WorldWideScience

Sample records for intrusion ne bohemian

  1. Geochemistry and petrogenesis of the Feshark intrusion (NE Isfahan city

    Directory of Open Access Journals (Sweden)

    Ali Kananian

    2017-11-01

    Full Text Available Introduction Granitic rocks are the most abundant rock types in various tectonic settings and they have originated from mantle-derived magmas and/or partial melting of crustal rocks. The Oligo-Miocene Feshark intrusion is situated in the northeast of the city of Isfahan, and a small part of Urumieh–Dokhtar Magmatic Arc is between 52º21' E to 52º26'E and 32º50' N to - 32º53' N. The pluton has intruded into lower Eocene volcanic rocks such as rhyolite, andesite, and dacite and limestone. Analytical methods Fifteen representative samples from the Feshark intrusion were selected on the basis of their freshness. The major elements and some trace elements were analyzed by X-ray fluorescence (XRF at Naruto University in Japan and the trace-element compositions were determined at the ALS Chemex lab. Results The Feshark intrusion can be divided into two phases, namely granodiorite with slightly granite and tonalite composition and quartz diorite with various quartz diorite and quartz monzodiorite abundant enclaves according to Middlemost (1994 classification. The quartz diorite show dark grey and are abundant at the western part of the intrusive rocks. Granodiorite are typically of white-light grey in color and change gradually into granite and tonalite. The granodiorite and granite rocks consist of quartz, K-feldspar, plagioclase, biotite, and amphibole, whereas in the quartz diorites the mineral assemblages between different minerals are very similar to those observed in the granodiorite. However, amphibole and plagioclase are more abundant and quartz and K-feldspar modal contents are lower than in the granodiorite whereas pyroxene occurs as rare grains. They are characterized as metaluminous to mildly peraluminous based on alumina saturation index (e.g. Shand, 1943 and are mostly medium-K calc-alkaline in nature (Rickwood, 1989. Discussion In the Yb vs. La/Yb and Tb/Yb variation diagrams (He et al., 2009, the studied samples show small

  2. Geotherms and heat flow estimates in the Odra Fault Zone (NE margin of Bohemian Massif, Central Europe) and its relationships to geological structure of NE termination of the European Variscan Orogen

    Science.gov (United States)

    Puziewicz, Jacek; Czechowski, Leszek; Majorowicz, Jacek; Pietranik, Anna; Grad, Marek

    2017-04-01

    The NE margin of Variscan Orogen in Europe comprises Sudety Mts., Fore-Sudetic Block, Odra Fault Zone and Fore-Sudetic Homocline. The Sudety Mts. together with the located to the NE Fore-Sudetic Block form NE part of the Bohemian Massif. The Variscan crystalline basement is exposed at the surface here. The Odra Fault Zone is situated further to the NE. It is a ca. 20 km wide horst of crystalline basement, hidden beneath relatively thin (Tesauro et al. 2009) or is rather due to crustal rock contributions. Funding. This study was possible thanks to the project NCN UMO-2014/15/B/ST10/00095 of Polish National Centre for Science to JP. Dörr W., Żelaźniewicz A., Bylina P., Schastok J., Franke W., Haack U., Kulicki C., 2006. Tournaisian age of granitoids from the Odra Fault Zone (southwestern Poland): equivalent of the Mid-German Crystalline High? International Journal of Earth Sciences 95, 341-349. Puziewicz J., Czechowski L., Krysiński L., Majorowicz J., Matusiak-Małek M., Wróblewska M. , 2012. Lithosphere thermal structure at the eastern margin of the Bohemian Massif: a case petrological and geophysical study of the Niedźwiedź amphibolite massif (SW Poland). International Journal of Earth Sciences 101 (5), 1211-1228. Tesauro M., Kaban M. K., Cloetingh S.A.P.L., 2009. A new thermal and rheological model of the European lithosphere. Tectonophysics 476, 478-495. Żelaźniewicz A., Oberc-Dziedzic T., Fanning C. M., Protas A., Muszyński A., 2017. Late Carboniferous -early Permian events in the Trans-European Suture Zone: Tectonic and acid magmatic evidence from Poland. Tectonophysics 675, 227-243.

  3. Graptolite assemblages and stratigraphy of the lower Silurian Mrákotín Formation, Hlinsko Zone, NE interior of the Bohemian Massif (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Štorch, Petr; Kraft, P.

    2009-01-01

    Roč. 84, č. 1 (2009), s. 51-74 ISSN 1214-1119 R&D Projects: GA AV ČR IAA3013405 Institutional research plan: CEZ:AV0Z30130516 Keywords : graptolites * stratigraphy * Llandovery * Hlinsko Zone * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.983, year: 2009

  4. The Nysa-Morava Zone: an active tectonic domain with Late Cenozoic sedimentary grabens in the Western Carpathians' foreland (NE Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Špaček, P.; Bábek, O.; Štěpančíková, Petra; Švancara, J.; Pazdírková, J.; Sedláček, J.

    2015-01-01

    Roč. 104, č. 4 (2015), s. 963-990 ISSN 1437-3254 R&D Projects: GA ČR GAP210/12/0573; GA MŠk LM2010008 Institutional support: RVO:67985891 Keywords : Bohemian Massif * Upper Morava Basin * tectonic evolution * seismicity * sedimentary grabens Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.133, year: 2015

  5. Combined garnet and zircon geochronology and trace elements studies - constraints of the UHP-(U)HT evolution of Orlica-Śnieżnik Dome (NE Bohemian Massif).

    Science.gov (United States)

    Walczak, Katarzyna; Anczkiewicz, Robert; Szczepański, Jacek; Rubatto, Daniela

    2017-04-01

    The Orlica-Śnieżnik Dome (OSD), located on the NE margin of the Bohemian Massif, is predominantly composed of amphibolite-facies orthogneiss that contain bodies of HP and UHP eclogites and granulites. Numerous geochronological studies have been undertaken to constrain the timing of the ultra-high grade metamorphic event. Despite this, the exact timing of UHP-(U)HT conditions remain dubious (e.g. Brueckner et al., 1991; Anczkiewicz et al., 2007; Bröcker et al., 2009 & 2010). We have utilized garnet and zircon geochronology to provide time constraints on the evolution of the UHT-(U)HP rocks of the OSD. We have combined the ages with trace element analyses in garnet and zircon to better understand the significance of the obtained ages in petrological context. Lu-Hf grt-wr dating of peritectic garnet from two felsic granulites constrained the time of its initial growth at 346.9 ± 1.2 and 348.3 ± 2.0 Ma, recording peak conditions of 2.7 GPa and 950°C (e.g. Ferrero et al., 2015). In situ U-Pb SHRIMP dating of zircon from the same granulite gave a younger age of 342.2 ± 3.4 Ma. HREE partitioning between garnet rim and metamorphic zircon indicate their growth in equilibrium, hence, the U-Pb zircon date constrains the terminal phase of garnet crystallization. Similar ages were obtained from two eclogite bodies from Międzygórze and Nowa Wieś localities; Lu-Hf (grt-cpx-wr) dating provided ages of 346.5 ± 2.4 and 348.1 ± 9.1 Ma for samples from Międzygórze and Nowa Wieś, respectively. The same age (within error) of 346.3 ± 5.2 Ma was reported by Bröcker et al. (2010) for zircon from the Międzygórze eclogite. Comparison of REE concentrations in garnet (this study) and in metamorphic zircon (reported in Bröcker et al., 2010) indicate that garnet and zircon crystallized in equilibrium. Furthermore, M-HREE patterns observed in both garnet and zircon strongly suggest their growth at eclogite facies conditions. Sm-Nd garnet ages obtained for both felsic and mafic

  6. (222)Rn activity concentration differences in groundwaters of three Variscan granitoid massifs in the Sudetes (NE Bohemian Massif, SW Poland).

