecosystems due to sea level rise. The reproduction and mortality of three standard soil invertebrate species (Folsomia candida, Enchytraeus crypticus, Hypoaspis aculeifer) in standard artificial OECD soil spiked with serial dilutions of seawater/gradient of NaCl were evaluated according to standard guidelines. An increased sensitivity was observed in the following order: H. aculeifer≪E. crypticus≈F. candida consistent with the different exposure pathways: springtails and enchytraeids are exposed by ingestion and contact while mites are mainly exposed by ingestion due to a continuous and thick exoskeleton. Although small differences were observed in the calculated effect electrical conductivity values, seawater and NaCl induced the same overall effects (with a difference in the enchytraeid tests where a higher sensitivity was found in relation to NaCl). The adverse effects described in the present study are observed on soils not considered saline. Therefore, the actual limit to define saline soils (4000 μS cm(-1)) does not reflect the existing knowledge when considering soil fauna. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. ISDTM:An Intrusion Signatures Description Temporal Model

    Institute of Scientific and Technical Information of China (English)

    OuYangMing-guang; ZhouYang-bo

    2003-01-01

    ISDTM, based on an augmented Allen's interval temporal logic (ITL) and first-order predicate calculus, is a formal temporal model for representing intrusion signatures.It is augmented with some real time extensions which enhance the expressivity. Intrusion scenarios usually are the set of events and system states, wherethe temporal sequence is their basic relation. Intrusion signatures description, therefore, is to represent such temporal relations in a sense. While representing these signatures, ISDTM decomposes the intrusion process into the sequence of events according to their relevant intervals, and then specifies network states in these Intervals. The uncertain intrusion signatures as well as basic temporal modes of events, which consist of the parallel mode,the sequential mode and the hybrid mode, can be succinctly and naturally represented in ISDTM. Mode chart is the visualization of intrusion signatures in ISDTM, which makes the formulas more readable. The intrusion signatures descriptions in ISDTM have advantages of compact construct, concise syntax, scalability and easy implementation.

  3. A Comprehensive Study in Data Mining Frameworks for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    R.Venkatesan

    2012-12-01

    Full Text Available Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS is a system for detecting intrusions and reporting to the authority or to the network administration. Data mining techniques have been successfully applied in many fields like Network Management, Education, Science, Business, Manufacturing, Process control, and Fraud Detection. Data Mining for IDS is the technique which can be used mainly to identify unknown attacks and to raise alarms when security violations are detected. The purpose of this survey paper is to describe the methods/ techniques which are being used for Intrusion Detection based on Data mining concepts and the designed frame works for the same. We are also going to review the related works for intrusion detection.

  4. Using Jquery with Snort to Visualize Intrusion

    Directory of Open Access Journals (Sweden)

    Alaa El - Din Riad

    2012-01-01

    Full Text Available The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive / immersive technologies. Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human user. Authors have found that the representations can be quite effective at conveying the needed information and resolving the relationships extremely rapidly. To facilitate the creation of novel visualizations this paper presents a new framework that is designed with using data visualization technique by using Jquery Php for analysis and visualizes snort result data for user.

  5. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and/or...... crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  6. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  7. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  8. Intrusion Detection in Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadya El MOUSSAID

    2017-01-01

    Full Text Available The recent advances in electronic and robotics industry have enabled the manufacturing of sensors capable of measuring a set of application-oriented parameters and transmit them back to the base station for analysis purposes. These sensors are widely used in many applications including the healthcare systems forming though a Wireless Body Sensor Networks. The medical data must be highly secured and possible intrusion has to be fully detected to proceed with the prevention phase. In this paper, we propose a new intrusion superframe schema for 802.15.6 standard to detect the cloning attack. The results proved the efficiency of our technique in detecting this type of attack based on 802.15.6 parameters performances coupled with frequency switching at the radio model.

  9. Sensing Danger: Innate Immunology for Intrusion Detection

    CERN Document Server

    Uwe, Aickelin

    2008-01-01

    The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms.

  10. A Survey on VANET Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2013-04-01

    Full Text Available In recent years, the security issues on Vehicular ad hoc networks (VANETs have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attackcountermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to “detect and notify” these newer attacks, i.e. “intrusion detection”. This article aims to present and classifycurrent techniques of Intrusion Detection System (IDS aware VANETs.

  11. Multilayer Statistical Intrusion Detection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Boudriga

    2008-12-01

    Full Text Available The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs. This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  12. Immune System Approaches to Intrusion Detection - A Review

    CERN Document Server

    Kim, Jungwon; Aickelin, Uwe; Greensmith, Julie; Tedesco, Gianni; Twycross, Jamie

    2008-01-01

    The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.

  13. A Review of Vapor Intrusion Models

    OpenAIRE

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulatio...

  14. Concentrating cesium-137 from seawater using resorcinol-formaldehyde resin for radioecological monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Egorin, Andrei; Tokar, Eduard; Tutov, Mikhail; Avramenko, Valentin [Institute of Chemistry FEBRAS, Vladivostok (Russian Federation); Far Eastern Federal Univ., Vladivostok (Russian Federation); Palamarchuk, Marina; Marinin, Dmitry [Institute of Chemistry FEBRAS, Vladivostok (Russian Federation)

    2017-04-01

    A method of preconcentrating cesium-137 from seawater using a resorcinol-formaldehyde resin, which enables one to optimize the ecological monitoring procedure, has been suggested. Studies of sorption of cesium-137 from seawater by resorcinol-formaldehyde resin have been performed, and it has been demonstrated that the cation exchanger is characterized by high selectivity with respect to cesium-137. It was found that the selectivity depended on the temperature of resin solidification and the seawater pH value. The maximal value of the cesium-137 distribution coefficient is equal to 4.1-4.5 x 10{sup 3} cm{sup 3} g{sup -1}. Under dynamic conditions, the ion-exchange resin capacity is 310-910 bed volumes depending on the seawater pH, whereas the efficiency of cesium removal exceeds 95%. The removal of more than 95% of cesium-137 has been attained using 1-3 M solutions of nitric acid: here, the eluate volume was 8-8.4 bed volumes. Application of 3 M solution of nitric acid results in resin degradation with the release of gaseous products.

  15. Artificial Intrusion Detection Techniques: A Survey

    Directory of Open Access Journals (Sweden)

    Ashutosh Gupta

    2014-08-01

    Full Text Available Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have been devised which are really very useful but they can only detect the attacks which already took place. These methods will always fail whenever there is a foreign attack which is not famous or which is new to the networking world. In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. In this paper we are going to cover what types evolutionary techniques have been devised and their significance and modification.

  16. A BOOSTING APPROACH FOR INTRUSION DETECTION

    Institute of Scientific and Technical Information of China (English)

    Zan Xin; Han Jiuqiang; Zhang Junjie; Zheng Qinghua; Han Chongzhao

    2007-01-01

    Intrusion detection can be essentially regarded as a classification problem,namely,distinguishing normal profiles from intrusive behaviors.This paper introduces boosting classification algorithm into the area of intrusion detection to learn attack signatures.Decision tree algorithm is used as simple base learner of boosting algorithm.Furthermore,this paper employs the Principle Component Analysis(PCA)approach,an effective data reduction approach,to extract the key attribute set from the original high-dimensional network traffic data.KDD CUP 99 data set is used in these exDeriments to demonstrate that boosting algorithm can greatly improve the clas.sification accuracy of weak learners by combining a number of simple"weak learners".In our experiments,the error rate of training phase of boosting algorithm is reduced from 30.2%to 8%after 10 iterations.Besides,this Daper also compares boosting algorithm with Support Vector Machine(SVM)algorithm and shows that the classification accuracy of boosting algorithm is little better than SVM algorithm's.However,the generalization ability of SVM algorithm is better than boosting algorithm.

  17. Intrusion Detection with Multi-Connected Representation

    Directory of Open Access Journals (Sweden)

    Abdelkader Khobzaoui

    2016-01-01

    Full Text Available Recently, considerable attention has been given to data mining techniques to improve the performance of intrusion detection systems (IDS. This has led to the application of various classification and clustering techniques for the purpose of intrusion detection. Most of them assume that behaviors, both normal and intrusions, are represented implicitly by connected classes. We state that such assumption isn't evident and is a source of the low detection rate and false alarm. This paper proposes a suitable method able to reach high detection rate and overcomes the disadvantages of conventional approaches which consider that behaviors must be closed to connected representation only. The main strategy of the proposed method is to segment sufficiently each behavior representation by connected subsets called natural classes which are used, with a suitable metric, as tools to build the expected classifier. The results show that the proposed model has many qualities compared to conventional models; especially regarding those have used DARPA data set for testing the effectiveness of their methods. The proposed model provides decreased rates both for false negative rates and for false positives.

  18. Intrusion detection using rough set classification

    Institute of Scientific and Technical Information of China (English)

    张连华; 张冠华; 郁郎; 张洁; 白英彩

    2004-01-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of"IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  19. Intrusion detection using rough set classification

    Institute of Scientific and Technical Information of China (English)

    张连华; 张冠华; 郁郎; 张洁; 白英彩

    2004-01-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modem learning algorithm,is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of"IF-THEN" rules,which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  20. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  1. Count out your intrusions: effects of verbal encoding on intrusive memories.

    Science.gov (United States)

    Krans, Julie; Naring, Gerard; Becker, Eni S

    2009-11-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development. Participants viewed an aversive film under one of three conditions: counting backwards in 3s ("verbal interference"), verbalising emotions and thoughts ("verbal enhancement"), or without an extra task. A dual-process account of PTSD would predict that verbal interference would increase intrusion frequency compared to no task, whereas verbal enhancement would lead to a decrease. In contrast, mainstream memory theory predicts a decrease in intrusion frequency from any concurrent task that diverts attention away from the trauma film. The main finding was that the verbal interference task led to a decrease in intrusive memories of the film compared to the other two conditions. This finding does not support a dual-process account of PTSD, but is in line with general theories of memory and attention.

  2. Identification of saline water intrusion in part of Cauvery deltaic region, Tamil Nadu, Southern India: using GIS and VES methods

    Science.gov (United States)

    Gnanachandrasamy, G.; Ramkumar, T.; Venkatramanan, S.; Chung, S. Y.; Vasudevan, S.

    2016-06-01

    We use electrical resistivity data arrayed in a 2715 km2 region with 30 locations to identify the saline water intrusion zone in part of Cauvery deltaic region, offshore Eastern India. From this dataset we are able to derive information on groundwater quality, thickness of aquifer zone, structural and stratigraphic conditions relevant to groundwater conditions, and permeability of aquifer systems. A total of 30 vertical electrode soundings (VES) were carried out by Schlumberger electrode arrangement to indicate complete lithology of this region using curve matching techniques. The electrical soundings exhibited that H and HK type curves were suitable for 16 shallow locations, and QH, KQ, K, KH, QQ, and HA curves were fit for other location. Low resistivity values suggested that saline water intrusion occurred in this region. According to final GIS map, most of the region was severely affected by seawater intrusion due to the use of over-exploitation of groundwater.The deteriorated groundwater resources in this coastal region should raise environmental and health concerns.

  3. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  4. Seawater Immersion Aggravates Burn Injury Causing Severe Blood Coagulation Dysfunction

    OpenAIRE

    2016-01-01

    This study aimed to investigate the endothelial function in a canine model of burn injury combined with seawater immersion. The model of burn injury was established. The dogs were randomly divided into four groups including dogs with burn injury (B group), or burn injury combined with seawater immersion (BI group), or only immersion in seawater (I group), or control animals with no injury or immersion (C group). The circulating endothelial cell (CEC) count and coagulation-fibrinolysis paramet...

  5. Application of Bayesian Dynamic Forecast in Anomaly Detection

    Institute of Scientific and Technical Information of China (English)

    YAN Hui; CAO Yuanda

    2005-01-01

    A macroscopical anomaly detection method based on intrusion statistic and Bayesian dynamic forecast is presented. A large number of alert data that cannot be dealt with in time are always aggregated in control centers of large-scale intrusion detection systems. In order to improve the efficiency and veracity of intrusion analysis, the intrusion intensity values are picked from alert data and Bayesian dynamic forecast method is used to detect anomaly. The experiments show that the new method is effective on detecting macroscopical anomaly in large-scale intrusion detection systems.

  6. Frequency of intrusive luxation in deciduous teeth and its effects.

    Science.gov (United States)

    Carvalho, Vivian; Jacomo, Diana Ribeiro; Campos, Vera

    2010-08-01

    The aims of this study were three-fold: First, to determine the prevalence of partial and total intrusion of the primary anterior teeth. Second, to investigate the sequelae of total and partial intrusive luxation in the primary anterior teeth and in their successors and finally, to establish whether the sequelae on both deciduous and permanent teeth were related to the child's age at the time of the intrusion. Data collected from records of 169 boys and 138 girls, all between the ages of zero and 10 years, who were undergoing treatment during the period of March 1996 to December 2004. The sample was composed of 753 traumatized deciduous teeth, of which 221 presented intrusive luxation injury. Children with ages ranging from one to 4 years were the most affected with falls being the main cause of intrusion. Of all intruded teeth 128 (57.9%) were totally intruded and 93 (42.1%) partially. Pulp necrosis/premature loss and color change were the most frequent sequelae in both total and partial intrusions. Concerning permanent dentition, the most common disturbances were color change and/or enamel hypoplasia. Both types of intrusion caused eruption disturbance. Total intrusion was the most frequent type of intrusive luxation. There was no significant correlation between the child's age at the time of intrusion and the frequency of subsequent sequela on primary injured teeth (P = 0.035), between the age at the time of injury and the developmental disturbances on permanent teeth (P = 0.140).

  7. Enhancement of Extraction of Uranium from Seawater

    Energy Technology Data Exchange (ETDEWEB)

    Al-Sheikhly, Mohamad [Univ. of Maryland, College Park, MD (United States); Dietz, Travis [Univ. of Maryland, College Park, MD (United States); Tsinas, Zois [Univ. of Maryland, College Park, MD (United States); Tomaszewski, Claire [Univ. of Maryland, College Park, MD (United States); Pazos, Ileana M. [Univ. of Maryland, College Park, MD (United States); Nigliazzo, Olga [The Catholic Univ. of America, Washington, DC (United States); Li, Weixing [The Catholic Univ. of America, Washington, DC (United States); Adel-Hadadi, Mohamad [Univ. of Maryland, College Park, MD (United States); Barkatt, Aaron [Univ. of Palermo (Italy)

    2016-04-01

    Even at a concentration of 3 μg/L, the world’s oceans contain a thousand times more uranium than currently know terrestrial sources. In order to take advantage of this stockpile, methods and materials must be developed to extract it efficiently, a difficult task considering the very low concentration of the element and the competition for extraction by other atoms in seawater such as sodium, calcium, and vanadium. The majority of current research on methods to extract uranium from seawater are vertical explorations of the grafting of amidoxime ligand, which was originally discovered and promoted by Japanese studies in the late 1980s. Our study expands on this research horizontally by exploring the effectiveness of novel uranium extraction ligands grafted to the surface of polymer substrates using radiation. Through this expansion, a greater understanding of uranium binding chemistry and radiation grafting effects on polymers has been obtained. While amidoxime-functionalized fabrics have been shown to have the greatest extraction efficiency so far, they suffer from an extensive chemical processing step which involves treatment with powerful basic solutions. Not only does this add to the chemical waste produced in the extraction process and add to the method’s complexity, but it also significantly impacts the regenerability of the amidoxime fabric. The approach of this project has been to utilize alternative, commercially available monomers capable of extracting uranium and containing a carbon-carbon double bond to allow it to be grafted using radiation, specifically phosphate, oxalate, and azo monomers. The use of commercially available monomers and radiation grafting with electron beam or gamma irradiation will allow for an easily scalable fabrication process once the technology has been optimized. The need to develop a cheap and reliable method for extracting uranium from seawater is extremely valuable to energy independence and will extend the quantity of

  8. Enhancement of Extraction of Uranium from Seawater

    Energy Technology Data Exchange (ETDEWEB)

    Al-Sheikhly, Mohamad [Univ. of Maryland, College Park, MD (United States); Dietz, Travis [Univ. of Maryland, College Park, MD (United States); Tsinas, Zois [Univ. of Maryland, College Park, MD (United States); Tomaszewski, Claire [Univ. of Maryland, College Park, MD (United States); Pazos, Ileana M. [Univ. of Maryland, College Park, MD (United States); Nigliazzo, Olga [The Catholic Univ. of America, Washington, DC (United States); Li, Weixing [The Catholic Univ. of America, Washington, DC (United States); Adel-Hadadi, Mohamad [Univ. of Maryland, College Park, MD (United States); Barkatt, Aaron [Univ. of Palermo (Italy)

    2016-04-01

    Even at a concentration of 3 μg/L, the world’s oceans contain a thousand times more uranium than currently know terrestrial sources. In order to take advantage of this stockpile, methods and materials must be developed to extract it efficiently, a difficult task considering the very low concentration of the element and the competition for extraction by other atoms in seawater such as sodium, calcium, and vanadium. The majority of current research on methods to extract uranium from seawater are vertical explorations of the grafting of amidoxime ligand which was originally discovered and promoted by Japanese studies in the late 1980s. Our study expands on this research horizontally by exploring the effectiveness of novel uranium extraction ligands grafted to the surface of polymer substrates using radiation. Through this expansion, a greater understanding of uranium binding chemistry and radiation grafting effects on polymers has been obtained. While amidoxime-functionalized fabrics have been shown to have the greatest extraction efficiency so far, they suffer from an extensive chemical processing step which involves treatment with powerful basic solutions. Not only does this add to the chemical waste produced in the extraction process and add to the method’s complexity, but it also significantly impacts the regenerability of the amidoxime fabric. The approach of this project has been to utilize alternative, commercially available monomers capable of extracting uranium and containing a carbon-carbon double bond to allow it to be grafted using radiation, specifically phosphate, oxalate, and azo monomers. The use of commercially available monomers and radiation grafting with electron beam or gamma irradiation will allow for an easily scalable fabrication process once the technology has been optimized. The need to develop a cheap and reliable method for extracting uranium from seawater is extremely valuable to energy independence and will extend the quantity of

  9. Experimental testbed for seawater channel characterization

    CERN Document Server

    Mena, Pablo; Quintana, Gara; Pérez-Álvarez, Iván; Jiménez, Eugenio; Zazo, Santiago; Pérez, Marina; Cardona, Laura; Hernández, J Joaquin

    2016-01-01

    Shallow seawaters are problematic for acoustic and optical communications. Sensor networks based on electromagnetic (EM) communications are evaluated in this environment. In order to characterize the subaquatic channel, several measurement systems have been designed, built and tested in the sea obtaining very reliable results. Experiments carried out with dipoles and loop antennas showed serious disagreement with the state of the art, especially when dipole antennas are used. Dipoles performance was poor while magnetic loops showed relevant results. Measurement system is described in detail and real attenuation of the subaquatic channel is obtained for several distances and antennas. Finally, measured and simulated results are compared with good agreement.

  10. The Index of Refraction of Seawater

    Science.gov (United States)

    1976-01-01

    SEAWATER Roswell W. Austin and George Halika!5 TECHNICAL REPORT Approved for public release; distribution unlimited SIO Ref. No. 76-1 I ;January 1976 P...PERFORMING ONG. REPORT NUMBER 7. AUTHOR(*) S. CONTRACT OR GRANT NUMSFRg’o) Roswell W. Austin and George Hlikas N 66857-73-C-01 46 9. PER~FORMING...slopes over sompe interval, namely, 10 nm for An/AX, 20C for An/AT, 50 kg/cm2 for An/Ap. In the caso of salinity the interval is immaterial since the

  11. Buffer Capacity, Ecosystem Feedbacks, and Seawater Chemistry under Global Change

    Directory of Open Access Journals (Sweden)

    Robert J. Toonen

    2013-09-01

    Full Text Available Ocean acidification (OA results in reduced seawater pH and aragonite saturation state (Ωarag, but also reduced seawater buffer capacity. As buffer capacity decreases, diel variation in seawater chemistry increases. However, a variety of ecosystem feedbacks can modulate changes in both average seawater chemistry and diel seawater chemistry variation. Here we model these effects for a coastal, reef flat ecosystem. We show that an increase in offshore pCO2 and temperature (to 900 µatm and + 3 °C can increase diel pH variation by as much as a factor of 2.5 and can increase diel pCO2 variation by a factor of 4.6, depending on ecosystem feedbacks and seawater residence time. Importantly, these effects are different between day and night. With increasing seawater residence time and increasing feedback intensity, daytime seawater chemistry becomes more similar to present-day conditions while nighttime seawater chemistry becomes less similar to present-day conditions. Recent studies suggest that carbonate chemistry variation itself, independent of the average chemistry conditions, can have important effects on marine organisms and ecosystem processes. Better constraining ecosystem feedbacks under global change will improve projections of coastal water chemistry, but this study shows the importance of considering changes in both average carbonate chemistry and diel chemistry variation for organisms and ecosystems.

  12. Managing saltwater intrusion in coastal arid regions and its societal implications for agriculture

    Science.gov (United States)

    Grundmann, Jens; Al-Khatri, Ayisha; Schütze, Niels

    2016-05-01

    Coastal aquifers in arid and semiarid regions are particularly at risk due to intrusion of salty marine water. Since groundwater is predominantly used in irrigated agriculture, its excessive pumping - above the natural rate of replenishment - strengthen the intrusion process. Using this increasingly saline water for irrigation, leads to a destruction of valuable agricultural resources and the economic basis of farmers and their communities. The limitation of resources (water and soil) in these regions requires a societal adaptation and change in behaviour as well as the development of appropriate management strategies for a transition towards stable and sustainable future hydrosystem states. Besides a description of the system dynamics and the spatial consequences of adaptation on the resources availability, the contribution combines results of an empirical survey with stakeholders and physically based modelling of the groundwater-agriculture hydrosystem interactions. This includes an analysis of stakeholders' (farmers and decision makers) behaviour and opinions regarding several management interventions aiming on water demand and water resources management as well as the thinking of decision makers how farmers will behave. In this context, the technical counter measures to manage the saltwater intrusion by simulating different groundwater pumping strategies and scenarios are evaluated from the economic and social point of view and if the spatial variability of the aquifer's hydrogeology is taken into consideration. The study is exemplarily investigated for the south Batinah region in the Sultanate of Oman, which is affected by saltwater intrusion into a coastal aquifer system due to excessive groundwater withdrawal for irrigated agriculture.

  13. RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M Salman Ashraf

    2012-03-01

    Full Text Available According to the growth rate of wireless technology, wireless mesh network (WMN usage is significantly increased according to its advantages like inexpensive, fast and easy deployment. WMN have ability, easy to create mesh and provide internet access in a cost efficient manner in any type of area which is unable or costly for wire mediums. Security attacks ratio is higher in wireless mesh network (WMN rather than other wireless or wire technologies. Spy /Malware infected computers generate malicious traffic, which uses valuable network resources and puts other systems at risk. Intrusion detection system (IDS is one of the possible solutions which timely detect the intrusions and alarm for appropriate action. But Limitation of many IDS of WMN are not timely response or unable to share with all nodes due its dynamic network topology and easy access to the radio medium. In this paper, proposed framework is timely detect intrusion and in response to share with all, in both standalone and cooperative manner. This paper also provides the basic sharing mechanism of intrusion for large scale bandwidth wireless mesh networks.

  14. A Non-Intrusive Algorithm for Sensitivity Analysis of Chaotic Flow Simulations

    Science.gov (United States)

    Blonigan, Patrick J.; Wang, Qiqi; Nielsen, Eric J.; Diskin, Boris

    2017-01-01

    We demonstrate a novel algorithm for computing the sensitivity of statistics in chaotic flow simulations to parameter perturbations. The algorithm is non-intrusive but requires exposing an interface. Based on the principle of shadowing in dynamical systems, this algorithm is designed to reduce the effect of the sampling error in computing sensitivity of statistics in chaotic simulations. We compare the effectiveness of this method to that of the conventional finite difference method.

  15. Model for seawater fouling and effects of temperature, flow velocity and surface free energy on seawater fouling☆

    Institute of Scientific and Technical Information of China (English)

    Dazhang Yang; Jianhua Liu; Xiaoxue E; Linlin Jiang

    2016-01-01

    A kinetic model was proposed to predict the seawater fouling process in the seawater heat exchangers. The new model adopted an expression combining depositional and removal behaviors for seawater fouling based on the Kern–Seaton model. The present model parameters include the integrated kinetic rate of deposition (kd) and the integrated kinetic rate of removal (kr), which have clear physical significance. A seawater-fouling monitoring de-vice was established to validate the model. The experimental data were wel fitted to the model, and the param-eters were obtained in different conditions. SEM and EDX analyses were performed after the experiments, and the results show that the main components of seawater fouling are magnesium hydroxide and aluminum hy-droxide. The effects of surface temperature, flow velocity and surface free energy were assessed by the model and the experimental data. The results indicate that the seawater fouling becomes aggravated as the surface tem-perature increased in a certain range, and the seawater fouling resistance reduced as the flow velocity of seawater increased. Furthermore, the effect of the surface free energy of metals was analyzed, showing that the lower sur-face free energy mitigates the seawater fouling accumulation.

  16. Microbial control of seawater by microfiltration

    Directory of Open Access Journals (Sweden)

    Wilmer Soler T

    2010-08-01

    Full Text Available Recent scientific literature presents seawater as a potential aid to solve a variety of health diseases in animals and human beings because by means of its mineral and trace elements content. In Colombia, Nicaragua and Spain it is collected in a natural way from de shore and drunk; however, this can represent a health risk because of the problems related to chemical and microbiological contamination. Microbial control of seawater allows the improvement of its microbiological quality. Objective: to compare the efficiency of three microbial control methods: microfiltration, solar exposition and quarantine. Methodology: 30 samples were collected in 20-liter high density polyethylene containers in three different places in the Colombian Atlantic coast. Results: 15 samples out of 30 showed the presence of bacteria such as E. coli and halophiles bacteria like Vibrio and Aeromonas. Microfiltration through ceramic filters of 0.5 µm produces disinfection in 100% of the samples but the quarantine for five months and solar disinfection are effective in 66 and 21% respectively. The latter requires certain weather conditions to achieve disinfection and it only allows managing small quantities of water. Dicussion: Considering chemical contamination in some places which cannot be controlled through disinfection methods, the collection of water offshore in clean places is suggested and then microfiltration treatment should be performed.

  17. NUMERICAL METHOD FOR THREE-DIMENSIONAL NONLINEAR CONVECTION-DOMINATED PROBLEM OF DYNAMICS OF FLUIDS IN POROUS MEDIA

    Institute of Scientific and Technical Information of China (English)

    YUAN Yi-rang; DU Ning; WANG Wen-qia; CHENG Ai-jie; HAN Yu-ji

    2006-01-01

    For the three-dimensional convection-dominated problem of dynamics of fluids in porous media, the second order upwind finite difference fractional steps schemes applicable to parallel arithmetic are put forward. Fractional steps techniques are needed to convert a multi-dimensional problem into a series of successive one-dimensional problems.Some techniques, such as calculus of variations, energy method, multiplicative commutation rule of difference operators, decomposition of high order difference operators, and the theory of prior estimates are adopted. Optimal order estimates are derived to determine the error in the second order approximate solution. These methods have already been applied to the numerical simulation of migration-accumulation of oil resources and predicting the consequences of seawater intrusion and protection projects.

  18. Rapid laccolith intrusion driven by explosive volcanic eruption

    Science.gov (United States)

    Castro, Jonathan M.; Cordonnier, Benoit; Schipper, C. Ian; Tuffen, Hugh; Baumann, Tobias S.; Feisel, Yves

    2016-11-01

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ~0.8 km3. Deformation and conduit flow models indicate laccolith depths of only ~20-200 m and overpressures (~1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  19. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  20. Multi-agent cooperative intrusion response in mobile adhoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Zou Futai; Jiang Xinghao; Li Jianhua

    2007-01-01

    The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.

  1. Network Intrusion Detection based on GMKL Algorithm

    Directory of Open Access Journals (Sweden)

    Li Yuxiang

    2013-06-01

    Full Text Available According to the 31th statistical reports of China Internet network information center (CNNIC, by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing the information in the computer system or network we can detect any possible behaviors that can damage the availability, integrity and confidentiality of the computer resource, and make timely treatment to these behaviors which have important research significance to improve the operation environment of network and network service. At present, the Neural Network, Support Vector machine (SVM and Hidden Markov Model, Fuzzy inference and Genetic Algorithms are introduced into the research of network intrusion detection, trying to build a healthy and secure network operation environment. But most of these algorithms are based on the total sample and it also hypothesizes that the number of the sample is infinity. But in the field of network intrusion the collected data often cannot meet the above requirements. It often shows high latitudes, variability and small sample characteristics. For these data using traditional machine learning methods are hard to get ideal results. In view of this, this paper proposed a Generalized Multi-Kernel Learning method to applied to network intrusion detection. The Generalized Multi-Kernel Learning method can be well applied to large scale sample data, dimension complex, containing a large number of heterogeneous information and so on. The experimental results show that applying GMKL to network attack detection has high classification precision and low abnormal practical precision.

  2. Intelligent Intrusion Detection System Model Using Rough Neural Network

    Institute of Scientific and Technical Information of China (English)

    YAN Huai-zhi; HU Chang-zhen; TAN Hui-min

    2005-01-01

    A model of intelligent intrusion detection based on rough neural network (RNN), which combines the neural network and rough set, is presented. It works by capturing network packets to identify network intrusions or malicious attacks using RNN with sub-nets. The sub-net is constructed by detection-oriented signatures extracted using rough set theory to detect different intrusions. It is proved that RNN detection method has the merits of adaptive, high universality,high convergence speed, easy upgrading and management.

  3. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    personnel information, credit card information theft, etc. The focus has shifted to attacks that can cause significant damage. Intrusion detection...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration...high processing power. 22 Machine 1’s network interface card connected to the mirroring port on the first port of the Ethernet switch. Machine 2’s

  4. Continental crust formation on early Earth controlled by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-05-01

    The global geodynamic regime of early Earth, which operated before the onset of plate tectonics, remains contentious. As geological and geochemical data suggest hotter Archean mantle temperature and more intense juvenile magmatism than in the present-day Earth, two crust-mantle interaction modes differing in melt eruption efficiency have been proposed: the Io-like heat-pipe tectonics regime dominated by volcanism and the “Plutonic squishy lid” tectonics regime governed by intrusive magmatism, which is thought to apply to the dynamics of Venus. Both tectonics regimes are capable of producing primordial tonalite-trondhjemite-granodiorite (TTG) continental crust but lithospheric geotherms and crust production rates as well as proportions of various TTG compositions differ greatly, which implies that the heat-pipe and Plutonic squishy lid hypotheses can be tested using natural data. Here we investigate the creation of primordial TTG-like continental crust using self-consistent numerical models of global thermochemical convection associated with magmatic processes. We show that the volcanism-dominated heat-pipe tectonics model results in cold crustal geotherms and is not able to produce Earth-like primordial continental crust. In contrast, the Plutonic squishy lid tectonics regime dominated by intrusive magmatism results in hotter crustal geotherms and is capable of reproducing the observed proportions of various TTG rocks. Using a systematic parameter study, we show that the typical modern eruption efficiency of less than 40 per cent leads to the production of the expected amounts of the three main primordial crustal compositions previously reported from field data (low-, medium- and high-pressure TTG). Our study thus suggests that the pre-plate-tectonics Archean Earth operated globally in the Plutonic squishy lid regime rather than in an Io-like heat-pipe regime.

  5. Continental crust formation on early Earth controlled by intrusive magmatism.

    Science.gov (United States)

    Rozel, A B; Golabek, G J; Jain, C; Tackley, P J; Gerya, T

    2017-05-18

    The global geodynamic regime of early Earth, which operated before the onset of plate tectonics, remains contentious. As geological and geochemical data suggest hotter Archean mantle temperature and more intense juvenile magmatism than in the present-day Earth, two crust-mantle interaction modes differing in melt eruption efficiency have been proposed: the Io-like heat-pipe tectonics regime dominated by volcanism and the "Plutonic squishy lid" tectonics regime governed by intrusive magmatism, which is thought to apply to the dynamics of Venus. Both tectonics regimes are capable of producing primordial tonalite-trondhjemite-granodiorite (TTG) continental crust but lithospheric geotherms and crust production rates as well as proportions of various TTG compositions differ greatly, which implies that the heat-pipe and Plutonic squishy lid hypotheses can be tested using natural data. Here we investigate the creation of primordial TTG-like continental crust using self-consistent numerical models of global thermochemical convection associated with magmatic processes. We show that the volcanism-dominated heat-pipe tectonics model results in cold crustal geotherms and is not able to produce Earth-like primordial continental crust. In contrast, the Plutonic squishy lid tectonics regime dominated by intrusive magmatism results in hotter crustal geotherms and is capable of reproducing the observed proportions of various TTG rocks. Using a systematic parameter study, we show that the typical modern eruption efficiency of less than 40 per cent leads to the production of the expected amounts of the three main primordial crustal compositions previously reported from field data (low-, medium- and high-pressure TTG). Our study thus suggests that the pre-plate-tectonics Archean Earth operated globally in the Plutonic squishy lid regime rather than in an Io-like heat-pipe regime.

  6. On a new benchmark for the simulation of saltwater intrusion

    Science.gov (United States)

    Stoeckl, Leonard; Graf, Thomas

    2015-04-01

    To date, many different benchmark problems for density-driven flow are available. Benchmarks are necessary to validate numerical models. The benchmark by Henry (1964) measures a saltwater wedge, intruding into a freshwater aquifer in a rectangular model. The Henry (1964) problem of saltwater intrusion is one of the most applied benchmarks in hydrogeology. Modelling saltwater intrusion will be of major importance in the future because investigating the impact of groundwater overexploitation, climate change or sea level rise are of key concern. The worthiness of the Henry (1964) problem was questioned by Simpson and Clement (2003), who compared density-coupled and density-uncoupled simulations. Density-uncoupling was achieved by neglecting density effects in the governing equations, and by considering density effects only in the flow boundary conditions. As both of their simulations showed similar results, Simpson and Clement (2003) concluded that flow patterns of the Henry (1964) problem are largely dictated by the applied flow boundary conditions and density-dependent effects are not adequately represented in the Henry (1964) problem. In the present study, we compare numerical simulations of the physical benchmark of a freshwater lens by Stoeckl and Houben (2012) to the Henry (1964) problem. In this new benchmark, the development of a freshwater lens under an island is simulated by applying freshwater recharge to the model top. Results indicate that density-uncoupling significantly alters the flow patterns of fresh- and saltwater. This leads to the conclusion that next to the boundary conditions applied, density-dependent effects are important to correctly simulate the flow dynamics of a freshwater lens.

  7. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  8. Forensic Analysis of Windows Registry Against Intrusion

    Directory of Open Access Journals (Sweden)

    Haoyang Xie

    2012-03-01

    Full Text Available Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains allof the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys thathave forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in intrusion detection.

  9. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1......) Tolerance, by elimination (eg. Zostera marina); where we found precipitation of sulfide as non-toxic elemental sulfur on the inner wall of the root lacunae. 2) Utilization (eg. Z. marina), where seagrasses detoxify and incorporate sulfides by active uptake and metabolize to sulfate, representing a non...

  10. Types of saltwater intrusion of the Changjiang Estuary

    Institute of Scientific and Technical Information of China (English)

    茅志昌; 沈焕庭; JamesT.Liu; D.Eisma

    2001-01-01

    The Changjiang Estuary is characterized by multi-order bifurcations, unsteady submerged sandbars, mid-channel sandbars, creeks and riffles. The following four types of saltwater intrusion are found: (1) direct intrusion from the sea; (2) intrusion during tidal flooding; (3) intrusion from tidal flats overflow; and (4) salt water coming upstream through other waterways. These result in a complicated temporal and spatial salinity distribution. A high chlorinity concentration zone exists from the Liuhekou to the Sidongkou along the South Branch. The salinity during neap tide or ordinary tide is higher than during spring tide.

  11. Study on sea water intrusion into palaeochannels on south coastal plain of the Laizhou Bay by the Bohai Sea

    Institute of Scientific and Technical Information of China (English)

    韩美

    2003-01-01

    The palaeochannel evolution in the study region is divided into four stages by such meth-ods as 14C dating. Sea water intrusion through palaeochannels has been studied as a focal point.Palaeochannds are the main passageways through which the sea water intrudes at a higher speed,through many means and in a changeable dynamic state.