    Science.gov (United States)

    Przylibski, Tadeusz A; Gorecka, Joanna

    2014-08-01

    Based on research conducted in three Variscan granitoid massifs located within the crystalline Bohemian Massif, the authors confirmed that the higher the degree of their erosional dissection, the smaller the concentration of (222)Rn in groundwaters circulating in these massifs. This notion implies that radon waters and high-radon waters, from which at least some of the dissolved radon should be removed before feeding them as drinking water to the water-supply system, could be expected in granitoid massifs which have been poorly exposed by erosion. At the same time, such massifs must be taken into account as the areas of possible occurrence of radon medicinal waters, which in some countries can be used for balneotherapy in health resorts. Slightly eroded granitoid massifs should be also regarded as very probable radon prone areas or areas of high radon potential. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Geology, alteration, age dating and petrogenesis of intrusive bodies in Halak Abad prospect area, NE Iran

    Directory of Open Access Journals (Sweden)

    Maliheh Ghourchi

    2014-04-01

    Full Text Available The Halak Abad prospect occurs in the northeastern part of Central Iran zone (Sabzevar structural zone. In this investigation, geochemical evolution, age and source of part of northeastern Iran magmatic arc (intrusive bodies in Halak Abad area in the Khorasan Razavi province has been studied. The exposed rocks consist of volcanic rocks with andesite and dacite nature, limestone, plutonic rocks mostly diorite, quartz diorite, monzodiorite, quartz monzonite, granodiorite and granite and sedimentary rocks such as limestone, sandstone and conglomerate. Magnetic susceptibility of intrusive rocks is >100 × 10-5 SI, so they belong to the magnetite-series (oxidized. This magmatism is mainly low-K (tholeiite series and meta-aluminous. The amounts of Zr, Th, Nb and Ti show depletion compared to N-MORB. Trace elements behavior shows a nearly flat pattern. Age of granodiorite body based on U-Pb zircon dating is 99.7±1.8 Ma (Mid-Cretaceous and 87Sr/86Sr initial ratio is 0.7047. The geochemical signature and 87Sr/86Sr initial ratio in the area suggest volcanic arc magmatism in subduction zone. This magmatism has characteristic such as high Na2O (3-7 %, low K2O (0.12-1 %, high CaO (4-5.7%, low Rb (1-20 ppm, low total REE (<40 ppm, high Ba/Nb, Sm/Yb<2, (La/YbN<5, 87Sr/86Sr initial ratio < 0.7045 and εNd: +4.5 show differences with normal granitoids in subduction zones. Geochemical and petrological characteristics indicate melting in relatively low pressure (shallow depth. The lines of evidence demonstrate that formation of this granitoid needs a suprasubduction zone.

  8. Eclogite facies relics and a multistage breakdown in metabasites of the KTB pilot hole, NE Bavaria: implications for the Variscan tectonometamorphic evolution of the NW Bohemian Massif

    Science.gov (United States)

    O'Brien, Patrick J.; Röhr, Christian; Okrusch, Martin; Patzak, Margarete

    1992-11-01

    Complex reaction textures in coronitic metagabbros and retrograded eclogites of the KTB pilot and an adjacent drilling provide evidence for a multistage metamorphic history in the Variscan basement of the NW Bohemian Massif. The eclogites show complete metamorphic recrystallization leaving no textural or mineral relics of their igneous precursors. In contrast, textural relics of the igneous protolith are still preserved in the metagabbros where the metamorphic overprint under high pressure conditions achieved only partial replacement of the initial assemblage plagioclase + augite + amphibole (+olivine or orthopyroxene?) + ilmenite to form the eclogite facies assemblage garnet + omphacite + kyanite + zoisite + quartz+rutile. The garnets in the metagabbros occur in the typical ‘necklace’ fashion at the borders between the original plagioclase and mafic phase domains. In the same rocks, omphacite formed by a topotactic reaction mechanism replacing igneous augite as well as in smaller grains at the margins of the texturally igneous clinopyroxene where it occurs without fixed orientation with respect to the relict phase. Both eclogites and metagabbros show a partial breakdown under high pressure granulite (transitional to high pressure amphibolite) facies conditions during which omphacite broke down to vermicular symplectites of diopside + plagioclase. A later pervasive medium pressure metamorphism under amphibolite facies conditions led to the development of assemblages dominated by hornblende + plagioclase+titanite: phases prevailing in the overwhelming majority of the surrounding metabasites. Subsequent vein-associated retrogression produced minerals typical of the greenschist to zeolite facies. All metamorphic stages may be represented in a single thin section but although the overall reaction sequence is apparent, the obvious disequilibrium in the rocks makes the use of conventional geothermobarometry difficult. However, calculations made by assuming an

  9. Mineralogical and Geochemical Characterization of the Kimmeria Intrusion-Related Deposit, Xanthi, NE Greece

    Science.gov (United States)

    Theodoridou, Stella; Melfos, Vasilios; Voudouris, Panagiotis; Miskovic, Aleksandar

    2016-04-01

    Although intrusion-related systems have not been previously recognized in the European segment of the Tethyan Metallogenic Belt, the Rhodope metallogenic province of SE Balkan peninsula hosts numerous such occurrences. The Kimmeria hydrothermal system incorporates two styles of ore mineralization: i) a massive Au-bearing magnetite-pyrrhotite skarn and ii) a Mo-Cu-Bi-W quartz vein-hosted mineralization, both of which are related to the Oligocene Xanthi pluton (25.5±1.2 to 30±1 My, K-Ar in hornblende and biotite). The Xanthi pluton, consisting of I-type gabbros, monzonites and amphibole-biotite granodiorites, intrudes the basement gneisses, mica schists, amphibolites and marbles of the Southern Rhodope Core Complex; a dome that has gradually exhumed from Paleocene/mid Eocene to Miocene (starting between 65 and >42 to 10 My). The Xanthi pluton emplacement and the magmatically derived hydrothermal fluid circulation were controlled by two major regional structures: the low-angle Kavala-Xanthi-Komotini detachment fault and the Nestos thrust fault. The Kimmeria Au-Cu-Fe skarn mineralization features a well-preserved aureole at the contact between the granodiorite and the surrounding marbles. It consists of two paragenetic stages comprising magnetite and pyrrhotite-rich assemblages. Alteration minerals comprise chlorite and sericite. Bulk chemical analyses of the skarn mineralization revealed relatively high concentration of Cu (1 wt.%), Pb (288 ppm) and Zn (0.74 wt.%). The mineralization is also enriched in As (type mineralization comprises a system of cross-cutting and sheeted quartz veins within the granodiorite, with pyrite, chalcopyrite and molybdenite as dominant sulfides. Minor sphalerite, tetrahedrite-tennantite, galena and rutile are also present, while sericite and chlorite as the alteration minerals. The Cu and Mo content of the vein type mineralization exceed 1.0 and 0.2 wt.% respectively, along with types of mineralization suggesting a magmatic source of