  12. Modelling of a transmembrane evaporation module for desalination of seawater

    NARCIS (Netherlands)

    Guijt, Caroliene M.; Rácz, Imre G.; Heuven, van Jan Willem; Reith, Tom; Haan, de André B.

    1999-01-01

    Transmembrane evaporation (often called membrane distillation) carried out in a countercurrent flow module, in which incoming cold seawater is heated by the condensing product water flow, is a promising technology for low-cost seawater desalination. This paper presents a model for preliminary design

  13. Ultrasonic waves induce rapid zeolite synthesis in a seawater solution.

    Science.gov (United States)

    Belviso, Claudia; Cavalcante, Francesco; Fiore, Saverio

    2013-01-01

    The synthesis of zeolites from fly ash was performed through a low-temperature hydrothermal process with seawater. Compared with the results obtained using the same hydrothermal method but in the absence of sonication, the application of an ultrasonic pre-treatment to the conventional hydrothermal process with seawater reduces the crystallization temperature below that observed when hydrothermal synthesis is performed using distilled water.

  14. Corrosion of mild steel, copper and brass in crude oil / seawater mixture

    Digital Repository Service at National Institute of Oceanography (India)

    PrabhaDevi, S.; Sawant, S.S.; Wagh, A.B.

    Mild steel, copper and brass coupons were introduced in natural seawater containing varying amount of crude oil. Mild steel showed higher rate of corrosion in seawater containing oil and lower corrosion rate in natural as well as artificial seawater...

  15. Paleomagnetism of Siberian Trap Intrusions: Implications for the Timing and Intensity of the Magmatic Activity

    Science.gov (United States)

    Latyshev, Anton; Veselovskiy, Roman; Mirsayanova, Elina; Ulyahina, Polina

    2016-04-01

    Large Igneous Provinces (LIPs) are the areas of the exceptional interest due to associated Cu-Ni-Pt deposits, problems of the causal link between volcanic hazards and mass extinctions, and questions about mantle plume dynamics. High-precise U-Pb and 40Ar/39Ar dating determined the duration of the main phase of the most voluminous Siberian Trap province formation as 1-2 Ma (Kamo et al., 2003; Reichow et al., 2008). Recent paleomagnetic investigations demonstrated the predominance of pulsating volcanic activity during LIPs formation (Chenet et al., 2009; Pavlov et al., 2015). We perform the results of detailed paleomagnetic study of intrusive complexes from Tunguska syncline and Angara-Taseeva depression (Siberian Trap province). Our data taken together with the previous paleomagnetic results from trap intrusions revealed two different styles of magmatic activity. In the central part of Tunguska syncline emplacement of was rather even without sharp bursts. Local intrusive events coeval to volcanic eruptions took place within spatially limited areas. In contrast, in the periphery of Tunguska syncline several short and powerful peaks of magmatic activity happened on the background of weak prolonged magmatism. These events resulted in huge Padunsky, Tulunsky and some other sills in the southern part of the Siberian platform. According to our paleomagnetic data, the duration of such pulses did not exceed 10-100 thousand years. Taking into account our paleomagnetic data and recent U-Pb ages for Siberian trap intrusions from (Burgess, Bowring, 2015), it is possible to correlate intrusive complexes with the volcanic section. In particular, formation the largest Tulunsky and Padunsky sills happened right after the termination of the main phase of Permian-Triassic volcanic activity on the Siberian platform. This work was supported by grants RFBR # 16-35-60114 and 15-35-20599 and Ministry of Education and Science of the Russian Federation (grant 14.Z50.31.0017).

  16. Experimental and mechanism studies on seawater flue gas desulfurization

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Seawater flue gas desulfurization (Seawater FGD) process has a number of advantages, but the study on mechanism of seawater FGD is little. The effects of absorbing efficiency of SO2 by the constant component and part of trace transition elements in seawater are studied by the experiment. The results indicate that the effect factors of absorption of SO2 by seawater are alkaline, ion intensity, catalysis of Cl- and transition metal ions Fe, Mn. The degree of effect is alkaline > the catalysis of Cl-, Fe2+ and Mn > ion intensity. The mechanisms of catalysis oxidation for S(IV) by Cl, Feand Mnare discussed. According to the results, some measures can be used to improved the capability of desulfurization.

  17. Vapor intrusion from entrapped NAPL sources and groundwater plumes

    Science.gov (United States)

    Illangasekare, Tissa H.; Sakaki, Toshihiro; Christ, John; Petri, Bejamin; Sauck, Carolyn; Cihan, Abdullah

    2010-05-01

    Volatile organic compounds (VOC) are commonly found entrapped as non-aqueous phase liquids (NAPLs) in the soil pores or dissolved in groundwater at industrial waste sites and refineries. Vapors emitted from these contaminant sources readily disperse into the atmosphere, into air-filled void spaces within the soil, and migrate below surface structures, leading to the intrusion of contaminant vapors into indoor air through basements and other underground structures. This process referred to as vapor intrusion (VI) represents a potential threat to human health, and is a possible exposure pathway of concern to regulatory agencies. To assess whether this exposure pathway is present, remediation project managers often rely in part on highly simplified screening level models that do not take into consideration the complex flow dynamics controlled by subsurface heterogeneities and soil moisture conditions affected by the mass and heat flux boundary conditions at the land/atmospheric interface. A research study is under way to obtain an improved understanding of the processes and mechanisms controlling vapor generation from entrapped NAPL sources and groundwater plumes, their subsequent migration through the subsurface, and their attenuation in naturally heterogeneous vadose zones under various natural physical, climatic, and geochemical conditions. Experiments conducted at multiple scales will be integrated with analytical and numerical modeling and field data to test and validate existing VI theories and models. A set of preliminary experiments where the fundamental process of vapor generation from entrapped NAPL sources and dissolved plumes under fluctuating water were investigated in small cells and two-dimensional test tanks. In another task, intermediate scale experiments were conducted to generate quantitative data on how the heat and mass flux boundary conditions control the development of dynamic VI pathways. The data from the small cell and tank experiments were

  18. Advanced Trace Pattern For Computer Intrusion Discovery

    CERN Document Server

    Rahayu, S Siti; Shahrin, S; Zaki, M Mohd; Faizal, M A; Zaheera, Z A

    2010-01-01

    The number of crime committed based on the malware intrusion is never ending as the number of malware variants is growing tremendously and the usage of internet is expanding globally. Malicious codes easily obtained and use as one of weapon to gain their objective illegally. Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. For the purpose of this paper, it focused on malware intrusion and traditional worm namely sasser worm variants. The concept of trace pattern is created by fusing the attacker's and victim's perspective. Therefore, the objective of this paper is to propose a general worm trace pattern for attacker's, victim's and multi-step (attacker/victim)'s by combining both perspectives. These three proposed worm trace patterns can be extended into research areas in alert correlation and computer forens...

  19. Characterizing and Improving Distributed Intrusion Detection Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  20. A Bayesian Networks in Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    M. Mehdi

    2007-01-01

    Full Text Available Intrusion detection systems (IDSs have been widely used to overcome security threats in computer networks. Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms caused by incorrect classification of events in current systems. We propose a new approach of an anomaly Intrusion detection system (IDS. It consists of building a reference behaviour model and the use of a Bayesian classification procedure associated to unsupervised learning algorithm to evaluate the deviation between current and reference behaviour. Continuous re-estimation of model parameters allows for real time operation. The use of recursive Log-likelihood and entropy estimation as a measure for monitoring model degradation related with behavior changes and the associated model update show that the accuracy of the event classification process is significantly improved using our proposed approach for reducing the missing-alarm.

  1. Simulation of salinity intrusion along the Georgia and South Carolina coasts using climate-change scenarios

    Science.gov (United States)

    Conrads, Paul A.; Roehl, Edwin A.; Daamen, Ruby C.; Cook, John B.

    2013-01-01

    Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. Changes in streamflow patterns in conjunction with sea-level rise may change the salinity-intrusion dynamics of coastal rivers. Several municipal water-supply intakes are located along the Georgia and South Carolina coast that are proximal to the present day saltwater-freshwater interface of tidal rivers. Increases in the extent of salinity intrusion resulting from climate change could threaten the availability of freshwater supplies in the vicinity of these intakes. To effectively manage these supplies, water-resource managers need estimates of potential changes in the frequency, duration, and magnitude of salinity intrusion near their water-supply intakes that may occur as a result of climate change. This study examines potential effects of climate change, including altered streamflow and sea-level rise, on the dynamics of saltwater intrusion near municipal water-supply intakes in two coastal areas. One area consists of the Atlantic Intracoastal Waterway (AIW) and the Waccamaw River near Myrtle Beach along the Grand Strand of the South Carolina Coast, and the second area is on or near the lower Savannah River near Savannah, Georgia. The study evaluated how future sea-level rise and a reduction in streamflows can potentially affect salinity intrusion and threaten municipal water supplies and the biodiversity of freshwater tidal marshes in these two areas. Salinity intrusion occurs as a result of the interaction between three principal forces—streamflow, mean coastal water levels, and tidal range. To analyze and simulate salinity dynamics at critical coastal gaging stations near four municipal water-supply intakes, various data-mining techniques, including artificial neural network (ANN) models, were used to evaluate hourly streamflow, salinity, and coastal water-level data collected

  2. Energy Implications of Seawater Desalination (Invited)

    Science.gov (United States)

    Cooley, H.; Heberger, M. G.

    2013-12-01

    Freshwater has traditionally come from rivers, lakes, streams, and groundwater aquifers. As demand increases and climate change alters the location and timing of water supply, these traditional sources are becoming unavailable, more difficult, or increasingly expensive to develop. As a result, many communities are switching to alternative sources of water. Interest in pursuing seawater desalination is high in many coastal communities. In California, for example, 17 plants are proposed for development along the California coast and two in Mexico. Water managers are pursing desalination because is a local supply that can help diversify the water supply portfolio. Additionally, it is a reliable supply, which can be especially valuable during a drought. But removing the salt from seawater is an energy-intensive process that consumes more energy per gallon than most other water supply and treatment options. These energy requirements are key factors that will impact the extent and success of desalination in California. Energy requirements for seawater desalination average about 4.0 kWh per cubic meter (m3) of water produced. By comparison, the least energy-intensive options of local sources of groundwater and surface water require 0 - 0.90 kWh per m3; wastewater reuse, depending on treatment levels, may require from 0.26 - 2.2 kWh per m3. Beyond the electricity required for the desalination facility itself, producing any new source of water, including through desalination, increases the amount of energy required to deliver and use the water produced as well as collect, treat, and dispose of the wastewater generated. Energy is the largest single variable cost for a desalination plant, varying from one-third to more than one-half the cost of produced water. Building a desalination plant may reduce a water utility's exposure to water reliability risks at the added expense of an increase in exposure to energy price risk. In dependent on hydropower, electricity prices tend to

  3. Photochemical degradation of crude oil in seawater

    Institute of Scientific and Technical Information of China (English)

    YANG Guipeng; ZHANG Li; SUN Xiaojing; JING Weiwen

    2006-01-01

    Photochemical degradation of crude oil in seawater is an important issue in marine environmental protection and is studied in this work. Results showed that petroleum hydrocarbons could be effectively degraded by the irradiation of high-pressure mercury light or natural sunlight. Photochemical reaction was controlled by various factors including light source, aquatic medium, heavy metal ion and photo-sensitizer. The rate of photo-degradation was fast at the initial stage of exposure, exhibiting a first-order reaction kinetic behavior. However, after irradiation for a few hours, the concentration of water-soluble fraction (WSF) of petroleum hydrocarbons stabilized. For all experimental conditions, the range of the photo-degradation rate is from 0.001 3 to 0.005 7/min.

  4. Optimal conditions for bioremediation of oily seawater.

    Science.gov (United States)

    Zahed, Mohammad Ali; Aziz, Hamidi Abdul; Isa, Mohamed Hasnain; Mohajeri, Leila; Mohajeri, Soraya

    2010-12-01

    To determine the influence of nutrients on the rate of biodegradation, a five-level, three-factor central composite design (CCD) was employed for bioremediation of seawater artificially contaminated with crude oil. Removal of total petroleum hydrocarbons (TPH) was the dependent variable. Samples were extracted and analyzed according to US-EPA protocols. A significant (R(2)=0.9645, P<0.0001) quadratic polynomial mathematical model was generated. Removal from samples not subjected to optimization and removal by natural attenuation were 53.3% and 22.6%, respectively. Numerical optimization was carried out based on desirability functions for maximum TPH removal. For an initial crude oil concentration of 1g/L supplemented with 190.21 mg/L nitrogen and 12.71 mg/L phosphorus, the Design-Expert software predicted 60.9% hydrocarbon removal; 58.6% removal was observed in a 28-day experiment.

  5. Research on the dry intrusion accompanying the low vortex precipitation

    Institute of Scientific and Technical Information of China (English)

    YAO; XiuPing; WU; GuoXiong; ZHAO; BingKe; YU; YuBin; YANG; GuiMing

    2007-01-01

    By employing the 6.7μm satellite vapor cloud images and NCEP/NCAR 1°×1° reanalysis datasets, the characteristics and mechanism of the dry intrusion, as well as its impacts on the low vortex precipitation at the Meiyu front are explored in this paper. It is found that the formation,development and maintenance of the low vortex precipitation at the Meiyu front are closely related to the evolution of the dry intrusion. The dry intrusion is characterized by high potential vorticity (PV), low humidity and cold air. The dry intrusion exhibits as an obvious dark zone on vapor cloud images, an area in which atmospheric relative humidity is lower than 60%. However, the features of the dry intrusion on the vapor images are clearer than that of the humidity field, for the former is the digital vapor cloud images with high temporal and spatial resolution, and it can be used to explore the finer characteristics of the development, evolution and supplement of the intrusion during the development of the low vortex. The dry intrusion impacts accompanying the low vortex precipitation at the Meiyu front come from all levels of the troposphere, with the strongest intrusion located at the upper troposphere. The dry and cold air intrudes the vicinity of the low vortex from the upper isentropic surface to the lower one, slanting east-ward from lower to higher level. The low vortex precipitation region is usually situated in front of the dry intrusion where the relative humidity gradient is higher. The research also reveals that the mechanism of the dry intrusion is that the high potential vorticity descends from the upper troposphere to the lower level, therefore, the dry intrusion can be used as an important index of the high PV forcing. To the west of the low vortex precipitation, the upper level northerlies descend across the isentropic surface, then the dry cold advection can trigger the instable development in the midlow troposphere. The dry intru-sion enhances the low vortex

  6. Herbicide Persistence in Seawater Simulation Experiments.

    Directory of Open Access Journals (Sweden)

    Philip Mercurio

    Full Text Available Herbicides are detected year-round in marine waters, including those of the World Heritage listed Great Barrier Reef (GBR. The few previous studies that have investigated herbicide persistence in seawater generally reported half-lives in the order of months, and several studies were too short to detect significant degradation. Here we investigated the persistence of eight herbicides commonly detected in the GBR or its catchments in standard OECD simulation flask experiments, but with the aim to mimic natural conditions similar to those found on the GBR (i.e., relatively low herbicide concentrations, typical temperatures, light and microbial communities. Very little degradation was recorded over the standard 60 d period (Experiment 1 so a second experiment was extended to 365 d. Half-lives of PSII herbicides ametryn, atrazine, diuron, hexazinone and tebuthiuron were consistently greater than a year, indicating high persistence. The detection of atrazine and diuron metabolites and longer persistence in mercuric chloride-treated seawater confirmed that biodegradation contributed to the breakdown of herbicides. The shortest half-life recorded was 88 d for growth-regulating herbicide 2,4-D at 31°C in the dark, while the fatty acid-inhibitor metolachlor exhibited a minimum half-life of 281 d. The presence of moderate light and elevated temperatures affected the persistence of most of the herbicides; however, the scale and direction of the differences were not predictable and were likely due to changes in microbial community composition. The persistence estimates here represent some of the first appropriate data for application in risk assessments for herbicide exposure in tropical marine systems. The long persistence of herbicides identified in the present study helps explain detection of herbicides in nearshore waters of the GBR year round. Little degradation of these herbicides would be expected during the wet season with runoff and associated

  7. 网络入侵检测技术研究(下)%Research on Intrusion Detection Technology of Network(Ⅱ)

    Institute of Scientific and Technical Information of China (English)

    赵红宇

    2002-01-01

    入侵检测是近几年发展起来的新型网络安全策略,它实现了网络系统安全的动态检测和监控.文章介绍了入侵检测系统的体系结构和检测方法,指出了入侵检测系统应具有的功能以及入侵检测系统的分类,分析了现有的入侵检测技术以及多种检测技术在入侵检测系统中的应用.%In recent years, intrusion detection technology is regarded as one of the new strategy for network security. It can realize dynamic protection in computer network. This paper introducas the architecture of Intrusion Detection System and general methods of Intrusion Detection. The functions of Intrusion Detection System are pointed out,and classification of Intrusion Detection System is introducad. This paper analyzes the technology of Intrusion Detection at present ,and the application of detecting technology in Intrusion Detection.

  8. Sulfide intrusion in the tropical seagrasses Thalassia testudinum and Syringodium filiforme

    DEFF Research Database (Denmark)

    Holmer, Marianne; Pedersen, Ole; Krause-Jensen, Dorte

    2009-01-01

    -derived sulfides. The sulfide intrusion was negatively correlated to the turnover of sulfides in the sediments regulated by both plant parameters and sediment sulfur pools. Sediment iron content played an indirect role by affecting sulfide turnover rates. Leaf production was negatively correlated with sulfide......Sulfur and oxygen dynamics in the seagrasses Thalassia testudinum and Syringodium filiforme and their sediments were studied in the US Virgin Islands (USVI) in order to explore sulfide intrusion into tropical seagrasses. Four study sites were selected based on the iron concentration in sediments...... and on proximity to anthropogenic nutrient sources. Meadow characteristics (shoot density, above- and below-ground biomass, nutrient content) were sampled along with sediment biogeochemistry. Sulfide intrusion was high in T. testudinum, as up to 96% of total sulfur in the plant was derived from sediment...

  9. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities.

  10. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    Intensive measurements of salt intrusion are taken at high and low waters during spring and neap tide for each month respectively from June 2007 to May 2008. Salt intrusion length at high water varied from 10 km in monsoon 2008 to more than 40 km...

  11. An improved unsupervised clustering-based intrusion detection method

    Science.gov (United States)

    Hai, Yong J.; Wu, Yu; Wang, Guo Y.

    2005-03-01

    Practical Intrusion Detection Systems (IDSs) based on data mining are facing two key problems, discovering intrusion knowledge from real-time network data, and automatically updating them when new intrusions appear. Most data mining algorithms work on labeled data. In order to set up basic data set for mining, huge volumes of network data need to be collected and labeled manually. In fact, it is rather difficult and impractical to label intrusions, which has been a big restrict for current IDSs and has led to limited ability of identifying all kinds of intrusion types. An improved unsupervised clustering-based intrusion model working on unlabeled training data is introduced. In this model, center of a cluster is defined and used as substitution of this cluster. Then all cluster centers are adopted to detect intrusions. Testing on data sets of KDDCUP"99, experimental results demonstrate that our method has good performance in detection rate. Furthermore, the incremental-learning method is adopted to detect those unknown-type intrusions and it decreases false positive rate.

  12. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  13. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The non-intr

  14. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  15. Experimental research on seawater desalination concentrated seawater for producing chlorine by electrolysis%海水淡化浓海水用于电解制氯试验

    Institute of Scientific and Technical Information of China (English)

    聂鑫; 龙潇

    2012-01-01

    The problem of producing chlorine by electrolysis of seawater includes low production rate and low current efficiency. The temperature and salinity of hydropower generation desalination concentrated seawater are higher than seawater. As the raw material water, the concentrated seawater and sea water were adopted into the small electrolytic sodium hypochlorite generator. The dynamic simulation test shows that the concentrated salt water can improve the test device yield rate of chlorine and current efficiency, and can produce more salt electrolysis scale which can be removed by pickling. The test provides a feasible technical way for improving the electrolysis efficiency of the system and for the industrial application of chlorine electrolysis concentrated seawater.%海水直接用于电解制氯存在有效氯产率低和电流效率低等问题,而水电联产海水淡化装置排放的浓海水温度和盐度均高于海水,应有利于电解制氯.为此,进行了动态对比模拟试验,将浓海水和海水作为原料水分别通入小型次氯酸钠发生器,测定有效氯产率和电流效率,观察、分析试验装置的结垢及酸洗情况.试验结果表明,浓海水较海水能够有效提高试验装置的有效氯产率和电流效率,电解浓海水产生的较多盐垢可以通过盐酸清洗而彻底去除.试验为提高次氯酸钠发生装置的电解效率以及浓海水的工业化应用提供了一条可行的技术路径.

  16. An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy

    Directory of Open Access Journals (Sweden)

    Anusha K

    2013-06-01

    Full Text Available Mobile ad-hoc Network is a self organized wireless network which has a dynamic topology where nodes can be join or leave the network at anytime with large number of nodes. Due to its infrastructure less,dynamic topology and lack of centralization it is vulnerable to many security attacks. In this paper, we propose to detect the attack by using an Intrusion detection system that uses intuitionistic fuzzy logic which aims to detect distrust behavior of node and identify the attacks if it seems to be an attack based on given rules.

  17. Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

    KAUST Repository

    Wang, Wei

    2014-06-22

    In this work, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-managing: self-labeling, self-updating and self-adapting. Our framework employs the Affinity Propagation (AP) algorithm to learn a subject’s behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifies anomalies. Two large real HTTP traffic streams collected in our institute as well as a set of benchmark KDD’99 data are used to validate the framework and the method. The test results show that the autonomic model achieves better results in terms of effectiveness and efficiency compared to adaptive Sequential Karhunen–Loeve method and static AP as well as three other static anomaly detection methods, namely, k-NN, PCA and SVM.

  18. P2PRPIPS: A P2P and Reverse Proxy Based Web Intrusion Protection System

    Directory of Open Access Journals (Sweden)

    Qian He

    2013-03-01

    Full Text Available In order to protect web sites with various program languages and high throughput efficiently, a web Intrusion Protection System (IPS based on P2P and reverse proxy architecture was designed and implemented. The P2P based web intrusion protection system has multi web firewall nodes and nodes with same program cooperate with each other under P2P architecture. Some nodes work as net flow allocator and some work as detector and they can convert to each other according to the requirements dynamically. The WAF program has the characteristics of session keeping and load balancing and it can detect messages by using expert library and many plug-in components. The technology of reverse proxy is used for response the web request. Experiments show that the system can effectively prevent attacks form application layer. It is proved more efficient and stable than single node.

  19. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

    CERN Document Server

    Greensmith, Julie; Twycross, Jamie

    2010-01-01

    In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, anti-virus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological parad...

  20. Network Security using Linux Intrusion Detection System / IJORCS

    Directory of Open Access Journals (Sweden)

    Arul Anitha

    2011-12-01

    Full Text Available Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic being a Linux based Intrusion Detection System(LIDs, takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.

  1. Intrusive Thoughts Mediate the Association between Neuroticism and Cognitive Function.

    Science.gov (United States)

    Munoz, Elizabeth; Sliwinski, Martin J; Smyth, Joshua M; Almeida, David M; King, Heather A

    2013-11-01

    Although research has established a negative association between trait neuroticism and cognition, little is known about the mechanisms that underlie this relationship. We examined the tendency to experience intrusive thoughts and negative affect as potential mediators of the relationship between neuroticism and cognitive performance. We hypothesized that the tendency to experience intrusive thoughts reflects ineffective attentional control and would account for the relationship between neuroticism and cognitive performance over and above the mediating effect of negative affect. Three hundred seventeen adults (Mage =49.43) completed a series of attention-demanding cognitive tasks as well as self-report measures of intrusive thoughts, negative affect, and neuroticism. Intrusive thoughts mediated the association between trait neuroticism and cognitive performance beyond negative affect. These findings are consistent with the hypothesis that the tendency to experience intrusive thoughts is a mechanism through which trait neuroticism influences cognitive performance.

  2. Intrusion-Tolerant Based Survivable Model of Database System

    Institute of Scientific and Technical Information of China (English)

    ZHUJianming; WANGChao; MAJianfeng

    2005-01-01

    Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Intrusiontolerant systems extend traditional secure systems to be able to survive or operate through attacks, thus it is an approach for achieving survivability. This paper proposes survivable model of database system based on intrusion-tolerant mechanisms. The model is built on three layers security architecture, to defense intrusion at the outer layer, to detect intrusion at the middle layer, and to tolerate intrusion at the inner layer. We utilize the techniques of both redundancy and diversity and threshold secret sharing schemes to implement the survivability of database and to protect confidential data from compromised servers in the presence of intrusions. Comparing with the existing schemes, our approach has realized the security and robustness for the key functions of a database system by using the integration security strategy and multiple security measures.

  3. Multi-core Processors based Network Intrusion Detection Method

    Directory of Open Access Journals (Sweden)

    Ziqian Wan

    2012-09-01

    Full Text Available It is becoming increasingly hard to build an intrusion detection system (IDS, because of the higher traffic throughput and the rising sophistication of attacking. Scale will be an important issue to address in the intrusion detection area. For hardware, tomorrow’s performance gains will come from multi-core architectures in which a number of CPU executes concurrently. We take the advantage of multi-core processors’ full power for intrusion detection in this work. We present an intrusion detection system based on the Snort open-source IDS that exploits the computational power of MIPS multi-core architecture to offload the costly pattern matching operations from the CPU, and thus increase the system’s processing throughput. A preliminary experiment demonstrates the potential of this system. The experiment results indicate that this method can be used effectively to speed up intrusion detection systems.

  4. Uranium from Seawater Program Review; Fuel Resources Uranium from Seawater Program DOE Office of Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-07-01

    For nuclear energy to remain sustainable in the United States, economically viable sources of uranium beyond terrestrial ores must be developed. The goal of this program is to develop advanced adsorbents that can extract uranium from seawater at twice the capacity of the best adsorbent developed by researchers at the Japan Atomic Energy Agency (JAEA), 1.5 mg U/g adsorbent. A multidisciplinary team from Oak Ridge National Laboratory, Lawrence Berkeley National Laboratory, Pacific Northwest National Laboratory, and the University of Texas at Austin was assembled to address this challenging problem. Polymeric adsorbents, based on the radiation grafting of acrylonitrile and methacrylic acid onto high surface-area polyethylene fibers followed by conversion of the nitriles to amidoximes, have been developed. These poly(acrylamidoxime-co-methacrylic acid) fibers showed uranium adsorption capacities for the extraction of uranium from seawater that exceed 3 mg U/g adsorbent in testing at the Pacific Northwest National Laboratory Marine Sciences Laboratory. The essence of this novel technology lies in the unique high surface-area trunk material that considerably increases the grafting yield of functional groups without compromising its mechanical properties. This technology received an R&D100 Award in 2012. In addition, high surface area nanomaterial adsorbents are under development with the goal of increasing uranium adsorption capacity by taking advantage of the high surface areas and tunable porosity of carbon-based nanomaterials. Simultaneously, de novo structure-based computational design methods are being used to design more selective and stable ligands and the most promising candidates are being synthesized, tested and evaluated for incorporation onto a support matrix. Fundamental thermodynamic and kinetic studies are being carried out to improve the adsorption efficiency, the selectivity of uranium over other metals, and the stability of the adsorbents. Understanding

  5. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  6. Multimodal Evolution Approach to Multidimensional Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Weng Guang'an; Yu Shengsheng; Zhou Jingli

    2006-01-01

    An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors,respectively, and experiments performed on two real data sets ( machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stability, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.

  7. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  8. Evaluation and classification of seawater corrosiveness by environmental factors

    Institute of Scientific and Technical Information of China (English)

    ZHU Xiangrong; HUANG Guiqiao

    2005-01-01

    According to the data of main environmental factors and the depth of localized corrosion of carbon steel and low alloy steels in China seas, combined with the result of grey interrelation analysis, double-factor method was proposed to evaluate and classify seawater corrosiveness. According to the temperature of seawater and the biologically adhesive area on steels, the corrosiveness of seawater from low to high level is classified into five levels (C 1-C5), which was identified by the data of corrosion depth of carbon steel immersed in water for one year.

  9. On the physical chemistry of seawater with deviating ion composition

    Energy Technology Data Exchange (ETDEWEB)

    Feistel, R. [Rostock Univ., Warnemuende (Germany). Inst. fuer Ostseeforschung

    1998-04-01

    The salt composition in natural seawaters is not strictly conservative. Physico-chemical properties of the mixed electrolyte ``standard seawater`` and their variations with ionic composition are briefly reviewed. It is shown that a ``same absolute salinity`` rule, known from seawater densities, may lead to good results for sound speeds, too. Refractive index measurements have now become sufficiently precise to detect local deviations of ion abundances along with routine ocean profiling. The question is discussed which quantities/formulas still need to be quantitatively determined for this purpose, and which theoretical, empirical or experimental aids can be applied. (orig.) 52 refs.

  10. Potential for saltwater intrusion into the Upper Floridan aquifer, Hernando and Manatee counties, Florida

    Science.gov (United States)

    Mahon, G.L.

    1989-01-01

    Pumpage from the Upper Floridan aquifer has caused a lowering of the potentiometric surface and has increased potential for saltwater intrusion into the aquifer in coastal areas of west-central Florida. Groundwater withdrawals are likely to increase because of expected population growth, especially in coastal areas. To increase the understanding of the potential and mechanics of saltwater intrusion, two sites were selected for study. Data were collected at each site from a centrally located deep well, and digital models were developed to simulate groundwater flow and solute transport. The northern site is in Hernando County near the town of Aripeka. The test well in the area was drilled about 1 mile from the coast to a depth of 820 ft. Freshwater was present in the carbonate rock aquifer to a depth of about 500 ft and saltwater occurred from 560 ft to the base of the aquifer at about 750 ft. Between the freshwater and saltwater is the zone of transition, also referred to as the freshwater-saltwater interface. The southern site is in Manatee County near the town of Rubonia. Drilling of the test well was completed at 1,260 ft, just below the base of the Upper Floridan aquifer. The transition zone in this well occurs between 875 and 975 ft within a highly permeable zone. Digital simulations show flow patterns similar to the cyclic flow of seawater and interface theory. Simulations have shown that saltwater contamination of coastal wells would not be noticed as quickly as water-level declines resulting from inland pumpage. (USGS)

  11. An Enhanced Intrusion Detection System for Multitier Dynamic Web Applications

    Directory of Open Access Journals (Sweden)

    S.Sasireka

    2014-05-01

    Full Text Available We present an efficient approach, a system used to detect attacks in multitiered web services and classify through Hierarchal clustering Algorithm. Our approach can create normality models of isolated user sessions that include both the web front-end (HTTP and back-end (File or SQL network transactions with respect to Data volumes and Classify them. Implements a lightweight virtualization technique to assign each user’s web session to a dedicated container, an isolated virtual computing environment. We use the cluster algorithm to accurately associate the web request with the subsequent DB queries. DoubleGuard can build a causal mapping profile by taking both the webserver and DB traffic into account. Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitiered design wherein the webserver runs the application front-end logic and data are outsourced to a database or file server. In this paper, we present DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. By monitoring both web and subsequent database requests, we are able to ferret out attacks that an independent IDS would not be able to identify. Furthermore, we quantify the limitations of any multitier IDS in terms of training sessions and functionality coverage. We implemented DoubleGuard using an Apache webserver with MySQL and lightweight virtualization.

  12. Dynamic Modeling of Internet Traffic for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Jonckheere Edmond

    2007-01-01

    Full Text Available Computer network traffic is analyzed via mutual information techniques, implemented using linear and nonlinear canonical correlation analyses, with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP, FTP, and CBR traffic shows that flooding attacks are accompanied by a change of mutual information, either at the link being flooded or at another upstream or downstream link. This observation appears to be topology independent, as the technique is demonstrated on the so-called parking-lot topology, random 50-node topology, and 100-node transit-stub topology. This technique is also employed to detect UDP flooding with low false alarm rate on a backbone link. These results indicate that a change in mutual information provides a useful detection criterion when no other signature of the attack is available.

  13. Extreme seawater compositions during Oceanic Anoxic Events

    Science.gov (United States)

    Cohen, A.; Bottini, C.; Dickson, A. J.; Izon, G. J.; Coe, A. L.

    2012-12-01

    For almost the entire duration of the Phanerozoic, the oceans have remained well oxygenated and highly conducive to the development of animal and plant life. However, there have been relatively brief intervals, known as Oceanic Anoxic Events (OAEs), when a very significant expansion of low-oxygen regions occurred throughout the world's oceans. OAEs were characterised by highly atypical seawater chemistry, as reflected in the chemical and isotopic compositions of contemporaneous sediments and fossil remains. These oxygen-deficient intervals also exerted profound pressures on many marine species as indicated by major changes in species populations and distributions. High-resolution chemical and isotopic data recovered from marine sediments and sedimentary rocks, together with biotic information, provide us with the best means of understanding the significance of OAEs and their place in the evolution of the Earth system. We present new Mo- and Os-isotope and geochemical data from OAE 1a (early Cretaceous), which help define how this event evolved in relation to the other major environmental parameters - including global warming, continental weathering and Ontong-Java volcanism - of that time. We compare these new observations with published results from other Mesozoic OAEs and the PETM. Recently published Os-isotope data from DSDP site 463 (mid-Pacific) [1] and northern Italy [1, 2] show that the Os budget of the oceans was dominated for a period of c. 880 ka during OAE 1a by the hydrothermal flux of unradiogenic Os from the Ontong-Java province. The observation of identical Os-isotope compositions at these two very distant sites indicates that seawater was well mixed at that time. Over the same interval, the seawater Mo-isotope composition, based upon well-preserved samples from Italy, was persistently atypical, with δ98/95Mo ranging between -0.7 and +0.7 permil [3]. All the samples analysed here accumulated under highly anoxic conditions and contain highly abundant

  14. Groundwater salinity in a floodplain forest impacted by saltwater intrusion.

    Science.gov (United States)

    Kaplan, David A; Muñoz-Carpena, Rafael

    2014-11-15

    Coastal wetlands occupy a delicate position at the intersection of fresh and saline waters. Changing climate and watershed hydrology can lead to saltwater intrusion into historically freshwater systems, causing plant mortality and loss of freshwater habitat. Understanding the hydrological functioning of tidally influenced floodplain forests is essential for advancing ecosystem protection and restoration goals, however finding direct relationships between hydrological inputs and floodplain hydrology is complicated by interactions between surface water, groundwater, and atmospheric fluxes in variably saturated soils with heterogeneous vegetation and topography. Thus, an alternative method for identifying common trends and causal factors is required. Dynamic factor analysis (DFA), a time series dimension reduction technique, models temporal variation in observed data as linear combinations of common trends, which represent unexplained common variability, and explanatory variables. DFA was applied to model shallow groundwater salinity in the forested floodplain wetlands of the Loxahatchee River (Florida, USA), where altered watershed hydrology has led to changing hydroperiod and salinity regimes and undesired vegetative changes. Long-term, high-resolution groundwater salinity datasets revealed dynamics over seasonal and yearly time periods as well as over tidal cycles and storm events. DFA identified shared trends among salinity time series and a full dynamic factor model simulated observed series well (overall coefficient of efficiency, Ceff=0.85; 0.52≤Ceff≤0.99). A reduced multilinear model based solely on explanatory variables identified in the DFA had fair to good results (Ceff=0.58; 0.38≤Ceff≤0.75) and may be used to assess the effects of restoration and management scenarios on shallow groundwater salinity in the Loxahatchee River floodplain.