  10. Magma-mixing in the genesis of Hercynian calc-alkaline granitoids: an integrated petrographic and geochemical study of the Sázava intrusion, Central Bohemian Pluton, Czech Republic

    Science.gov (United States)

    Janoušek, Vojtěch; Braithwaite, Colin J. R.; Bowes, D. R.; Gerdes, Axel

    2004-10-01

    The Devonian-early Carboniferous (354.1±3.5 Ma: conventional zircon U-Pb age) Sázava intrusion (biotite-amphibole quartz diorite, tonalite and granodiorite) of the Central Bohemian Pluton (CBP) associated with bodies of (olivine, pyroxene-) amphibole gabbro, gabbrodiorite, (quartz) diorite and rare hornblendite, gives an opportunity for a comparative study of a rather shallow, calc-alkaline magma-mixing zone at two levels, separated by a vertical difference of approximately 1 km. The deeper section (Příbram) displays the direct evidence for the existence of a long-lived, periodically tapped and replenished, floored magma chamber (MASLI). The contacts between the subhorizontal sheet-like basic bodies and the surrounding, commonly cumulus-rich, Sázava granitoid, are arcuate, and cut by a series of veins and ascending pipes. Shallow-dipping swarms of strongly elongated and flow-aligned mafic microgranular enclaves (MME), concordant with the contacts of the basic bodies, are commonplace. The higher level (Teletín) section shows relatively independent basic intrusions, some of them distinctly hybrid in character and mainly of quartz dioritic composition, surrounded by relatively homogeneous, nearly cumulus-free Sázava tonalite rich in texturally variable MME. Larger quartz microdiorite bodies and the MME, both interpreted as hybrids, contain varying proportions of highly heterogeneous plagioclase megacrysts with complex zoning, particularly well shown by cathodoluminescence (CL). Most often the megacrysts have cores of labradorite-anorthite, partly resorbed and overgrown by andesine rims but some are strongly brecciated and fragments have been annealed by rim growth. Also characteristic are long prisms of apatite, oikocrysts of quartz and K-feldspar and zoned amphibole. The latter has brown pargasite and magnesiohastingsite cores, resorbed and overgrown by magnesiohornblende, compositionally similar to the amphibole in the Sázava tonalite. The brown cores are

  11. Lithospheric mantle beneath NE part of Bohemian Massif and its relation to overlying crust: new insights from Pilchowice xenolith suite, Sudetes, SW Poland

    Science.gov (United States)

    Ćwiek, Mateusz; Matusiak-Małek, Magdalena; Puziewicz, Jacek; Ntaflos, Theodoros

    2017-12-01

    The Oligocene/Miocene basanite from Pilchowice (Sudetes Mts., SW Poland) carries numerous small xenoliths of mantle peridotite, mostly harzburgite. The Pilchowice xenolith suite is dominated by harzburgites and dunites containing olivine Fo 90.2-91.5 (group A). The peridotites of group B (olivine Fo 88.6-89.4), and C (olivine Fo 83.2-86.5) are subordinate. The peridotites suffered from significant melt extraction (20-30%) and were subsequently subjected to metasomatism. Three different trace element compositional patterns of group A clinopyroxene occur, which are typical of silicate melt, carbonatite melt and silicate-carbonatite melt metasomatism, whereas groups B and C were affected by silicate melt metasomatism only. The Pilchowice basanite occurs at the contact of Karkonosze-Izera Block and Kaczawa Complex, two major geological units of Sudetes. The Pilchowice xenolith suite documents underlying lithospheric mantle of composition and depletion degree similar to those described in the whole Lower Silesian mantle domain, which forms NE termination of Saxo-Thuringian zone of the European Variscan orogen. The crustal structure of the orogen is, therefore, not mirrored in the mantellic root.

  12. Reconnaissance study of an inferred Quaternary maar structure in the western part of the Bohemian Massif near Neualbenreuth, NE-Bavaria (Germany)

    Science.gov (United States)

    Rohrmüller, J.; Kämpf, H.; Geiß, E.; Großmann, J.; Grun, I.; Mingram, J.; Mrlina, J.; Plessen, B.; Stebich, M.; Veress, C.; Wendt, A.; Nowaczyk, N.

    2017-10-01

    After a comprehensive geophysical prospecting the Quaternary Mýtina Maar, located on a line between the two Quaternary scoria cones Komorní hůrka/Kammerbühl and Železná hůrka/Eisenbühl, could be revealed by a scientific drilling at the German-Czech border in 2007. Further geophysical field investigations led to the discovery of another geological structure about 2.5 km ESE of the small town Neualbenreuth (NE-Bavaria, Germany), inferred to be also a maar structure, being the fourth volcanic feature aligned along the NW-SE trending Tachov fault zone. It is only faintly indicated as a partial circular rim in the digital elevation model. Though not expressed by a clear magnetic anomaly, geoelectric and refraction seismic tomography strongly indicates a bowl-shaped depression filled with low-resistivity and low-velocity material, correlating well with the well-defined negative gravity anomaly of - 2.5 mGal. Below ca. 15 m-thick debris layer, successions of mostly laminated sediments were recovered in a 100 m-long sediment core in 2015. Sections of finely laminated layers, likely varves, rich in organic matter and tree pollen, were recognized in the upper (22-30 m) and lower (70-86 m) part of the core, respectively, interpreted as interglacials, whereas mostly minerogenic laminated deposits, poor in organic matter, and (almost) barren of tree pollen are interpreted as clastic glacial deposits. According to a preliminary age model based on magnetostratigraphy, palynology, radiocarbon dating, and cyclostratigraphy, the recovered sediments span the time window from about 85 ka back to about 270 ka, covering marine isotope stages 5-8. Sedimentation rates are in the range of 10 cm ka-1 in interglacials and up to 100 cm ka-1 in glacial phases. The stratigraphic record resembles the one from Mýtina Maar, with its eruption date being derived from a nearby tephra deposit at 288 ± 17 ka, thus supporting the age model of the inferred Neualbenreuth Maar.

  13. Sm-Nd isotope and trace element evidence for heterogeneous igneous protoliths of Variscan mafic blueschists in the East Krkonoše Complex (West Sudetes, NE Bohemian Massif, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Patočka, František; Pin, CH.