  15. Optimization of gravity-driven membrane (GDM) filtration process for seawater pretreatment.

    Science.gov (United States)

    Wu, Bing; Hochstrasser, Florian; Akhondi, Ebrahim; Ambauen, Noëmi; Tschirren, Lukas; Burkhardt, Michael; Fane, Anthony G; Pronk, Wouter

    2016-04-15

    Seawater pretreatment by gravity-driven membrane (GDM) filtration at 40 mbar has been investigated. In this system, a beneficial biofilm develops on the membrane that helps to stabilize flux. The effects of membrane type, prefiltration and system configuration on stable flux, biofilm layer properties and dissolved carbon removal were studied. The results show that the use of flat sheet PVDF membranes with pore sizes of 0.22 and 0.45 μm in GDM filtration achieved higher stabilized permeate fluxes (7.3-8.4 L/m(2)h) than that of flat sheet PES 100 kD membranes and hollow fibre PVDF 0.1 μm membranes. Pore constriction and cake filtration were identified as major membrane fouling mechanisms, but their relative contributions varied with filtration time for the various membranes. Compared to raw seawater, prefiltering of seawater with meshes at sizes of 10, 100 and 1000 μm decreased the permeate flux, which was attributed to removal of beneficial eukaryotic populations. Optical coherence tomography (OCT) showed that the porosity of the biofouling layer was more significantly related with permeate flux development rather than its thickness and roughness. To increase the contact time between the biofilm and the dissolved organics, a hybrid biofilm-submerged GDM reactor was evaluated, which displayed significantly higher permeate fluxes than the submerged GDM reactor. Although integrating the biofilm reactor with the membrane system displayed better permeate quality than the GDM filtration cells, it could not effectively reduce dissolved organic substances in the seawater. This may be attributed to the decomposition/degradation of solid organic substances in the feed and carbon fixation by the biofilm. Further studies of the dynamic carbon balance are required.

  16. Contribution of seawater recirculation to submarine groundwater discharge and related nutrient fluxes in two tropical bays

    Science.gov (United States)

    Vautier, Camille; Dulaiova, Henrietta

    2017-04-01

    Hawaiian coastal waters suffer from excess terrestrial nutrient loading, most of which comes from submarine groundwater discharge (SGD). This study quantifies and distinguishes the role of the fresh terrestrial and tidally pumped salt water components of SGD into the nearshore zone of two reefs on the island of Oahu: Maunalua Bay and Kāneohe Bay. The two components of SGD are characterized using isotopic techniques, and the study mainly focuses on the less understood recirculation component. A two-step approach is implemented: first, a conceptual model of groundwater circulation is established; second, nutrient fluxes associated with seawater recirculation are quantified. Groundwater circulation through the beach berm is quantified and characterized using 222Rn and 224Ra activity measurements. Nutrient fluxes are obtained by coupling nutrient concentration measurements and discharge estimates. The isotopic signatures inform us about the influence of the tidal cycle on groundwater circulation. 222Rn, 224Ra, and δ18O isotopes are used to derive apparent ages of the infiltrated seawater and allow us to quantify recirculation rates. The method is also complemented with the use of silicate concentration as tracers of the recirculation process. The trends in apparent ages observed in pore water in Maunalua match previously published conceptual groundwater circulation models and show a sequentially aging pore water circulation loop. However, the ages obtained in Kāneohe suggest a different tidal pumping dynamic that lacks a circulation loop, perhaps resulting from the absence of freshwater discharge. Derived nutrient fluxes show that the autochthonous production of inorganic nitrogen and phosphorus that occurs during seawater recirculation has a significant impact on nutrient cycles in the nearshore areas of the bays. This result suggests that seawater recirculation should be taken into account in biogeochemical studies of coastal areas.

  17. Evaluation of the effects of sea-level change and coastal canal management on saltwater intrusion in the Biscayne aquifer of south Florida, USA

    Science.gov (United States)

    Hughes, J. D.; Sifuentes, D. F.; White, J.

    2015-12-01

    Sea-level increases are expected to have an effect on the position of the freshwater-saltwater interface in the Biscayne aquifer in south Florida as a result of the low topographic relief of the area and high rates of groundwater withdrawal from the aquifer. To study the effects that future sea-level increases will have on saltwater intrusion in the Biscayne aquifer in Broward County, Florida, a three-dimensional, variable-density, groundwater-flow and transport model was developed. The model was calibrated to observed groundwater heads and chloride concentrations for a 62-year period that includes historic increases in sea level, development of a surface-water management system to control flooding, and increases in groundwater withdrawals as the area transitioned from agricultural to urban land uses. Sensitivity analyses indicate that downward leakage of saltwater from coastal canals and creeks was the primary source of saltwater to the Biscayne aquifer during the last 62-years in areas where the surface-water system is not actively managed and is tidally influenced. In areas removed from the coastal canals and creeks or under active surface-water management, historic groundwater withdrawals were the primary cause of saltwater intrusion into the aquifer. Simulation of future conditions suggests that possible increases in sea level will result in additional saltwater intrusion. Model scenarios suggest that additional saltwater intrusion will be greatest in areas where coastal canals and creeks were historically the primary source of seawater. Future saltwater intrusion in those areas, however, may be reduced by relocation of salinity-control structures.

  18. Tyrihans SRSWI (subsea raw seawater injection)

    Energy Technology Data Exchange (ETDEWEB)

    Time, Nils Petter

    2010-07-01

    By the summer of 2010, Statoil will have installed and commissioned a 2 x 2.5 MW electrical subsea pump system for injection of seawater on the Tyrihans field. Powered from the Kristin platform, the system will pump untreated water directly from the sea into one well at a rate of 14000 m3/day to achieve an Increased Oil Recovery of 10%. The pump system was designed and delivered by Aker Solutions and interfaces the Tyrihans subsea production system delivered by FMC, a power umbilical from Nexans as well as the Kristin topside facilities. In addition to qualification testing, the SRSWI system underwent extensive system testing, including performance- and long term testing, and function testing of the control system from FMC and Kongsberg Maritime. The subsea modules of the SRSWI system and the power umbilical were installed by Acergy's vessel Scandi Acergy, while the topside transformers and variable speed drives were installed on Kristin by Aker Reinertsen, the topside modifications and hook-up contractor. The many interfaces in this project required close and constructive cooperation between the parties in all phases of the development. This paper summarises the experiences from the project. (Author)

  19. Photochemical production of carbon disulphide in seawater

    Science.gov (United States)

    Xie, Huixiang; Moore, Robert M.; Miller, William L.

    1998-03-01

    It is generally accepted that the ocean is an important source for atmospheric CS2, which makes a major contribution to the formation of COS in the atmosphere. The processes producing CS2 in seawater, however, are essentially unknown. We report for the first time to our knowledge that marine photochemical reactions are identified as a significant source for oceanic CS2. Apparent quantum yield spectra of CS2 production were obtained using water samples collected in the northeast Atlantic. Results indicate that it is mainly UV solar radiation (290-340 nm) which is responsible for CS2 photoproduction. The photoproduction rate of CS2 is positively correlated with absorbance at 350 nm, suggesting that the reactions are mediated by chromophoric dissolved organic matter (CDOM). Laboratory irradiations have confirmed that cysteine and cystine are efficient precursors of CS2 and that OH radicals are likely to be important intermediates. Both the field survey and laboratory work point to similar mechanisms for photochemical production of CS2 and COS in marine waters. A CS2 production rate of 0.49 Tg yr-1 for the world oceans has been estimated using the quantum yield spectra from this work and the sea surface light field provided by Leifer [1988]. This estimate is of the same order of magnitude as the present estimate of the CS2 flux from the ocean to the atmosphere based on surface saturation and wind speed.

  20. A closed recirculated sea-water system

    Science.gov (United States)

    1967-01-01

    Study of a virus disease in the chinook salmon (Oncorhynchus tshawytscha) necessitated the use of a marine environment to study the long range effects of the disease and to complete the life cycle of its etiologic agent. A closed recirculated sea-water system was designed for use under experimental laboratory conditions so that controlled studies of the disease could be made. As others may wish to do marine environment studies in the laboratory, the design and operation of our system are presented. Other systems currently in use have been described by Chin (1959), DeWitt and Salo (1960), McCrimmon and Berst (1966), and the authors of collected papers edited by Clark and Clark (1964). Preparatory to the design and construction of the system in use in this laboratory, visits were made to marine systems in use at the University of Washington's College of Fisheries, Seattle, -washington, and Friday Harbor Laboratory, San Juan Island, Washington; the Washington State Department of Fisheries' Point whitney Shellfish Laboratory, Brinnon, Washington; Humboldt State College, Arcata, California; and the Steinhart Aquarium of the California Academy of Science, San Francisco, California.

  1. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  3. Sea-water battery for subsea control systems

    Science.gov (United States)

    Hasvold, Øistein; Henriksen, Henrich; Melv˦r, Einar; Citi, Gianfederico; Johansen, Bent Ø.; Kjønigsen, Tom; Galetti, Robin

    This paper describes a power source for the autonomous control system of a subsea well (SWACS) in the Ionian Sea. The unit was deployed in Jan. 1996 at a depth of 180 m. The 650 kWh sea-water battery uses anodes made from commercial magnesium alloys, sea-water as the electrolyte and oxygen dissolved in the sea-water as oxidant. The inert cathodes are made from carbon fibers. The system is composed of six, two-metre high sea-water cells integrated in a steel structure, a d.c./d.c. converter and a valve regulated lead-acid accumulator enclosed in a titanium container together with a monitoring unit which transfers data to the surface via an acoustic link.

  4. A Synopsis of the Chemical/Physical Properties of Seawater

    Science.gov (United States)

    1988-01-01

    workers (1967) of brine processing technology revealed that the following relatively small number of basic methods are actually being used for the...separation of inorganic materials from seawater: adsorption, evaporation, distillation, solvent extraction, ion exchange, precipitation, electrolysis

  5. A quality control procedure for seawater temperature data

    Digital Repository Service at National Institute of Oceanography (India)

    Ghosh, A; Pankajakshan, T.

    A three level quality check has been developed for seawater temperature data. The standards used in the procedure for the quality check are the characteristic property of vertical temperature distribution, watermass property and a standard...

  6. Speciation and spectrophotometric determination of uranium in seawater

    Directory of Open Access Journals (Sweden)

    M. KONSTANTINOU

    2012-12-01

    Full Text Available A series of ion-exchange and extraction procedures for the separation of uranium from seawater samples and subsequent spectrophotometric determination of uranium in seawater by means of arsenazo(III is described. According to the measurements performed by means of traced samples at every stage of separation, the yield of the pre-analytical procedures is generally over 90% and the separation of uranium very selective. The mean uranium concentration in seawater samples collected from five different coastal areas in Cyprus was found to be 3.2 ± 0.2 & micro; g L-1. Uranium in seawater is stable in its hexavalent oxidation state and UO2 (CO334- is the predominant species under normal coastal conditions (pH ≥ 8, EH ≥ 0.35 mV, 1 atm and 0.03% CO2.

  7. Efficiency of hypertonic and isotonic seawater solutions in chronic rhinosinusitis

    Directory of Open Access Journals (Sweden)

    Josip Čulig

    2010-08-01

    Full Text Available Aim To compare the efficiency of isotonic and hypertonic seawatersolutions used for nasal lavage and quality of life of the patientswith chronic rhinosinusitis. Methods A random and controlled clinical study was performed. The study included 60 patients with history of chronic rhinosinusitis. At the beginning of the study, each subject was given a Patient Lobook, which needed to be filled ut daily during the 15-day tudy period. There were three visits per each patient during the study. Results Patient Logbook notes showed significant statistical differences inall symptoms in the group of patients using hypertonic seawater solution. However, while the notes showed significant statistical differences in congestion and rhinorrhea, in the group of patients using isotonic seawater solution, other symptoms showed no major changes during the study period. Conclusion Hypertonic seawater solution has been proven to bebetter than isotonic seawater solution in eliminating the symptomsof nasal congestion, rhinorrhea, cough, headache and waking up duringthe night.

  8. Ionic potential as a controller of seawater composition

    Digital Repository Service at National Institute of Oceanography (India)

    DileepKumar, M.

    Attempts have been made to study whether linear relations exist between ionic potentials (IP) and factors determining their fate in seawater. Various elements have been studied according to the geochemical classification. Lithophilic 1 (L1) elements...

  9. Outdoor mass culture of Spirulina maxima in sea-water

    Energy Technology Data Exchange (ETDEWEB)

    Tredici, M.R.; Papuzzo, T.; Tomaselli, L.

    1986-04-01

    The results of a whole year experiment on the outdoor mass culture of Spirulina maxima strain 4Mx on fertilized sea-water are reported. Carbonate and phosphate precipitation in the seawater media was prevented by maintaining a low concentration of phosphate and by controlling the pH in the range of 8.0-8.3. The mean annual yield of biomass on sea-water plus urea as nitrogen source was 7.35 g(dry weight)m/sup -2/.day/sup -1/, a value slightly lower than that obtained on the standard bicarbonate medium (8.14 g.m/sup -2/.day/sup -1/). On sea-water plus nitrate the yield was only 5.2 g.m/sup -2/.day/sup -1/. The nitrogen content of the biomass was higher in summer and lower in winter. The seasonal effect was more evident when nitrate was the nitrogen source.

  10. The future of seawater desalination: energy, technology, and the environment.

    Science.gov (United States)

    Elimelech, Menachem; Phillip, William A

    2011-08-05

    In recent years, numerous large-scale seawater desalination plants have been built in water-stressed countries to augment available water resources, and construction of new desalination plants is expected to increase in the near future. Despite major advancements in desalination technologies, seawater desalination is still more energy intensive compared to conventional technologies for the treatment of fresh water. There are also concerns about the potential environmental impacts of large-scale seawater desalination plants. Here, we review the possible reductions in energy demand by state-of-the-art seawater desalination technologies, the potential role of advanced materials and innovative technologies in improving performance, and the sustainability of desalination as a technological solution to global water shortages.

  11. Towards Quantum Communication in Free-Space Seawater

    CERN Document Server

    Ji, Ling; Yang, Ai-Lin; Feng, Zhen; Zhang, Chen; Jiang, Xiao; Lin, Xiao-Feng; Li, Hong-Gen; Jin, Xian-Min

    2016-01-01

    Long-distance quantum channels capable of transferring quantum states faithfully for unconditionally secure quantum communication have been so far confirmed feasible in both fiber and free-space air. However, it remains unclear whether seawater, which covers more than 70% of the earth, can also be utilized, leaving global quantum communication incomplete. Here we experimentally demonstrate that polarization quantum states including general qubits and entangled states can well survive after travelling through seawater. We performed experiments in a 3.3-meter-long tube filled with seawater samples collected in a range of 36 kilometers in Yellow sea, which conforms to Jerlov water type I. For single photons at 405 nm in blue-green window, we obtained average process fidelity above 98%. For entangled photons at 810 nm, even with high loss, we observe violation of Bell inequality with 33 standard deviations. This work confirms feasibility of seawater quantum channel, representing the first step towards underwater ...

  12. Seawater State Variables in Hatchery and Raceway Tanks

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Ambient seawater temperature and salinity was recorded on an intermittent basis for comparison with adjusted temperatures used in the aquaculture of bivalves

  13. Sensitivity analysis on parameters and processes affecting vapor intrusion risk.

    Science.gov (United States)

    Picone, Sara; Valstar, Johan; van Gaans, Pauline; Grotenhuis, Tim; Rijnaarts, Huub

    2012-05-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion.

  14. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    KAUST Repository

    Picone, Sara

    2012-03-30

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the vast majority of previous studies, this model accounts for vertical variation of soil water saturation and includes aerobic biodegradation. The attenuation factor (ratio between concentration in the crawl space and source concentration) and the characteristic time to approach maximum concentrations were calculated and compared for a variety of scenarios. These concepts allow an understanding of controlling mechanisms and aid in the identification of critical parameters to be collected for field situations. The relative distance of the source to the nearest gas-filled pores of the unsaturated zone is the most critical parameter because diffusive contaminant transport is significantly slower in water-filled pores than in gas-filled pores. Therefore, attenuation factors decrease and characteristic times increase with increasing relative distance of the contaminant dissolved source to the nearest gas diffusion front. Aerobic biodegradation may decrease the attenuation factor by up to three orders of magnitude. Moreover, the occurrence of water table oscillations is of importance. Dynamic processes leading to a retreating water table increase the attenuation factor by two orders of magnitude because of the enhanced gas phase diffusion. © 2012 SETAC.

  15. Using FTIR measurements of stratospheric composition to identify midlatitude polar vortex intrusions over Toronto

    Science.gov (United States)

    Whaley, C.; Strong, K.; Adams, C.; Bourassa, A. E.; Daffer, W. H.; Degenstein, D. A.; Fast, H.; Fogal, P. F.; Manney, G. L.; Mittermeier, R. L.; Pavlovic, B.; Wiacek, A.

    2013-11-01

    Using 11 years of trace gas measurements made at the University of Toronto Atmospheric Observatory (43.66°N, 79.40°W) and Environment Canada's Centre for Atmospheric Research Experiments (44.23°N, 79.78°W), along with derived meteorological products, we identify a number of polar intrusion events, which are excursions of the polar vortex or filaments from the polar vortex extending down to midlatitudes. These events are characterized by enhanced stratospheric columns (12-50 km) of hydrogen fluoride (HF), by diminished stratospheric columns of nitrous oxide (N2O), and by a scaled potential vorticity above 1.2 × 10-4s-1. The events comprise 16%of winter/spring (November to April inclusive) Fourier transform infrared (FTIR) spectroscopic measurements from January 2002 to March 2013, and we find at least two events per year. The events are corroborated by Modèle Isentrope du transport Méso-échelle de l'Ozone Stratosphérique par Advection, Modern-Era Retrospective Analysis for Research and Applications potential vorticity maps, and Global Modeling Initiative N2O maps. During polar intrusion events, the stratospheric ozone (O3) columns over Toronto are usually greater than when there is no event. Our O3 measurements agree with the Optical Spectrograph and Infrared Imaging System satellite instrument and are further verified with the Earth Probe Total Ozone Mapping Spectrometer and Ozone Monitoring Instrument satellite observations. We find six cases out of 53 for which chemical O3depletion within the polar vortex led to a reduction in stratospheric O3 columns over Toronto. We have thus identified a dynamical cause for most of the winter/spring variability of stratospheric trace gas columns observed at our midlatitude site. While there have been a number of prior polar intrusion studies, this is the first study to report in the context of 11 years of ground-based FTIR column measurements, providing insight into the frequency of midlatitude polar vortex intrusions

  16. Specifying the neurobiological basis of human attachment: brain, hormones, and behavior in synchronous and intrusive mothers.

    Science.gov (United States)

    Atzil, Shir; Hendler, Talma; Feldman, Ruth

    2011-12-01

    The mother-infant bond provides the foundation for the infant's future mental health and adaptation and depends on the provision of species-typical maternal behaviors that are supported by neuroendocrine and motivation-affective neural systems. Animal research has demonstrated that natural variations in patterns of maternal care chart discrete profiles of maternal brain-behavior relationships that uniquely shape the infant's lifetime capacities for stress regulation and social affiliation. Such patterns of maternal care are mediated by the neuropeptide Oxytocin and by stress- and reward-related neural systems. Human studies have similarly shown that maternal synchrony--the coordination of maternal behavior with infant signals--and intrusiveness--the excessive expression of maternal behavior--describe distinct and stable maternal styles that bear long-term consequences for infant well-being. To integrate brain, hormones, and behavior in the study of maternal-infant bonding, we examined the fMRI responses of synchronous vs intrusive mothers to dynamic, ecologically valid infant videos and their correlations with plasma Oxytocin. In all, 23 mothers were videotaped at home interacting with their infants and plasma OT assayed. Sessions were micro-coded for synchrony and intrusiveness. Mothers were scanned while observing several own and standard infant-related vignettes. Synchronous mothers showed greater activations in the left nucleus accumbens (NAcc) and intrusive mothers exhibited higher activations in the right amygdala. Functional connectivity analysis revealed that among synchronous mothers, left NAcc and right amygdala were functionally correlated with emotion modulation, theory-of-mind, and empathy networks. Among intrusive mothers, left NAcc and right amygdala were functionally correlated with pro-action areas. Sorting points into neighborhood (SPIN) analysis demonstrated that in the synchronous group, left NAcc and right amygdala activations showed clearer

  17. International overview of seawater desalination plant by reverse osmosis technology

    OpenAIRE

    Kangwen, Shu

    2012-01-01

    In a world faced with increased urbanization, population growth, climate change and degradation of water supplies, the importance of a reliable source of technology to provide fresh water emphasizes the importance of seawater desalination. Over the years a variety of seawater desalination methods have been developed throughout the world. The most common technologies available for desalination around the world are membrane reverse osmosis (RO), thermal distillation (TD) and electrodialysis ...

  18. Simultaneous Extraction of Lithium and Hydrogen from Seawater

    Science.gov (United States)

    2011-08-22

    N00014-10-M-0234 20126083 0001AD Dr. Pyoungho Choi University of Central Florida/Florida Solar Energy Center 1679 Clearlake Road Cocoa FL 32922-5703...seawater can be carried out either desalination of sea water and followed by the well-established fresh water electrolysis or direct electrolysis of sea...water, the latter seems more attractive because the desalination often employs the reverse osmosis process that not only requires additional cost

  19. International overview of seawater desalination plant by reverse osmosis technology

    OpenAIRE

    Kangwen, Shu

    2012-01-01

    In a world faced with increased urbanization, population growth, climate change and degradation of water supplies, the importance of a reliable source of technology to provide fresh water emphasizes the importance of seawater desalination. Over the years a variety of seawater desalination methods have been developed throughout the world. The most common technologies available for desalination around the world are membrane reverse osmosis (RO), thermal distillation (TD) and electrodialysis ...

  20. A Study on Saltwater Intrusion Around Kolleru Lake, Andhra Pradesh, India

    Directory of Open Access Journals (Sweden)

    K.Harikrishna

    2012-07-01

    Full Text Available Kolleru Lake, the largest natural fresh water lake in Andhra Pradesh in India, located between Krishna and Godavari deltas is acting as a natural flood balancing reservoir and is fed directly by water from the seasonal rivers Budameru, Ramileru and Tammileru, and is also connected to the Krishna and Godavari drainage system consists of over 68 inflowing drains and channels. Over-exploitation of groundwater and land use conversions to aqua-culture are becoming the sources for salt-water intrusion to this lake and coastal aquifers, in specific, are highly vulnerable to seawater intrusion. Hydrogeomorphological study indicates that the potential aquifers around the Kolleru lake are paleo beach ridges and buried river courses. All other geomorphic features either aquiclude or aquitards are may not be considered as prospective zones for groundwater. Though there are number of open wells present in the villages used for potable water earlier, people switched over to imported water as their drinking water source may be due to significant contaminationof groundwater resources. Present land use activities like aqua-culture, agriculture, large-scale industries and allied industries in and around the Kolleru lake region has large contribution for the change of water quality. The paleo beach ridge areas, where the permeability of the sandy soil is very high, are also converted into aqua ponds. Integrated study using remote sensing, hydrogeology, hydrochemistry and geophysical investigations revealed the extent of salt-water intrusion up to the northern part of the lake which is about 40 km from the coast line. The electrical resistivity of aquifers is less than 1.0 (ohm-m having salinity of more than 1.2 ppt and the resistivity is around 20 (ohm-m where the salinity is less than 0.5 ppt, has also served as an excellent criteria for delineating the fresh-water and salt-water interface. Lenses of fresh water/ brackish water are noticed only in the beach

  1. Groundwater Modeling in Coastal Arid Regions Under the Influence of Marine Saltwater Intrusion

    Science.gov (United States)

    Walther, Marc; Kolditz, Olaf; Grundmann, Jens; Liedl, Rudolf

    2010-05-01

    the groundwater model, scenarios will be evaluated considering various target figures (i.e. agricultural water demand, drinking water supply, "beautification", tourism, industry etc.). Within these scenarios, marine saltwater encroachment should be minimized or saline groundwater should even be pushed back into the coastal direction, thus stabilizing the natural equilibrium between continental freshwater flux and seawater intrusion and ensuring a long-term, stable usage of the agricultural areas. Literature KOLDITZ O., DELFS J.-O., BÜRGER C.-M., BEINHORN M., PARK C.-H. (2008): Numerical analysis of coupled hydrosystems based on an object-oriented compartment approach. J. Hydroinformatics, 10(3): 227-244, DOI: 10.2166/hydro.2008.003.

  2. Derivation of S and Pb in phanerozoic intrusion-related metal deposits from neoproterozoic sedimentary pyrite, Great Basin, United States

    Science.gov (United States)

    Vikre, P.G.; Poulson, S.R.; Koenig, A.E.

    2011-01-01

    The thick (???8 km), regionally extensive section of Neoproterozoic siliciclastic strata (terrigenous detrital succession, TDS) in the central and eastern Great Basin contains sedimentary pyrite characterized by mostly high d34S values (-11.6 to 40.8%, derived from reduction of seawater sulfate, and by markedly radiogenic Pb isotopes ( 207Pb/204Pb derivation of deposit S and Pb from TDS pyrite. Minor element abundances in TDS pyrite (e.g., Pb, Zn, Cu, Ag, and Au) compared to sedimentary and hydrothermal pyrite elsewhere are not noticeably elevated, implying that enrichment in source minerals is not a precondition for intrusion-related metal deposits. Three mechanisms for transferring components of TDS sedimentary pyrite to intrusion-related metal deposits are qualitatively evaluated. One mechanism involves (1) decomposition of TDS pyrite in thermal aureoles of intruding magmas, and (2) aqueous transport and precipitation in thermal or fluid mixing gradients of isotopically heavy S, radiogenic Pb, and possibly other sedimentary pyrite and detrital mineral components, as sulfide minerals in intrusion-related metal deposits. A second mechanism invokes mixing and S isotope exchange in thermal aureoles of Pb and S exsolved from magma and derived from decomposition of sedimentary pyrite. A third mechanism entails melting of TDS strata or assimilation of TDS strata by crustal or mantle magmas. TDS-derived or assimilated magmas ascend, decompress, and exsolve a mixture of TDS volatiles, including isotopically heavy S and radiogenic Pb from sedimentary pyrite, and volatiles acquired from deeper crustal or mantle sources. In the central and eastern Great Basin, the wide distribution and high density of small to mid-sized vein, replacement, and skarn intrusion-related metal deposits in lower Paleozoic rocks that contain TDS sedimentary pyrite S and Pb reflect (1) prolific Jurassic, Cretaceous, and Tertiary magmatism, (2) a regional, substrate reservoir of S and Pb in

  3. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  4. Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hichem Sedjelmaci

    2011-08-01

    Full Text Available Wireless sensor network (WSN is regularly deployed in unattended and hostile environments. The WSN isvulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the mostefficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low falsealarm.

  5. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  6. Co-operative Wireless Intrusion Detection System Using MIBs From SNMP

    Directory of Open Access Journals (Sweden)

    Ashvini Vyavhare

    2012-03-01

    Full Text Available In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol and MIB (Management Information Base variables for mobile wireless networks

  7. Application of interleaving models to describe intrusive layers in the Deep Polar Water of the Arctic Basin

    Science.gov (United States)

    Zhurbas, Nataliya; Kuzmina, Natalia; Lyzhkov, Dmitry; Izvekova, Yulia N.

    2016-04-01

    Interleaving models of pure thermohaline and baroclinic frontal zones of finite width are applied to describe intrusions at the fronts found in the upper part of the Deep Polar Water, the Eurasian basin, under stable-stable thermohaline stratification. It is assumed that differential mixing is the main mechanism of the intrusion formation. Different parameterizations of differential mixing (Merrryfield, 2002; Kuzmina et al., 2011) are used in the models. Important parameters of interleaving such as the growth rate, vertical scale, and slope of the most unstable modes are calculated. It is found that the interleaving model of a pure thermohaline front can satisfactory describe the important parameters of intrusions observed at a thermohaline, very low baroclinicity front in the Eurasian basin, just in accordance to Merryfield (2002) findings. In the case of baroclinic front, satisfactory agreement over all the interleaving parameters is found between the model calculations and observations provided that the vertical momentum diffusivity significantly exceeds the corresponding mass diffusivity. Under specific (reasonable) constraints of the vertical momentum diffusivity, the most unstable mode has a vertical scale approximately two-three times smaller than the vertical scale of the observed intrusions. A thorough discussion of the results is presented. References Kuzmina N., Rudels B., Zhurbas V., Stipa T. On the structure and dynamical features of intrusive layering in the Eurasian Basin in the Arctic Ocean. J. Geophys. Res., 2011, 116, C00D11, doi:10.1029/2010JC006920. Merryfield W. J. Intrusions in Double-Diffusively Stable Arctic Waters: Evidence for Differential mixing? J. Phys. Oceanogr., 2002, 32, 1452-1439.

  8. Forced-folding by laccolith and saucer-shaped sill intrusions on the Earth, planets and icy satellites

    Science.gov (United States)

    Michaut, Chloé

    2017-04-01

    Horizontal intrusions probably initially start as cracks, with negligible surface deformation. Once their horizontal extents become large enough compared to their depths, they make room for themselves by lifting up their overlying roofs, creating characteristic surface deformations that can be observed at the surface of planets. We present a model where magma flows below a thin elastic overlying layer characterized by a flexural wavelength Λ and study the dynamics and morphology of such a magmatic intrusion. Our results show that, depending on its size, the intrusion present different shapes and thickness-to-radius relationships. During a first phase, elastic bending of the overlying layer is the main source of driving pressure in the flow; the pressure decreases as the flow radius increases, the intrusion is bell-shaped and its thickness is close to being proportional to its radius. When the intrusion radius becomes larger than 4 times Λ, the flow enters a gravity current regime and progressively develops a pancake shape with a flat top. We study the effect of topography on flow spreading in particular in the case where the flow is constrained by a lithostatic barrier within a depression, such as an impact crater on planets or a caldera on Earth. We show that the resulting shape for the flow depends on the ratio between the flexural wavelength of the layer overlying the intrusion and the depression radius. The model is tested against terrestrial data and is shown to well explain the size and morphology of laccoliths and saucer-shaped sills on Earth. We use our results to detect and characterize shallow solidified magma reservoirs in the crust of terrestrial planets and potential shallow water reservoirs in the ice shell of icy satellites.

  9. Multiple subtropical stratospheric intrusions over Reunion Island: Observational, Lagrangian, and Eulerian numerical modeling approaches

    Science.gov (United States)

    Vérèmes, H.; Cammas, J.-P.; Baray, J.-L.; Keckhut, P.; Barthe, C.; Posny, F.; Tulet, P.; Dionisi, D.; Bielli, S.

    2016-12-01

    Signatures of multiple stratospheric intrusions were observed on simultaneous and collocated ozone and water vapor profiles retrieved by lidars and radiosondes at the Maïdo Observatory, Reunion Island (21°S, 55°E, 2160 m above sea level), during MAïdo LIdar Calibration CAmpaign in April 2013. A singular structure of the ozone vertical profile with three peaks (in excess of 90 ppbv, at 8, 10, and 13 km altitude) embedded in a thick dry layer of air suggested stratospheric intrusions with multiple origins. The hypothesis is corroborated by a synoptic analysis based on re-analyses. European Centre for Medium-Range Weather Forecasts ERA-Interim temporal series associated with 5 days Lagrangian back trajectories initialized on each ozone peak allows to capture their stratospheric origin. The ozone peak at the lowest altitude is associated with an irreversible tropopause folding process along the polar jet stream during an extratropical cutoff low formation. Simultaneous lidar water vapor profiles of this peak show that the anticorrelation with ozone has been removed, due to mixing processes. Back trajectories indicate that the two other ozone peaks observed at higher altitudes are associated with the dynamics of the subtropical jet stream and the lower stratosphere. The observations confirm the recent stratospheric origins. The highest ozone peak is explained by the horizontal distribution of the intrusion. Use of a Lagrangian Reverse Domain Filling model and of the Meso-NH Eulerian mesoscale model with a passive stratospheric tracer allow to further document the stratosphere-troposphere transport processes and to describe the detailed potential vorticity and ozone structures in which are embedded in the observed multiple stratospheric intrusions.

  10. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  11. KUROSHIO INTRUSION INTO THE SOUTH CHINA SEA

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-hua; FAN Hai-mei; QU Yuan-yuan

    2006-01-01

    In this article, the circulation of the South China Sea (SCS), which is idealized as the rectangular basin with constant depth, is studied under Kuroshio boundary forces. Starting from the linearly quasi-geostrophic vorticity equation, the solution of the SCS circulation is given in the form of corrected Fourier series under proper boundary conditions. The results show that the intruded current flows westward and separates into the northward branch and the southward branch before arriving at the western boundary. The southward branch flows out of the SCS through the southwestern passage, at the same time, the induced cyclonic (anti-clockwise) ring almost occupies the middle and southern parts, and concomitant anti-cyclonic (clockwise) vortex appears between the cyclone and the western boundary. While the northward branch outflows through the northeastern passage, the anti-cyclonic (clockwise) ring is triggered at the northern part of the SCS. The above two vortexes are both intensified if the south-entering and the north-leaving current loop intrusion are superposed. The outer flow of the northern vortex flows westward, then northward, and then eastward, and it is very similar to the configuration of the SCS Warm Current (SCSWC) at the northern part of the SCS, thus, a kind of generating mechanism of the SCSWC is presented.

  12. Computational benefits using artificial intelligent methodologies for the solution of an environmental design problem: saltwater intrusion.

    Science.gov (United States)

    Papadopoulou, Maria P; Nikolos, Ioannis K; Karatzas, George P

    2010-01-01

    Artificial Neural Networks (ANNs) comprise a powerful tool to approximate the complicated behavior and response of physical systems allowing considerable reduction in computation time during time-consuming optimization runs. In this work, a Radial Basis Function Artificial Neural Network (RBFN) is combined with a Differential Evolution (DE) algorithm to solve a water resources management problem, using an optimization procedure. The objective of the optimization scheme is to cover the daily water demand on the coastal aquifer east of the city of Heraklion, Crete, without reducing the subsurface water quality due to seawater intrusion. The RBFN is utilized as an on-line surrogate model to approximate the behavior of the aquifer and to replace some of the costly evaluations of an accurate numerical simulation model which solves the subsurface water flow differential equations. The RBFN is used as a local approximation model in such a way as to maintain the robustness of the DE algorithm. The results of this procedure are compared to the corresponding results obtained by using the Simplex method and by using the DE procedure without the surrogate model. As it is demonstrated, the use of the surrogate model accelerates the convergence of the DE optimization procedure and additionally provides a better solution at the same number of exact evaluations, compared to the original DE algorithm.

  13. Water and agriculture in arid systems: a dynamic model of irrigation of Mazarron and Aguilas; Agua y agricultural en sistemas aridos: un modelo dinamico del regadio de Mazarron y Aguilas

    Energy Technology Data Exchange (ETDEWEB)

    Martinez Fernandez, J.; Esteve Selma, M. A.

    2009-07-01

    The intensive use of groundwater resources in the new irrigated lands of Mazarron-Aguilas has led to the over-exploitation of the local aquifer and thus, to seawater intrusion, water salinization and falling off water tables, all of them key processes of desertification. The simulation results show that the unrealistic perceptions about the relationships between irrigated land and water resources constitutes a key factor to explain the highly unsustainable dynamics of irrigated lands in Mazarron and Aguilas and the whole SE Spain. The increase in water resources does not eliminate the problem because the feedback loops and endogenous factors of the system lead to a further increase in irrigated land and continuation of the water deficit, which shows a highly counter-intuitive behaviour. (Author) 3 refs.

  14. Marine bacteria comprise a possible indicator of drowning in seawater.

    Science.gov (United States)

    Kakizaki, Eiji; Takahama, Keiichi; Seo, Yasuhisa; Kozawa, Shuji; Sakai, Masahiro; Yukawa, Nobuhiro

    2008-04-07

    To investigate the effectiveness of marine bacteria as a new marker of drowning in seawater, we determined the optimal conditions of media required to selectively detect marine bacteria and applied the technique to drowned cadavers. We incubated model blood samples (n=20 per group) mixed with seawater, river, tap or muddy water on agar plates (Todd Hewitt, TH; Marine 2216, M2216) and determined the NaCl concentration required to selectively detect marine bacteria. We also used TCBS agar plates without manipulation to isolate Vibrio spp. Among the culture media, TH agar was superior. Bioluminescent colonies were detected only in blood mixed with seawater. Blue colonies stained using the cytochrome oxidase test (COT), were detected in blood mixed with both sea and river water. However when the NaCl concentration was above 4%, COT stained colonies were detectable only in blood mixed with seawater. We subsequently used 2, 3 and 4% NaCl in TH and TCBS agar to examine blood from victims who had drowned in seawater (n=8) and in fresh water (n=7), as well as from victims who died near aquatic environments (non drowned; dry-land control, n=7). Bioluminescent colonies were detectable on 2-4% NaCl TH agar only from two victims that drowned in seawater. Bioluminescent colonies did not grow on TCBS agar. Blue colonies from all cadavers that had drowned in seawater (8/8) and in four of those that had drowned in fresh water (4/7) proliferated on TH agar containing 2% and/or 3% NaCl, but at 4% NaCl such colonies were detected only from cadavers that had drowned in seawater (8/8). Colonies from only one cadaver from seawater grew on TCBS agar. Furthermore, neither bioluminescent nor blue colonies were detected on TH agar containing 4% NaCl in samples from two cadavers found in an estuary (brackish water) who were thought to have been carried from areas of fresh water. Homologous analyses of the 16S rRNA gene revealed that the dominant colonies on TH agar containing 4% NaCl were

  15. Intrusion Prevention/Intrusion Detection System (IPS/IDS for Wifi Networks

    Directory of Open Access Journals (Sweden)

    Michal Korcak

    2014-07-01

    Full Text Available The nature of wireless networks itself created new vulnerabilities that in the classical wired network s do not exist. This results in an evolutional requireme nt to implement new sophisticated security mechanis m in form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small off ice and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with u se of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to attacker’s traffic without deployment of proposed I DPS system.