    2005-01-01

    Roč. 18, č. 5 (2005), s. 363-374 ISSN 0985-3111 R&D Projects: GA AV ČR(CZ) IAA3111102 Institutional research plan: CEZ:AV0Z3013912 Keywords : Blueschists * Bohemian Massif * Early Palaeozoic * Nd isotopes * Northern Gondwana * trace elements Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.842, year: 2005

  14. Syntectonic emplacement of the Triassic biotite-syenogranite intrusions in the Taili area, western Liaoning, NE China: Insights from petrogenesis, rheology and geochronology

    Science.gov (United States)

    Li, Weimin; Liu, Yongjiang; Jin, Wei; Neubauer, Franz; Zhao, Yingli; Liang, Chenyue; Wen, Quanbo; Feng, Zhiqiang; Li, Jing; Liu, Qing

    2017-05-01

    The North China Craton (NCC) is one of the oldest cratons in the world, and it recently becomes a hot study area because of large volumes of Mesozoic intrusions associated with lithospheric thinning contributing to cratonic destruction in late Mesozoic times. However, the timing of initial thinning and destruction is still controversial. The Taili area, western Liaoning Province, in the northeastern part of the NCC well exposes the Archean basement rocks and the Mesozoic magmatic rocks with variable plastic deformation. This study focuses on the syntectonic emplacement of the Triassic biotite-syenogranite intrusions, in order to understand their petrogenesis, timing as well as the geological significance. Zircon LA-ICP-MS U-Pb ages reveal that the biotite-syenogranites formed between 246 and 191 Ma, and contain many ancient (2564-2317 Ma) zircon xenocrysts. Geochemical data suggests that the biotite-syenogranites display an adakitic affinity with high Sr/Y = 135-167 and (La/Yb)N = 48-69, as well as negligible Eu anomalies (δEu = 0.87-0.94), high negative zircon εHf(t) values (-15.5 to -21.5) and ancient TDM2 ages (2246-2598 Ma). This data suggests that the parent magmas were generated from partial melting of thickened Archean lower crustal rocks probably due to the bidirectional amalgamation of the NCC with the NE China micro-blocks and the Yangtze Craton in its north and south, respectively. In the middle part of the Taili area, magmatic fabrics are well preserved in the biotite-syenogranite intrusion characterized by the strong preferred orientation of biotite and hornblende crystals, which parallel to the intrusion margin and are slightly oblique to the gneissosity of the sheared host Neoarchean granitic gneisses. The quartz grain size piezometer suggests that the paleo-differential stresses weaken toward to the central part of the intrusion, ranging from 21.40-22.22 MPa to 16.74-19.34 MPa, during quartz crystallization in the emplacement stage. This allow

  15. Tertiary alkaline Roztoky Intrusive Complex, České středohoří Mts., Czech Republic: petrogenetic characteristics

    Czech Academy of Sciences Publication Activity Database

    Skála, Roman; Ulrych, Jaromír; Ackerman, Lukáš; Jelínek, E.; Dostal, J.; Hegner, E.; Řanda, Zdeněk

    2014-01-01

    Roč. 103, č. 5 (2014), s. 1233-1262 ISSN 1437-3254 R&D Projects: GA AV ČR IAA300130902 Institutional support: RVO:67985831 ; RVO:61389005 Keywords : Bohemian Massif * Cenozoic * continental rift * Roztoky Intrusive Complex * alkaline intrusions * geochemistry Subject RIV: DD - Geochemistry Impact factor: 2.093, year: 2014

  16. Geochronology and geochemistry of Mesozoic intrusive rocks in the Xing'an Massif of NE China: Implications for the evolution and spatial extent of the Mongol-Okhotsk tectonic regime

    Science.gov (United States)

    Li, Yu; Xu, Wen-Liang; Tang, Jie; Pei, Fu-Ping; Wang, Feng; Sun, Chen-Yang

    2018-04-01

    This study presents new zircon U-Pb-Hf and whole-rock geochemical data for intrusive rocks in the Xing'an Massif of NE China, with the aim of furthering our understanding of the evolution and spatial influence of the Mongol-Okhotsk tectonic regime. Zircon U-Pb dating indicates that five stages of Mesozoic magmatism are recorded in the Xing'an Massif, namely during the Middle Triassic ( 237 Ma), the Late Triassic ( 225 Ma), the Early Jurassic ( 178 Ma), the Middle Jurassic ( 168 Ma), and the late Early Cretaceous ( 130 Ma). The Middle Triassic-Early Jurassic intrusive rocks in the Xing'an Massif are dominantly granodiorites, monzogranites, and syenogranites that formed from magma generated by partial melting of newly accreted continental crust. Geochemistry of the Middle Triassic-Early Jurassic granitoid suites of the Xing'an Massif indicates their formation at an active continental margin setting, related to the southwards subduction of the Mongol-Okhotsk oceanic plate. The Middle Jurassic monzogranites in the Xing'an Massif are geochemically similar to adakites and have εHf(t) values (+3.8 to +5.8) and Hf two-stage model ages (TDM2; 979-850 Ma) that are indicative of derivation from magma generated by partial melting of thickened juvenile lower crust. The Middle Jurassic monzogranites formed in a compressional setting related to the closure of the Mongol-Okhotsk Ocean. The late Early Cretaceous intrusive rocks in the Xing'an Massif are dominated by A-type granitoids that are associated with bimodal volcanic rocks, suggesting their formation in an extensional environment related to either (i) delamination of a previously thickened region of the crust, associated with the Mongol-Okhotsk tectonic regime; (ii) the subduction of the Paleo-Pacific Plate; or (iii) the combined influence of these two tectonic regimes.

  17. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  18. Highly differentiated magmas linked with polymetallic mineralization: A case study from the Cuihongshan granitic intrusions, Lesser Xing'an Range, NE China

    Science.gov (United States)

    Fei, Xianghui; Zhang, Zhaochong; Cheng, Zhiguo; Santosh, M.; Jin, Ziliang; Wen, Bingbing; Li, Zixi; Xu, Lijuan

    2018-03-01

    The genetic link between granitoids and polymetallic skarn mineralization has remained equivocal. The Cuihongshan skarn-porphyry W-Mo-Pb-Zn-(Fe-Cu) deposit in the eastern part of the Central Asian Orogenic Belt provides a unique example to address this issue. The major rock types in the mine area are Early Paleozoic intrusions composed of biotite syenogranite and biotite porphyritic granite and Early Mesozoic intrusions represented by porphyritic quartz monzonite, biotite monzogranite, and porphyritic granite. The diagnostic mineralogical and geochemical features indicate that the rocks belong to A2-type granites. The Early Paleozoic suite shows zircon U-Pb ages of 501 Ma, and εHf(t) values of - 4.4 to + 2.7 and + 2.4 to + 7.6, respectively. In combination with their coherent geochemical trends, these rocks are inferred to be products of in-situ differentiation. Although the Mesozoic suite shows crystallization ages of 194-196 Ma, εHf(t) values are in the range of - 2.5 to + 7.5 for the porphyritic quartz monzonite, the - 1.8 to + 4.5 values for the monzogranite and the + 2.3 to + 8.0 range for the porphyritic granite. The porphyritic quartz monzonite displays distinct mineral assemblage and shows significant compositional gap with the other two lithofacies. In contrast, the monzogranite and porphyritic granite have similar geochemical features, and are thus inferred to be co-magmatic. Considering the high SiO2 contents, variable εHf(t) (- 4.4 to + 8.0) and εNd(t) values (- 8.4 to + 0.28) for the two suites, we infer that both episodes of granitoid magmatism resulted from partial melting of crustal materials with a mixed source containing varying proportions of juvenile and Precambrian crustal components. The Early Mesozoic porphyritic granite shows a highly evolved F-rich geochemical affinity, and experienced magma-fluid interaction. Cassiterite from the calcic skarn and the magnesian skarn that coexists with magnetite orebodies shows a mean U-Pb age of 195

  19. Vapor Intrusion

    Science.gov (United States)

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  20. Geochemical characteristics and petrogenesis of phonolites and trachytic rocks from the České Středohoří Volcanic Complex, the Ohře Rift, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Ulrych, Jaromír; Řanda, Zdeněk; Erban, V.; Hegner, E.; Magna, T.; Balogh, K.; Frána, Jaroslav; Lang, Miloš; Novák, Jiří Karel

    224/225, May (2015), s. 256-271 ISSN 0024-4937 R&D Projects: GA AV ČR IAA3048201 Institutional support: RVO:67985831 ; RVO:61389005 Keywords : phonolite * trachyte * Sr–Nd–Li isotopes * Cenozoic alkali ne volcanism * Ohře (Eger) Rift * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 3.723, year: 2015

  1. Landscape Perception of the Bohemian Paradise

    Directory of Open Access Journals (Sweden)

    Bušek Martin

    2016-12-01

    Full Text Available Comprehensive understanding of the destination perception by its visitors represents one of the key prerequisites of professional destination management on its both strategic and tactical level. This study continues in previous research focused on the analysis of the perception of different landscape types of the Czech Republic, zooming this time on the perception of the landscape of the Bohemian Paradise destination. The emphasis is put on the understanding of manifestations of genius loci and the exogenous factors in the landscape perception. The participant ´s observation of visitors’ behaviour, evaluation of their spontaneous discussions and comments, structured interviews and introspection supplemented by recordings of exogenous factors represented methods used to get an insight into the perception of landscape and genius loci manifestation in the selected research localities. The qualitative research strategy in the form of pilot research led to the confirmation of suitability of applied methods and to the formulation of the preliminary hypotheses of the future quantitative research. The findings of this pilot research indicate the correctness of the assumption of the exogenous factors (weather, daytimes and seasons of the year influence on the landscape perception as well as the manifestation of the genius loci perceived by the majority of visitors.

  2. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  3. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  4. An Andean type Palaeozoic convergence in the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Schulmann, K.; Konopásek, J.; Janoušek, V.; Lexa, O.; Lardeaux, J.-M.; Edel, J.-B.; Štípská, P.; Ulrich, Stanislav

    2009-01-01

    Roč. 341, č. 2-3 (2009), s. 266-286 ISSN 1631-0713 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * Saxothuringian oceanic subduction * building of Variscan orogenic root system * channel flow Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.931, year: 2009

  5. Algae of the Bohemian Forest. 1. Specieses richness

    Czech Academy of Sciences Publication Activity Database

    Lederer, F.; Lukavský, Jaromír

    2001-01-01

    Roč. 6, - (2001), s. 97-104 ISSN 1211-7420 R&D Projects: GA AV ČR IA60504; GA ČR GA206/99/1411 Institutional research plan: CEZ:AV0Z6005908 Keywords : Bohemian Forest * species richness * biodiversity * algae * cyanobacteria * lakes * brooks * rivers * bogs Subject RIV: EH - Ecology, Behaviour

  6. Possibilities of Using Transport Terminals in South Bohemian Region

    Science.gov (United States)

    Čejka, Jiří; Bartuška, Ladislav; Turinská, Libuše

    2017-03-01

    Currently, when there is a need for transport services adapted to the customer requirements and create a workable operational system, there is increasing talk about transport terminals. Since the South Bohemian region is one of those where this issue will be increasingly dealt with, this paper suggests ways to use transport terminals as important support systems for freight and passenger transport.

  7. Possibilities of Using Transport Terminals in South Bohemian Region

    Directory of Open Access Journals (Sweden)

    Čejka Jiří

    2017-03-01

    Full Text Available Currently, when there is a need for transport services adapted to the customer requirements and create a workable operational system, there is increasing talk about transport terminals. Since the South Bohemian region is one of those where this issue will be increasingly dealt with, this paper suggests ways to use transport terminals as important support systems for freight and passenger transport.

  8. Intrusive Geometries and Cenoyoic Stress History of the Northern Part of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Adamovič, Jiří; Coubal, Miroslav

    1999-01-01

    Roč. 9, - (1999), s. 5-14 ISSN 1210-9606. [Magmatism and Rift Basin Evolution. Liblice, 07.09.1998-11.09.1998] Subject RIV: DB - Geology ; Mineralogy http://geolines.gli.cas.cz/fileadmin/volumes/volume09/G9-005.pdf

  9. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  10. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  11. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  12. Uranium mineralization in the Bohemian Massif and its exploration

    International Nuclear Information System (INIS)

    Matolin, M.; Pluskal, O.; Rene, M.

    1981-01-01

    Long-term systematic and planned uranium survey including airborne, carborne, ground, logging and laboratory radiometric measurements as well as geological and geochemical investigations have shown a difference in radioactivity of two regional geological units in Czechoslovakia. The higher regional radioactivity of the Variscan granitoid rocks of the Bohemian Massif differs from that of the West Carpathians and is associated with more frequent uranium mineralization. Endogenous vein-type uranium mineralization has a spatial association with high-radioactivity granitoids in the Bohemian Massif. Airborne prospection defined rock radioactivity features on a regional scale while surface and subsurface radiometric and geological investigations using various techniques localized important uranium deposits. Complex statistical evaluation of numerous geophysical and geological data was studied in order to delineate uranium-favourable areas. (author)

  13. Analysis of supply adventure tourism in the South Bohemian Region

    OpenAIRE

    Klečacká, Simona

    2009-01-01

    The thesis, entitled "Analysis of supply adventure tourism in the South Bohemian Region" is to describe and analyze the options and instruments of tourism in selected destination. Work processes typology adventure tourism and also defines key terms related to this topic. It then focuses on identifying different types of adventure tourism, cooperation in the design of an appropriate design and implementation of a new product in the field of adventure tourism.

  14. Database of seismic wave travel times in the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Růžek, Bohuslav; Zedník, Jan; Hrubcová, Pavla

    2005-01-01

    Roč. 5, č. 2 (2005), s. 145-152 ISSN 1213-1962. [Nové poznatky a měření v seizmologii, inženýrské geofyzice a geotechnice. Ostrava, 12.04.2005-13.04.2005] Institutional research plan: CEZ:AV0Z30120515 Keywords : refraction seismic experiments * Bohemian Massif * database Subject RIV: DC - Siesmology, Volcanology, Earth Structure

  15. Recurrent Cenozoic volcanic activity in the Bohemian Massif (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Dostal, J.; Adamovič, Jiří; Jelínek, E.; Špaček, Petr; Hegner, E.; Balogh, K.