  16. Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks

    CERN Document Server

    Shafi, Muhammad Imran; Hayat, Sikandar; Sohail, Imran

    2010-01-01

    Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed nega...

  17. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  18. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against obse

  19. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  20. SVM Intrusion Detection Model Based on Compressed Sampling

    Directory of Open Access Journals (Sweden)

    Shanxiong Chen

    2016-01-01

    Full Text Available Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. If we can reduce the data dimension in the stage of data sampling and directly obtain the feature information of network data, efficiency of detection can be improved greatly. In the paper, we present a SVM intrusion detection model based on compressive sampling. We use compressed sampling method in the compressed sensing theory to implement feature compression for network data flow so that we can gain refined sparse representation. After that SVM is used to classify the compression results. This method can realize detection of network anomaly behavior quickly without reducing the classification accuracy.

  1. Vapor Intrusion Facility Boundaries - Approximate Extent of Contamination

    Data.gov (United States)

    U.S. Environmental Protection Agency — Theses polygons represent the approximate extent of contamination for Vapor Intrusion facilities. Polygons for non-Federal Facility sites were updated in January,...

  2. An expert system application for network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  3. Tropical upper tropospheric humidity variations due to potential vorticity intrusions

    Science.gov (United States)

    Sandhya, M.; Sridharan, S.; Indira Devi, M.

    2015-09-01

    Four cases (March 2009, May 2009, April 2010 and February 2012) are presented in which the ERA-interim relative humidity (RH) shows consistent increase by more than 50 % in the upper troposphere (200-250 hPa) over tropics at the eastward side of the potential vorticity (PV) intrusion region. The increase in RH is confirmed with the spaceborne microwave limb sounder observations and radiosonde observations over Gadanki (13.5° N, 79.2° E) and is observed irrespective of whether the PV intrusions are accompanied by deep convection or not. It is demonstrated that the increase in RH is due to poleward advection induced by the PV intrusions in their eastward side at the upper tropospheric heights. It is suggested that the low-latitude convection, which is not necessarily triggered by the PV intrusion, might have transported water vapour to the upper tropospheric heights.

  4. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against obse

  5. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — AI Signal Research, Inc. proposes to develop a Non-Intrusive Vibration Measurement System (NI-VMS) for turbopumps which will provide effective on-board/off-board...

  6. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  7. The influence of seawater pH on U / Ca ratios in the scleractinian cold-water coral Lophelia pertusa

    Directory of Open Access Journals (Sweden)

    J. Raddatz

    2013-10-01

    Full Text Available The increasing pCO2 in seawater is a serious threat for marine calcifiers and alters the biogeochemistry of the ocean. Therefore, the reconstruction of past-seawater properties and their impact on marine ecosystems is an important way to investigate the underlying mechanisms and to better constrain the effects of possible changes in the future ocean. Cold-water coral (CWC ecosystems are biodiversity hotspots. Living close to aragonite-undersaturation, these corals serve as living laboratories as well as archives to reconstruct the boundary conditions of their calcification under the carbonate system of the ocean. We investigated the reef-building CWC Lophelia pertusa as a recorder of intermediate ocean seawater pH. This species-specific field calibration is based on a unique sample set of live in-situ collected L. pertusa and corresponding seawater samples. These data demonstrate that uranium speciation and skeletal incorporation for azooxanthellate scleractinian CWCs is pH dependent. However, this also indicates that internal pH up-regulation of the coral does not play a role in uranium incorporation into the majority of the skeleton of L. pertusa. This study suggests L. pertusa provides a new archive for the reconstruction of intermediate water mass pH and hence may help to constrain tipping points for ecosystem dynamics and evolutionary characteristics in a changing ocean.

  8. Environmental data processor of the adaptive intrusion data system

    Energy Technology Data Exchange (ETDEWEB)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components.

  9. Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2013-05-01

    replace it right away. This thought replacing skill is especially good to use late at night if you are having trouble sleeping . But, you will need to...then this is a good skill for you to practice with at home so that you can learn to be decent toward yourself. When you spend your time and energy...about intrusive thoughts ◦ CONTROL: traditional CBT skills for coping ◦ RESET: Mindfulness-based skills for coping Thoughts on intrusive thoughts

  10. Managing Temporal and Spatial Variability in Vapor Intrusion Data

    Science.gov (United States)

    2012-03-28

    Managing Temporal and Spatial Variability in Vapor Intrusion Data Todd McAlary, M.Sc., P.Eng., P.G. Geosyntec Consultants, Inc...TITLE AND SUBTITLE Managing Temporal and Spatial Variability in Vapor Intrusion Data 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Koc (mL/g) OSWER indoor conc. at 10-6 risk (ppb) Vapour pressure (atm) Water solubility (g/l) 1,1,1-Trichloroethane 110 400

  11. Intrusion and extrusion of water in hydrophobic mesopores

    OpenAIRE

    Barrat, Jean-Louis; Lefevre, Benoit; Bocquet, Lyderic; Saugey, Anthony; Vigier, Gérard; Gobin, Pierre-François; Charlaix, Elisabeth

    2003-01-01

    We present experimental and theoretical results on intrusion-extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical pores. The intrusion, which takes place above the bulk saturation pressure, can be well described using a macroscopic capillary model. Once the material is saturated with water, extrusion takes place upon reduction of the externally applied pressure; Our results for the extrusion pressure can only be understood by assuming that th...

  12. Influence of ambient water intrusion on coral reef acidification in the Chuuk lagoon, located in the coral-rich western Pacific Ocean

    Science.gov (United States)

    Ko, Young Ho; Lee, Kitack; Noh, Jae Hoon; Lee, Charity M.; Kleypas, Joan A.; Jeong, Hae Jin; Kim, Kwang Young

    2016-04-01

    Weekly carbonate chemistry condition data recorded between 2008 and 2014 in the Chuuk lagoon (7.3°N and 151.5°E) of the Federated States of Micronesia, located in the western Pacific Ocean, were analyzed. The results showed that, during periods of weak intrusion of ambient seawater from the surrounding open ocean, two internal biological processes (calcification and respiration) reinforced each other and together lowered the pH of the reef water for extended periods, ranging from a few to several months. The analysis indicated that reduced intrusion of ambient water is associated with periods of low wind speeds. Such conditions increase the residence time of reef water, thus promoting acidification by respiration and calcification. This phenomenon likely affects many other areas of the coral-rich western Pacific Ocean, which contains 50% of global coral reefs and in which the degree of ambient water intrusion into the atolls has been shown to be closely associated with the El Niño-Southern Oscillation-induced wind speed change.

  13. Impurities Removal in Seawater to Optimize the Magnesium Extraction

    Science.gov (United States)

    Natasha, N. C.; Firdiyono, F.; Sulistiyono, E.

    2017-02-01

    Magnesium extraction from seawater is promising way because magnesium is the second abundant element in seawater and Indonesia has the second longest coastline in the world. To optimize the magnesium extraction, the impurities in seawater need to be eliminated. Evaporation and dissolving process were used in this research to remove the impurities especially calcium in seawater. Seawater which has been evaporated from 100 ml to 50 ml was dissolved with variations solution such as oxalic acid and ammonium bicarbonate. The solution concentration is 100 g/l and it variations are 2 ml, 4 ml, 6 ml, 8 ml, 10 ml, 20 ml, 30 ml, 40 ml and 50 ml. This step will produce precipitate and filtrate then it will be analysed to find out the result of this process. The precipitate was analysed by X-ray Diffraction (XRD) and Scanning Electron Microscope (SEM) but the filtrate was analysed by Inductively Coupled Plasma (ICP). XRD analysis shows that calcium oxalate and calcium carbonate were formed and ICP analysis shows that the remaining calcium in seawater using oxalic acid is about 0.01% and sodium 0.14% but when using ammonium bicarbonate the remaining calcium is 2.5% and sodium still more than 90%. The results show that both oxalic acid and ammonium bicarbonate can remove the impurities but when using oxalic acid, not only the impurities but also magnesium was precipitated. The conclusion of this research is the best solution to remove the impurities in seawater without precipitate the magnesium is using ammonium bicarbonate.

  14. Biochemical and Clinical Assessments of Segmental Maxillary Posterior Tooth Intrusion

    Science.gov (United States)

    Tasanapanont, Jintana; Wattanachai, Tanapan; Apisariyakul, Janya; Pothacharoen, Peraphan; Kongtawelert, Prachya; Midtbø, Marit

    2017-01-01

    Objective. To compare chondroitin sulphate (CS) levels around maxillary second premolars, first molars, and second molars between the unloaded and the loaded periods and to measure the rates of intrusion of maxillary posterior teeth during segmental posterior tooth intrusion. Materials and Methods. In this prospective clinical study, 105 teeth (from 15 patients exhibiting anterior open bite and requiring maxillary posterior tooth intrusion) were studied. Competitive ELISA was used to detect CS levels. Dental casts (during the unloaded and loaded periods) were scanned, and posterior tooth intrusion distances were measured. Results. During the unloaded period, the median CS levels around maxillary second premolars, first molars, second molars (experimental teeth), and mandibular first molars (negative control) were 0.006, 0.055, 0.056, and 0.012 and during the loaded period were 2.592, 5.738, 4.727, and 0.163 ng/μg of total protein, respectively. The median CS levels around experimental teeth were significantly elevated during the loaded period. The mean rates of maxillary second premolar and first and second molar intrusion were 0.72, 0.58, and 0.40 mm/12 weeks, respectively. Conclusions. Biochemical and clinical assessments suggested that the segmental posterior tooth intrusion treatment modality with 50 g of vertical force per side was sufficient. Trial Registration. The study is registered as TCTR20170206006. PMID:28321256

  15. The effects of nicotine on intrusive memories in nonsmokers.

    Science.gov (United States)

    Hawkins, Kirsten A; Cougle, Jesse R

    2013-12-01

    Correlational research suggests that smoking increases risk of posttraumatic stress disorder (PTSD), though such research by nature cannot rule out third variable explanations for this relationship. The present study used an analogue trauma film design to experimentally test the effects of nicotine on the occurrence of intrusive memories. Fifty-four healthy nonsmokers were randomly assigned to ingest either a nicotine or placebo lozenge before viewing a film depicting motor vehicle accidents. Participants recorded intrusive memories immediately after the film and for a week via diary. Participants in the nicotine condition reported significantly more intrusive memories immediately after watching the film, yet no group differences emerged on intrusions or intrusion-related distress reported during the following week. Among participants low in dispositional rumination, those who had ingested a nicotine lozenge reported more intrusions in the subsequent week than those in the placebo condition. These findings provide novel experimental evidence for the role of nicotine in increasing risk of PTSD and suggest that nicotine may contribute to trauma-related rumination but not heightened reactivity to trauma cues.

  16. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  17. Three Dimensional Vapor Intrusion Modeling: Model Validation and Uncertainty Analysis

    Science.gov (United States)

    Akbariyeh, S.; Patterson, B.; Rakoczy, A.; Li, Y.

    2013-12-01

    Volatile organic chemicals (VOCs), such as chlorinated solvents and petroleum hydrocarbons, are prevalent groundwater contaminants due to their improper disposal and accidental spillage. In addition to contaminating groundwater, VOCs may partition into the overlying vadose zone and enter buildings through gaps and cracks in foundation slabs or basement walls, a process termed vapor intrusion. Vapor intrusion of VOCs has been recognized as a detrimental source for human exposures to potential carcinogenic or toxic compounds. The simulation of vapor intrusion from a subsurface source has been the focus of many studies to better understand the process and guide field investigation. While multiple analytical and numerical models were developed to simulate the vapor intrusion process, detailed validation of these models against well controlled experiments is still lacking, due to the complexity and uncertainties associated with site characterization and soil gas flux and indoor air concentration measurement. In this work, we present an effort to validate a three-dimensional vapor intrusion model based on a well-controlled experimental quantification of the vapor intrusion pathways into a slab-on-ground building under varying environmental conditions. Finally, a probabilistic approach based on Monte Carlo simulations is implemented to determine the probability distribution of indoor air concentration based on the most uncertain input parameters.

  18. Towards Multi-Stage Intrusion Detection using IP Flow Records

    Directory of Open Access Journals (Sweden)

    Muhammad Fahad Umer

    2016-10-01

    Full Text Available Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very large in high-speed networks and cannot be processed in real-time by the intrusion detection system. In this paper, an efficient multi-stage model for intrusion detection using IP flows records is proposed. The first stage in the model classifies the traffic as normal or malicious. The malicious flows are further analyzed by a second stage. The second stage associates an attack type with malicious IP flows. The proposed multi-stage model is efficient because the majority of IP flows are discarded in the first stage and only malicious flows are examined in detail. We also describe the implementation of our model using machine learning techniques.

  19. Modern and Cenozoic records of seawater magnesium from foraminiferal Mg isotopes

    Science.gov (United States)

    Pogge von Strandmann, P. A. E.; Forshaw, J.; Schmidt, D. N.

    2014-09-01

    Magnesium is an element critically involved in the carbon cycle, because weathering of Ca-Mg silicates removes atmospheric CO2 into rivers, and formation of Ca-Mg carbonates in the oceans removes carbon from the ocean-atmosphere system. Hence the Mg cycle holds the potential to provide valuable insights into Cenozoic climate-system history, and the shift during this time from a greenhouse to icehouse state. We present Mg isotope ratios for the past 40 Myr using planktic foraminifers as an archive. Modern foraminifera, which discriminate against elemental and isotopically heavy Mg during calcification, show no correlation between the Mg isotope composition (δ26Mg, relative to DSM-3) and temperature, Mg / Ca or other parameters such as carbonate saturation (ΔCO3). However, inter-species isotopic differences imply that only well-calibrated single species should be used for reconstruction of past seawater. Seawater δ26Mg inferred from the foraminiferal record decreased from ~0‰ at 15 Ma, to -0.83‰ at the present day, which coincides with increases in seawater lithium and oxygen isotope ratios. It strongly suggests that neither Mg concentrations nor isotope ratios are at steady state in modern oceans, given its ~10 Myr residence time. From these data, we have developed a dynamic box model to understand and constrain changes in Mg sources to the oceans (rivers) and Mg sinks (dolomitisation and hydrothermal alteration). Our estimates of seawater Mg concentrations through time are similar to those independently determined by pore waters and fluid inclusions. Modelling suggests that dolomite formation and the riverine Mg flux are the primary controls on the δ26Mg of seawater, while hydrothermal Mg removal and the δ26Mg of rivers are more minor controls. Using Mg riverine flux and isotope ratios inferred from the 87Sr / 86Sr record, the modelled Mg removal by dolomite formation shows minima in the Oligocene and at the present day (with decreasing trends from 15 Ma

  20. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  1. Boron Removal in Seawater Reverse Osmosis System

    KAUST Repository

    Rahmawati, Karina

    2011-07-01

    Reverse osmosis successfully proves to remove more than 99% of solute in seawater, providing fresh water supply with satisfied quality. Due to some operational constraints, however, some trace contaminants removal, such as boron, cannot be achieved in one pass system. The stringent criterion for boron from World Health Organization (WHO) and Saudi Arabia local standard (0.5 mg/l) is hardly fulfilled by single pass sea water reverse osmosis (SWRO) plants. Some design processes have been proposed to deal with boron removal, but they are not economically efficient due to high energy and chemical consumption. The objective of this study was to study boron removal by different reverse osmosis membranes in two pH conditions, with and without antiscalant addition. Thus, it was expected to observe the possibility of operating single pass system and necessity to operate two pass system using low energy membrane. Five membrane samples were obtained from two different manufacturers. Three types of feed water pH were used, pH 8, pH 10, and pH 10 with antiscalant addition. Experiment was conducted in parallel to compare membrane performance from two manufacturers. Filtration was run with fully recycle mode for three days. Sample of permeate and feed were taken every 12 hours, and analyzed for their boron and TDS concentration. Membrane samples were also tested for their surface charge. The results showed that boron rejection increases as the feed pH increases. This was caused by dissociation of boric acid to negatively charged borate ion and more negatively charged membrane surface at elevated pH which enhance boron rejection. This study found that single pass reverse osmosis system, with and without elevating the pH, may not be possible to be applied because of two reasons. First, permeate quality in term of boron, does not fulfill WHO and local Saudi Arabia regulations. Second, severe scaling occurs due to operation in alkaline condition, since Ca and Mg concentration are

  2. Vibrio marisflavi sp. nov., isolated from seawater.

    Science.gov (United States)

    Wang, Hong; Liu, Jiwen; Wang, Yan; Zhang, Xiao-Hua

    2011-03-01

    A Gram-reaction-negative, facultatively anaerobic bacterial strain, designated WH134(T), was isolated from a seawater sample collected at a depth of 10 m near the Yellow Sea Cold Water Mass (YSCWM), 3 ° 59.970' N 12 ° 0.157' E, PR China. Cells of strain WH134(T) were slightly curved rods, motile by means of a polar flagellum and positive for poly-β-hydroxybutyrate (PHB) accumulation. The strain was able to grow in 1-6 % (w/v) NaCl, at pH 5-10 and 16-37 °C but not at 4 or 40 °C. The major cellular fatty acids were summed feature 3 C₁₆:₁ω7c and/or iso-C₁₅:₀ 2-OH, C₁₆:₀, C₁₈:₁ω7c, C₁₈:₀ and C₁₄:₀. The DNA G+C content was 42.5 mol%. Phylogenetic analyses based on 16S rRNA, gyrB, topA, recA, ftsZ, mreB, gapA and rpoA gene sequences revealed that strain WH134(T) belongs to the genus Vibrio and showed gene sequence similarities of 96.6, 75.7, 74.6, 83.6, 78.9, 82.9, 86.0 and 89.4  % , respectively, to Vibrio rumoiensis S-1(T). The possession of a flagellum, activity of arginine dihydrolase and lysine decarboxylase and inability to utilize citrate, however, differentiated strain WH134(T) from V. rumoiensis DSM 19141(T). On the basis of the phenotypic, chemotaxonomic and phylogenetic evidence, strain WH134(T) represents a novel species of the genus Vibrio, for which the name Vibrio marisflavi sp. nov. is proposed. The type strain is WH134(T) (=CGMCC 1.8994(T) =LMG 25284(T) =DSM 23086(T)).