    2011-01-01

    Roč. 123, 1/4 (2011), s. 133-144 ISSN 0024-4937 R&D Projects: GA AV ČR(CZ) IAA300130902; GA ČR(CZ) GA205/09/1170 Institutional research plan: CEZ:AV0Z30130516; CEZ:AV0Z30120515 Keywords : Bohemian Massif * Cenozoic * alkaline volcanism * paleostress fields * rift * mantle Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.246, year: 2011

  16. Documentation and evaluation of slope instabilities and other geological phenomena in the Geopark Bohemian Paradise (Czech Republic)

    Science.gov (United States)

    Krejčí, Oldřich; Krejčí, Vladimíra; Švábenická, Lilian; Hartvich, Filip

    2016-04-01

    Geographically, the area is part of the Bohemian Cretaceous Basin, the unit Jičín Hilly land. Since October 2005, the area belongs to the European Geopark UNESCO Bohemian Paradise. The reason of the protection is a major complex of rocks, natural forest communities and geomorphological valuable territory. The territory has been newly geologically mapped in a scale of 1 : 25,000. Sediments of the Czech Cretaceous Basin covers an area of 181 km2 and were deposited transgressively on the Permian - Carboniferous and crystalline basement of the Bohemian Massif. Except for locally developed basal sediments of fluvial origin they are mostly shallow marine sediments. Middle Turonian to Lower Coniacian rocks of the Jizera lithofacies are dominant by calcareous sandstones deposited under extremely dynamic conditions. Scattered alkaline volcanics penetrate the older formations as small intrusions and form locally preserved bodies at the surface. Area is strongly predisposed to the development of various types of landforms by structural segmentation of the Cretaceous sandstones and claystones and by Plio-Pleistocene inverse erosion. Numerous archival manuscripts are available from this area together with published geological, engineering-geological, geomorphological and historical papers. This is due to the fact that in 1926 a large landslide destroyed a substantial part of the village Dneboh, situated on the slope below a rock castle Drabske Svetnicky. Drabske Svetnicky is a ruin of a 13th century castle. It is located on the ragged edge of a sandstone cliff high above surrounding landscape. The castle covers a group of seven sandstone rocks, connected with wooden bridges. In the 50ies of the 20th century, an increased attention was paid to Drabske Svetnicky by experts on medieval architecture and a restoration of the original state of the castle rock was accomplished. Remnants of pottery and other findings suggest that the plateau region of the castle was first inhabited

  17. Large plates and small blocks: The Variscan orogeny in the Bohemian Massif

    Science.gov (United States)

    Kroner, Uwe; Romer, Rolf L.

    2017-04-01

    The Bohemian Massif of the Central European Variscides consists of several late Proterozoic / early Paleozoic low-strain crustal units, namely the Bruno-Vistulian continental block of the Laurussian plate that is juxtaposed with the Tepla-Barrandian Unit and the Lausitz block of the Gondwana plate. These pre-Variscan low-strain units are separated by high-strain zones that contain the mid- and lower crustal record of the Variscan orogeny (400-300 Ma), with nappes reflecting successive subduction exhumation events, voluminous migmatites and a wide range of geochemically contrasting granites. Although the principal constraints are undisputed, there is no consensus regarding the general tectonics of this area. Here we present a plate tectonic model explaining the Bohemian Massif as an orogenic wedge with a Gondwana pro-wedge and a Laurussia retro-wedge area. The principal formation steps are as follows. Subduction of the oceanic crust of the Gondwana plate, i.e. the southern part of the Rheic Ocean eventually followed by continental subduction of the distal Peri-Gondwana shelf produced the early Devonian (U)HP complexes now exposed in the uppermost allochthonous units. The arrival of the Tepla-Barrandian Cadomian block initiates a flip of subduction polarity, leading to the complete closure of the Rheic Ocean in the late Devonian coeval with the exhumation of the early Variscan (U)HP units. Caused by the Lausitz block entering the plate boundary zone in the early Carboniferous, this early subduction accretion stage was followed by continent continent collision. The resulting orogenic wedge is characterized by an intra-continental subduction zone in the pro-wedge area superimposed by the crustal stack of early and mid-Variscan accreted units. Due to heating of the subducted slab in the mantle, the isothermal exhumation of this deeply buried continental crust caused HT-LP metamorphism during the final transpressional stage. Lateral extrusion tectonics coeval with the

  18. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  19. U–Pb zircon provenance of Moldanubian metasediments in the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Košler, J.; Konopásek, J.; Sláma, Jiří; Vrána, S.

    2014-01-01

    Roč. 171, č. 1 (2014), s. 83-95 ISSN 0016-7649 Institutional support: RVO:67985831 Keywords : zircon * metasediments * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 2.639, year: 2014

  20. Genetic stratigraphy of Coniacian deltaic deposits of the northwestern part of the Bohemian Cretaceous Basin

    Czech Academy of Sciences Publication Activity Database

    Nádaskay, R.; Uličný, David

    2014-01-01

    Roč. 165, č. 4 (2014), s. 547-575 ISSN 1860-1804 Institutional support: RVO:67985530 Keywords : genetic stratigraphy * well log * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.569, year: 2014

  1. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  2. Oceanic thermohaline intrusions: theory

    Science.gov (United States)

    Ruddick, Barry; Kerr, Oliver

    2003-03-01

    This is a review of theories governing growth and evolution of thermohaline intrusive motions. We discuss theories based on eddy coefficients and salt finger flux ratios and also on molecular Fickian diffusion, drawing relationships and parallels where possible. We discuss linear theories of various physical configurations, effects of rotation and shear, and nonlinear theories. A key requirement for such theories to become quantitatively correct is the development and field testing of relationships between double-diffusive fluxes and average vertical gradients of temperature and salinity. While we have some ideas about the functional dependencies and rough observational constraints on the magnitudes of such flux/gradient relationships, many questions will not be answered until usable ‘flux laws’ exist. Furthermore, numerical experiments on double-diffusive intrusions are currently feasible, but will have more quantitative meaning when fluxes are parameterised with such laws. We conclude that more work needs to be done in at least two areas. Firstly, tests of linear theory against observations should continue, particularly to discover the extent to which linear theories actually explain the genesis of intrusions. Secondly, theoretical studies are needed on the nonlinear effects that control the evolution and finite amplitude state of intrusions, since these determine the lateral fluxes of salt, heat, and momentum.

  3. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  4. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  5. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  6. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    protection in the United States. AFIT-ENG-13-M-49 NETWORK INTRUSION DATASET ASSESSMENT THESIS Presented to the Faculty Department of Electrical and...conclusions as to its use as a benchmark dataset vary: Cho et al. [10] recommend not using the KDD99 dataset at all, while Engen et al. [16] suggest that...more care be taken in interpretation of results, but recommend continued use. As discussed by Engen et al. [16], researchers continue to use the KDD99

  7. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  8. Wireless Intrusion Detection

    Science.gov (United States)

    2007-03-01

    LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Frequency Error (kHz) Figure 3-8 Frequency error Distributions...0.40 0.45 Linksys/CIAMPIAJ1 Linksys/LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Received Power (dBm) Figure 3-10...Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Rise-Time (samples) Figure 3-12 Packet Rise-Time Distributions During Intrusion

  9. Motion effects on intrusion development

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Holmes, E.A.; Becker, E.S.

    2010-01-01

    Analogue studies on intrusion development have found that visuospatial tasks performed during the encoding of aversive information reduce subsequent intrusion development. However, these studies cannot rule out a physical explanation in terms of simple movement. In the current study we addressed

  10. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  11. Mineralogy of Bohemian green earth pigment and its microanalytical evidence in historical paintings

    Czech Academy of Sciences Publication Activity Database

    Hradil, David; Píšková, Anna; Hradilová, J.; Bezdička, Petr; Lehrberger, G.; Gerzer, S.

    2011-01-01

    Roč. 53, č. 3 (2011), s. 563-586 ISSN 0003-813X R&D Projects: GA ČR GA203/07/1324 Institutional research plan: CEZ:AV0Z40320502 Keywords : Bohemian green earth * celadonite * smectite * microanalysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.183, year: 2011

  12. The Bazzanio-Piceetum in the Bohemian Forest (Šumava Mts.), Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Neuhäuslová, Zdenka; Eltsova, Viktoria

    2002-01-01

    Roč. 113, - (2002), s. 5-6, 367-379 ISSN 0014-8962 R&D Projects: GA AV ČR KSK6005114; GA ČR GA206/99/1416 Institutional research plan: CEZ:AV0Z6005908 Keywords : Bazzanio-Piceetum * Bohemian Forest Subject RIV: EF - Botanics

  13. Phytobenthos of streams in the Bohemian/Bavarian Forest, under diferent human impacts

    Czech Academy of Sciences Publication Activity Database

    Lukavský, Jaromír; Bauer, J.; Kaštovská, Klára; Lederer, F.; Šmilauer, P.

    2004-01-01

    Roč. 10, - (2004), s. 43-76 ISSN 1211-7420 R&D Projects: GA AV ČR KSK6005114; GA ČR GA203/00/D014 Institutional research plan: CEZ:AV0Z6005908 Keywords : phytobenthos * brooks * Bohemian/Bavarian Forest Subject RIV: DJ - Water Pollution ; Quality

  14. New data on Late Turonian crinoids from the Bohemian Cretaceous Basin, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Žítt, Jiří; Vodrážka, R.

    2008-01-01

    Roč. 83, č. 3 (2008), s. 311-326 ISSN 1214-1119 R&D Projects: GA ČR(CZ) GA205/06/0842 Institutional research plan: CEZ:AV0Z30130516 Keywords : Echinodermata * Crinoidea * taxonomy * taphonomy * Late Turonian * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy

  15. Ongoing passive seismic experiments unravel deep lithosphere structure of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Babuška, Vladislav; Plomerová, Jaroslava; Vecsey, Luděk; Jedlička, Petr; Růžek, Bohuslav

    2005-01-01

    Roč. 49, č. 3 (2005), s. 423-430 ISSN 0039-3169 R&D Projects: GA ČR GA205/04/0748 Institutional research plan: CEZ:AV0Z30120515 Keywords : deep lithosphere structure * Bohemian Massif * seismic experiments Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.656, year: 2005

  16. Re–Os geochemistry and geochronology of the Ransko gabbro–peridotite massif, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Pašava, J.; Erban, V.

    2013-01-01

    Roč. 48, č. 7 (2013), s. 799-804 ISSN 0026-4598 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : Re–Os * geochronology * gabbro * Bohemian Massif * Ni–Cu mineralization Subject RIV: DD - Geochemistry Impact factor: 2.667, year: 2013

  17. Testing floristic and environmental differentiation of rich fens on the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Peterka, T.; Plesková, Z.; Jiroušek, M.; Hájek, Michal

    2014-01-01

    Roč. 86, č. 4 (2014), s. 337-366 ISSN 0032-7786 R&D Projects: GA ČR GAP505/10/0638 Institutional support: RVO:67985939 Keywords : Bohemian-Moravian Highlands * mire * gradients Subject RIV: EF - Botanics Impact factor: 4.104, year: 2014

  18. Sandstone Districts of the Bohemian Paradise: Emergence of a Romantic Landscape

    Czech Academy of Sciences Publication Activity Database

    Adamovič, Jiří; Mikuláš, Radek; Cílek, Václav

    2006-01-01

    Roč. 21, - (2006), s. 6-99 ISSN 1210-9606 R&D Projects: GA AV ČR IAA3013302 Institutional research plan: CEZ:AV0Z30130516 Keywords : sandstone * rock city * Bohemian Paradise (Czech Republic) Subject RIV: DB - Geology ; Mineralogy http://geolines.gli.cas.cz/index.php?id=volume21

  19. Upper Cretaceous to Pleistocene melilitic volcanic rocks of the Bohemian Massif: Petrology and mineral chemistry

    Czech Academy of Sciences Publication Activity Database

    Skála, Roman; Ulrych, Jaromír; Krmíček, Lukáš; Fediuk, F.; Balogh, K.; Hegner, E.

    2015-01-01

    Roč. 66, č. 3 (2015), s. 197-216 ISSN 1335-0552 Institutional support: RVO:67985831 Keywords : Bohemian Massif * Cenozoic volcanism * isotope geochemistry * melilitic rock * mineralogy * petrology Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.523, year: 2015

  20. Late Paleozoic volcanic rocks of the Intra-Sudetic Basin, Bohemian Massif: Petrological and geochemical characteristics

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Fediuk, F.; Lang, Miloš; Martinec, Petr

    2004-01-01

    Roč. 64, č. 2 (2004), s. 127-153 ISSN 0009-2819 R&D Projects: GA AV ČR(CZ) IAA3013903 Keywords : Late Paleozoic * volcanic rocks * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.643, year: 2004

  1. Permian fauna of the Krkonoše Piedmont Basin (Bohemian Massif, Central Europe)

    Czech Academy of Sciences Publication Activity Database

    Zajíc, Jaroslav

    2014-01-01

    Roč. 70, 3/4 (2014), s. 131-142 ISSN 0036-5343 Institutional support: RVO:67985831 Keywords : faunal lists * palaeogeography * palaeoenvironment * stratigraphy * Early Permian * Krkonoše Piedmont Basin * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy

  2. Significance of geological units of the Bohemian Massif, Czech Republic, as seen by ambient noise interferometry

    Czech Academy of Sciences Publication Activity Database

    Růžek, Bohuslav; Valentová, L.; Gallovič, F.

    2016-01-01

    Roč. 173, č. 5 (2016), s. 1663-1682 ISSN 0033-4553 R&D Projects: GA ČR GAP210/12/2336; GA MŠk LM2010008 Institutional support: RVO:67985530 Keywords : ambient noise * geological units * Bohemian Massif * velocity model Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.591, year: 2016

  3. Recent geodynamic pattern of the eastern part of the Bohemian Massif

    Science.gov (United States)

    Schenk, V.; Schenková, Z.; Grácová, M.

    2009-04-01

    The Bohemian Massif, a Precambrian cratonic terrane, had been affected by several orogeneses forming its tectonic pattern. To detect the recent geodynamic motions going on fundamental geological structures of the Massif four regional geodynamic networks were established for epoch GPS measurements and one countrywide GEONAS network for permanent GPS satellite signals monitoring. In the east part of the Bohemian Massif sinistral movements on the Sudetic NW-SE faults and as well on the NNE-SSW faults of the Moravo-Silesian tectonic system have been detected. The sinistral trends dominate on many faults situated close to the contact of the Moldanuabian and Lugian parts and the Moravo-Silesian part of the Bohemian Massif. Because of tectonic systems intersections an existence of dextral movements cannot be excluded. Additional analyses displayed that eastern part of the Massif could be under extending trends. The preliminary site velocities assessed from GPS data for the eastern part of the Bohemian Massif are discussed from a viewpoint of regional geological structure motions. The work was supported by the Grant Agency of the Academy of Sciences of the Czech Republic (Project IAA300460507), the Targeted Research Programme of the Academy of Sciences of the CR (1QS300460551) and by the Ministry of Education, Youth and Sport of the Czech Republic (Projects LC506 and 1P05ME781).

  4. Glaciation in the surroundings of Prášilské Lake (Bohemian Forest, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Mentlík, P.; Minár, J.; Břízová, E.; Lisá, Lenka; Tábořík, P.; Stacke, V.