  3. A Fiber-Optical Intrusion Alarm System Based on Quasi-Distributed Fiber Bragg Grating Sensors

    Institute of Scientific and Technical Information of China (English)

    Qi Jiang; Yun-Jiang Rao; De-Hong Zeng

    2008-01-01

    A fiber-optical intrusion alarm system based on quasi-distributed fiber Bragg grating (FBG) sensors is demonstrated in this paper. The algorithms of empirical mode decomposition (EMD) and wavelet packet characteristic entropy are adopted to determine the intrusion location. The intrusion alarm software based on the Labview is developed, and it is also proved by the experiments. The results show that such a fiber-optical intrusion alarm system can offer the automatic intrusion alarm in real-time.

  4. Reconstruction of secular variation in seawater sulfate concentrations

    Science.gov (United States)

    Algeo, T. J.; Luo, G. M.; Song, H. Y.; Lyons, T. W.; Canfield, D. E.

    2015-04-01

    Long-term secular variation in seawater sulfate concentrations ([SO42-]SW) is of interest owing to its relationship to the oxygenation history of Earth's surface environment. In this study, we develop two complementary approaches for quantification of sulfate concentrations in ancient seawater and test their application to late Neoproterozoic (635 Ma) to Recent marine units. The "rate method" is based on two measurable parameters of paleomarine systems: (1) the S-isotope fractionation associated with microbial sulfate reduction (MSR), as proxied by Δ34SCAS-PY, and (2) the maximum rate of change in seawater sulfate, as proxied by &partial; δ 34SCAS/∂ t(max). The "MSR-trend method" is based on the empirical relationship of Δ34SCAS-PY to aqueous sulfate concentrations in 81 modern depositional systems. For a given paleomarine system, the rate method yields an estimate of maximum possible [SO42-]SW (although results are dependent on assumptions regarding the pyrite burial flux, FPY), and the MSR-trend method yields an estimate of mean [SO42-]SW. An analysis of seawater sulfate concentrations since 635 Ma suggests that [SO42-]SW was low during the late Neoproterozoic (short (<~2 Myr) intervals of the Cambrian, Early Triassic, Early Jurassic, and Cretaceous as a consequence of widespread ocean anoxia, intense MSR, and pyrite burial. The procedures developed in this study offer potential for future high-resolution quantitative analyses of paleo-seawater sulfate concentrations.

  5. Seawater-cultured Botryococcus braunii for efficient hydrocarbon extraction.

    Directory of Open Access Journals (Sweden)

    Kenichi Furuhashi

    Full Text Available As a potential source of biofuel, the green colonial microalga Botryococcus braunii produces large amounts of hydrocarbons that are accumulated in the extracellular matrix. Generally, pretreatment such as drying or heating of wet algae is needed for sufficient recoveries of hydrocarbons from B. braunii using organic solvents. In this study, the Showa strain of B. braunii was cultured in media derived from the modified Chu13 medium by supplying artificial seawater, natural seawater, or NaCl. After a certain period of culture in the media with an osmotic pressure corresponding to 1/4-seawater, hydrocarbon recovery rates exceeding 90% were obtained by simply mixing intact wet algae with n-hexane without any pretreatments and the results using the present culture conditions indicate the potential for hydrocarbon milking.Seawater was used for efficient hydrocarbon extraction from Botryococcus braunii. The alga was cultured in media prepared with seawater or NaCl. Hydrocarbon recovery rate exceeding 90% was obtained without any pretreatment.

  6. Table Salt from Seawater (Solar Evaporation). What We Take from Our Environment. Science and Technology Education in Philippine Society.

    Science.gov (United States)

    Philippines Univ., Quezon City. Science Education Center.

    This module discusses methods of obtaining table salt from seawater. Topic areas considered include: (1) obtaining salt by solar evaporation of seawater in holes; (2) obtaining salt by boiling seawater in pots; (3) how table salt is obtained from seawater in the Philippines; and (4) methods of making salt by solar evaporation of seawater in the…

  7. The decay kinetics of residual chlorine in cooling seawater simulation experiments

    Institute of Scientific and Technical Information of China (English)

    ZENG Jiangning; JIANG Zhibing; CHEN Quanzhen; ZHENG Ping; HUANG Yijun

    2009-01-01

    To find out the decay character of residual chlorine (RC) in the sea water, the concentration of RC was analyzed by N, N-diethyl-p-phenylenediamine (DPD) method under different simulation experimental conditions, in which salinity, temperature, and Chemical Oxygen Demand (COD) were selected. The water used in the experiment was the mixture of aging ocean water, coastal water and extracting solution of coastal sediment at appropriate level. Results are shown as follows: (1)Piecewise function can well reflect the decay dynamics of RC in the cooling seawater. Concretely,the decay dynamics of first 1 min is too rapid to ascertain using a specific kinetic function, and that of the time from 1 to 30 min is fit for the first-order kinetic model. (2) The results could be the foundation of the chemical behavior of RC in seawater, and be used as not only the guidance of the coastal power plants production and sea water desalting companies, but also the establishment of the correlative trade standard.

  8. Intrusion of incisors in adult patients with marginal bone loss.

    Science.gov (United States)

    Melsen, B; Agerbaek, N; Markenstam, G

    1989-09-01

    Elongated and spaced incisors are common problems in patients suffering from severe periodontal disease. Thirty patients characterized by marginal bone loss and deep overbite were treated by intrusion of incisors. Three different methods for intrusion were applied: (1) J hooks and extraoral high-pull headgear, (2) utility arches, (3) intrusion bent into a loop in a 0.17 x 0.25-inch wire, and (4) base arch as described by Burstone. The intrusion was evaluated from the displacement of the apex, incision, and the center of resistance of the most prominent or elongated central incisor. Change in the marginal bone level and the amount of root resorption were evaluated on standardized intraoral radiographs. The pockets were assessed by standardized probing and the clinical crown length was measured on study casts. The results showed that the true intrusion of the center of resistance varied from 0 to 3.5 mm and was most pronounced when intrusion was performed with a base arch. The clinical crown length was generally reduced by 0.5 to 1.0 mm. The marginal bone level approached the cementoenamel junction in all but six cases. All cases demonstrated root resorption varying from 1 to 3 mm. The total amount of alveolar support--that is, the calculated area of the alveolar wall--was unaltered or increased in 19 of the 30 cases. The dependency of the results on the oral hygiene, the force distribution, and the perioral function was evaluated in relation to the individual cases. It was obvious that intrusion was best performed when (1) forces were low (5 to 15 gm per tooth) with the line of action of the force passing through or close to the center of resistance, (2) the gingiva status was healthy, and (3) no interference with perioral function was present.

  9. A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction System

    Institute of Scientific and Technical Information of China (English)

    Siva S. Sivatha Sindhu; S. Geetha; M. Marikannan; A. Kannan

    2009-01-01

    Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this

  10. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  11. Algal blooms: an emerging threat to seawater reverse osmosis desalination

    KAUST Repository

    Villacorte, Loreen O.

    2014-08-04

    Seawater reverse osmosis (SWRO) desalination technology has been rapidly growing in terms of installed capacity and global application over the last decade. An emerging threat to SWRO application is the seasonal proliferation of microscopic algae in seawater known as algal blooms. Such blooms have caused operational problems in SWRO plants due to clogging and poor effluent quality of the pre-treatment system which eventually forced the shutdown of various desalination plants to avoid irreversible fouling of downstream SWRO membranes. This article summarizes the current state of SWRO technology and the emerging threat of algal blooms to its application. It also highlights the importance of studying the algal bloom phenomena in the perspective of seawater desalination, so proper mitigation and preventive strategies can be developed in the near future. © 2014 © 2014 Balaban Desalination Publications. All rights reserved.

  12. Sulfate was a trace constituent of Archean seawater

    DEFF Research Database (Denmark)

    Crowe, Sean Andrew; Paris, Guillaume; Katsev, Sergei

    2014-01-01

    In the low-oxygen Archean world (>2400 million years ago), seawater sulfate concentrations were much lower than today, yet open questions frustrate the translation of modern measurements of sulfur isotope fractionations into estimates of Archean seawater sulfate concentrations. In the water column...... of Lake Matano, Indonesia, a low-sulfate analog for the Archean ocean, we find large (>20 per mil) sulfur isotope fractionations between sulfate and sulfide, but the underlying sediment sulfides preserve a muted range of delta S-34 values. Using models informed by sulfur cycling in Lake Matano, we infer...... Archean seawater sulfate concentrations of less than 2.5 micromolar. At these low concentrations, marine sulfate residence times were likely 10(3) to 10(4) years, and sulfate scarcity would have shaped early global biogeochemical cycles, possibly restricting biological productivity in Archean oceans....

  13. Corrosion electrochemical behavior of brass tubes in circulating cooling seawater

    Institute of Scientific and Technical Information of China (English)

    LU Yu-zhuo; SONG Shi-zhe; YIN Li-hui

    2005-01-01

    Electrochemical impedance spectroscopy (EIS) and electrochemical noise (EN) were used to study the corrosion electrochemical behavior of brass tubes in circulating cooling seawater using the developed sensor. EIS study shows that the inhibitor can lead to the formation of corrosion products on metal surface, which will then inhibit the corrosion process. When the flow rate of the seawater increases, the diffusion of oxygen speeds up and the action of filming on HAl77-2 tube accelerates, resulting in decrease of corrosion rate. EN analysis shows that the flow rate of the seawater has little effect on pitting susceptivity of HSn70-1 tube; however the pitting susceptivity of HAl77-2 tube increases with increasing flow rate. Good agreement is observed between the spectral noise resistance Rsn (f) calculated from EN data and the modulus of impedance. It is shown that the electrochemical noise technique can be used in corrosion monitoring.

  14. Mining Critical Metals and Elements from Seawater: Opportunities and Challenges.

    Science.gov (United States)

    Diallo, Mamadou S; Kotte, Madhusudhana Rao; Cho, Manki

    2015-08-18

    The availability and sustainable supply of technology metals and valuable elements is critical to the global economy. There is a growing realization that the development and deployment of the clean energy technologies and sustainable products and manufacturing industries of the 21st century will require large amounts of critical metals and valuable elements including rare-earth elements (REEs), platinum group metals (PGMs), lithium, copper, cobalt, silver, and gold. Advances in industrial ecology, water purification, and resource recovery have established that seawater is an important and largely untapped source of technology metals and valuable elements. This feature article discusses the opportunities and challenges of mining critical metals and elements from seawater. We highlight recent advances and provide an outlook of the future of metal mining and resource recovery from seawater.

  15. Hydrological dynamics of water sources in a Mediterranean lagoon

    Directory of Open Access Journals (Sweden)

    C. Stumpp

    2014-07-01

    Full Text Available Lagoons are important ecosystems occupying large coastal areas worldwide. Lagoons contain various mixtures of marine and freshwater sources which are highly dynamic in time. However, it often remains a challenge to identify and quantify dynamic changes of water sources, particularly in heterogeneous lagoon systems like the Köycegiz-Dalyan Lagoon (KDL, which is located at the southwest of Turkey on the Mediterranean Sea coast. The objective of this study was to quantify different contributions of potential water sources i.e. surface water, groundwater and seawater in the lagoon and how these water sources changed over time and space. In the wet and dry season stable isotopes of water, chloride concentration (Cl- and salinity were measured in two depths in the lagoon and surrounding water bodies (sea, lake, groundwater. Different components of water sources were quantified with a three component endmember mixing analysis. Differences in Cl- and stable isotopes over time indicated the dynamic behaviour of the system. Generally, none of the groundwater samples was impacted by water of the Mediterranean Sea. During the wet season, most of the lagoon water (>95% was influenced by freshwater and vertically well mixed. During the dry season, high Cl- in the deeper sampling locations indicated a high contribution of marine water throughout the entire lagoon system due to salt water intrusion. However, a distinct layering in the lagoon was obvious from low Cl- and depleted isotope contents close to the surface supporting freshwater inflow into the system even during the dry season. Besides temporal dynamics also spatial heterogeneities were identified. Changes in water sources were most evident in the main lagoon channel compared to more isolate lagoon lakes, which were influenced by marine water even in the wet season, and compared to side branches indicating slower turnover times. We found that environmental tracers helped to quantify contributions of

  16. Molecular Architecture for Polyphosphazene Electrolytes for Seawater Batteries

    Energy Technology Data Exchange (ETDEWEB)

    Mason K. Harrup; Mason K. Harrup; Thomas A. Luther; Christopher J. Orme; Eric S. Peterson

    2005-08-01

    In this work, a series of polyphosphazenes were designed to function as water resistant, yet ionically conductive membranes for application to lithium/seawater batteries. In membranes of this nature, various molecular architectures are possible and representatives from each possible type were chosen. These polymers were synthesized and their performance as solid polymer electrolytes was evaluated in terms of both lithium ion conductivity and water permeability. The impact that this molecular architecture has on total performance of the membranes for seawater batteries is discussed. Further implications of this molecular architecture on the mechanisms of lithium ion transport through polyphosphazenes are also discussed.

  17. How Saccade Intrusions Affect Subsequent Motor and Oculomotor Actions

    Science.gov (United States)

    Terao, Yasuo; Fukuda, Hideki; Tokushige, Shin-ichi; Inomata-Terada, Satomi; Ugawa, Yoshikazu

    2017-01-01

    In daily activities, there is a close spatial and temporal coupling between eye and hand movements that enables human beings to perform actions smoothly and accurately. If this coupling is disrupted by inadvertent saccade intrusions, subsequent motor actions suffer from delays, and lack of coordination. To examine how saccade intrusions affect subsequent voluntary actions, we used two tasks that require subjects to make motor/oculomotor actions in response to a visual cue. One was the memory guided saccade (MGS) task, and the other the hand reaction time (RT) task. The MGS task required subjects to initiate a voluntary saccade to a memorized target location, which is indicated shortly before by a briefly presented cue. The RT task required subjects to release a button on detection of a visual target, while foveating on a central fixation point. In normal subjects of various ages, inadvertent saccade intrusions delayed subsequent voluntary motor, and oculomotor actions. We also studied patients with Parkinson's disease (PD), who are impaired not only in initiating voluntary saccades but also in suppressing unwanted reflexive saccades. Saccade intrusions also delayed hand RT in PD patients. However, MGS was affected by the saccade intrusion differently. Saccade intrusion did not delay MGS latency in PD patients who could perform MGS with a relatively normal latency. In contrast, in PD patients who were unable to initiate MGS within the normal time range, we observed slightly decreased MGS latency after saccade intrusions. What explains this paradoxical phenomenon? It is known that motor actions slow down when switching between controlled and automatic behavior. We discuss how the effect of saccade intrusions on subsequent voluntary motor/oculomotor actions may reflect a similar switching cost between automatic and controlled behavior and a cost for switching between different motor effectors. In contrast, PD patients were unable to initiate internally guided MGS in

  18. Assessing impacts of climate change, sea level rise, and drainage canals on saltwater intrusion to coastal aquifer

    Directory of Open Access Journals (Sweden)

    P. Rasmussen

    2012-07-01

    Full Text Available Groundwater abstraction from coastal aquifers is vulnerable to climate change and sea level rise because both may potentially impact saltwater intrusion and hence groundwater quality depending on the hydrogeological setting. In the present study the impacts of sea level rise and changes in groundwater recharge are quantified for an island located in the Western Baltic Sea. Agricultural land dominates the western and central parts of the island, which geologically are developed as push moraine hills and a former lagoon (later wetland area behind barrier islands to the east. The low-lying central area of the island was extensively drained and reclaimed during the second half of the 19th century. Summer cottages along the beach on the former barrier islands dominate the eastern part of the island. The main water abstraction is for holiday cottages during the summer period (June–August. The water is abstracted from 11 wells drilled to a depth of around 20 m in the upper 5–10 m of a confined chalk aquifer. Increasing chloride concentrations have been observed in several abstraction wells and in some cases the WHO drinking water standard has been exceeded. Using the modeling package MODFLOW/MT3D/SEAWAT the historical, present and future freshwater–sea water distribution is simulated. The model is calibrated against hydraulic head observations and validated against geochemical and geophysical data from new investigation wells, including borehole logs, and from an airborne transient electromagnetic survey. The impact of climate changes on saltwater intrusion is found to be sensitive to the boundary conditions of the investigated system. For the flux-controlled aquifer to the west of the drained area only changes in groundwater recharge impacts the freshwater–sea water interface whereas sea level rise do not result in increasing sea water intrusion. However, on the barrier islands to the east of the reclaimed area below which the sea is

  19. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  20. Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS

    CERN Document Server

    Sangeetha, S; 10.5121/ijnsa.2010.2204

    2010-01-01

    The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS consist of semantic IDS and Fuzzy based IDS. Rule based IDS looks for the specific pattern which is defined as malicious. A non-intrusive regular pattern can be malicious if it occurs several times with a short time interval. For detecting such malicious activities, FASIDS is proposed in this paper. At application layer, HTTP traffic's header and payload are analyzed for possible intrusion. In the proposed misuse detection module, the semantic intrusion detection system works on the basis of rules that define various application layer misuses that are found in the network. An attack identified by the IDS is based on a corresponding rule in the rule-base. An event that doesn't make a 'hit' on the rule-base is given to a Fuzzy Intrusion Detection System (FIDS) for further analysis.