    2010-01-01

    Roč. 117, 1/2 (2010), s. 181-194 ISSN 0169-555X Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Forest * Pleistocene glaciations * Prášilské Lake * Šumava * sedimentology * chronology Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.352, year: 2010

  5. 5 years of measurement of electromagnetic emission in West Bohemian seismoactive region

    Czech Academy of Sciences Publication Activity Database

    Kolář, Petr

    2014-01-01

    Roč. 11, č. 2 (2014), s. 133-142 ISSN 1214-9705 R&D Projects: GA ČR GAP210/10/1728 Institutional support: RVO:67985530 Keywords : electromagnetic emission observation * West Bohemian earthquake swarm s Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.389, year: 2014

  6. Brunovistulian terrane (Bohemian Massif, Central Europe) from late Proterozoic to late Paleozoic: a review

    Czech Academy of Sciences Publication Activity Database

    Kalvoda, J.; Bábek, O.; Fatka, O.; Leichmann, J.; Melichar, R.; Nehyba, S.; Špaček, Petr

    2008-01-01

    Roč. 97, č. 3 (2008), s. 497-518 ISSN 1437-3254 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * Brunovistulian terrane * Variscan orogeny Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.970, year: 2008

  7. Late Turonian ophiuroids (Echinodermata) from the Bohemian Cretaceous Basin, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Štorc, R.; Žítt, Jiří

    2008-01-01

    Roč. 83, č. 2 (2008), s. 123-140 ISSN 1214-1119 R&D Projects: GA ČR GA205/06/0842 Institutional research plan: CEZ:AV0Z30130516 Keywords : Echinodermata * Ophiuroidea * Upper Cretaceous * taxonomy * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy

  8. Stars and Flowers: Handel, Haydn and Mendelssohn in the music history of the Bohemian Lands - a brief account

    Czech Academy of Sciences Publication Activity Database

    Freemanová, Michaela

    2009-01-01

    Roč. 46, č. 4 (2009), s. 375-392 ISSN 0018-7003 Institutional research plan: CEZ:AV0Z90580513 Keywords : Handel * Bohemian Lands * music history * Haydn * Mendelssohn Subject RIV: AL - Art, Architecture, Cultural Heritage

  9. Work zone intrusion alarm effectiveness.

    Science.gov (United States)

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  10. Environment-Sensitive Intrusion Detection

    National Research Council Canada - National Science Library

    Giffin, Jonathan T; Dagon, David; Jha, Somesh; Lee, Wenke; Miller, Barton P

    2006-01-01

    .... We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy...

  11. An immunological approach to intrusion detection

    OpenAIRE

    Watkins, A.

    2000-01-01

    This paper presents an examination of intrusion detection schemes. It discusses\\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\\ud effective, approach to intrusion detection as modeled on the human immune system. The\\ud discussion looks at some of the implications raised by intrusion detection research for\\ud information security in general.

  12. Physical activity and sport preferences of West Bohemian adolescents

    Directory of Open Access Journals (Sweden)

    Petr Valach

    2017-06-01

    Full Text Available Background: Regular physical activity is the crucial factor in treating lifestyle diseases. The age of adolescence is considered as the important period of person's life for creation and further maintaining healthy lifestyle habits. We assume that the level of physical activities of young people could be influenced by the possibilities to perform the preferred sporting activities. Objective: The aim of the presented study was to estimate the total amount of performed physical activity and the structure of sport preferences in West Bohemian adolescents. Further to find out the existence of relationships between preferred sport branches and composition of weekly physical activities of girls and boys. Methods: The research was conducted at five selected secondary schools of the Pilsen region, under the total participation of 382 boys and 529 girls. The level of physical activity (PA and sporting preferences was assessed by means of the IPAQ questionnaire and questionnaire of sports preferences, with the use of the internet system INDARES. For the statistical processing of the gained data, the Kruskal-Wallis ANOVA test, crosstabulation tables, and Spearman correlation analysis were used. Results: The results showed that the preference of fitness activities is associated with a higher level of PA in spare time of boys (p = .006, and with intensive PA of boys (p = .014 and girls (p = .044, compared to those, who do not prefer these activities. In addition, in case of boys, we have found statistically significant correlations (p = .022 between the preference of team sports and PA at school. 51.8% of boys and 37.7% of girls, who prefer fitness activities, comply with the recommendation of at least 3 × 20 minutes of intensive PA during one week (out of those, who do not prefer, only 30.5% of boys and 18.1% of girls. Individual sports (swimming, cycling, and downhill skiing are the main physical activities preferred by

  13. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  14. Photoionization of Ne8+

    Science.gov (United States)

    Pindzola, M. S.; Abdel-Naby, Sh. A.; Robicheaux, F.; Colgan, J.

    2014-05-01

    Single and double photoionization cross sections for Ne8+ are calculated using a non-perturbative fully relativistic time-dependent close-coupling method. A Bessel function expansion is used to include both dipole and quadrupole effects in the radiation field interaction and the repulsive interaction between electrons includes both the Coulomb and Gaunt interactions. The fully correlated ground state of Ne8+ is obtained by solving a time-independent inhomogeneous set of close-coupled equations. Propagation of the time-dependent close-coupled equations yields single and double photoionization cross sections for Ne8+ at energies easily accessible at advanced free electron laser facilities. This work was supported in part by grants from NSF and US DoE. Computational work was carried out at NERSC in Oakland, California, NICS in Knoxville, Tennessee, and OLCF in Oak Ridge, Tennessee.

  15. Clustering of 2008 West Bohemian seismic swarm mechanisms and its possible interpretation

    Czech Academy of Sciences Publication Activity Database

    Kolář, Petr; Boušková, Alena

    2018-01-01

    Roč. 15, č. 1 (2018), s. 27-40 ISSN 1214-9705 R&D Projects: GA ČR(CZ) GA16-03950S Institutional support: RVO:67985530 Keywords : West Bohemian earthquake swarm region * source mechanism * slip distribution * finite seismic source model Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: 1.5. Earth and related environmental sciences Impact factor: 0.699, year: 2016

  16. Pravcice Rock Arch (Bohemian Switzerland National Park, Czech Republic) deterioration due to natural and anthropogenic weathering

    Czech Academy of Sciences Publication Activity Database

    Vařilová, Z.; Přikryl, R.; Cílek, Václav

    2011-01-01

    Roč. 63, 7/8 (2011), s. 1861-1878 ISSN 1866-6280 R&D Projects: GA ČR GA205/08/0676 Institutional research plan: CEZ:AV0Z30130516 Keywords : Upper Cretaceous sandstone * rock arch * Bohemian Cretaceous basin * weathering processes * mineralogy of efflorescence * water soluble salts chemistry Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.059, year: 2011

  17. Bibliography of publications and manuscripts relating to the Bohemian/Bavarian Forest lakes

    Czech Academy of Sciences Publication Activity Database

    Vrba, Jaroslav (ed.)

    2000-01-01

    Roč. 4, č. 4 (2000), s. 259-278 ISSN 1211-7420. [Acidified Lakes in the Bohemian/Bavarian Forest - History, Present and Future. Č. Budějovice, 21.03.2000-23.03.2000] R&D Projects: GA ČR GA206/97/0072; GA ČR GA206/98/0727 Subject RIV: DA - Hydrology ; Limnology

  18. Evaluation of Development of Cooperation in South Bohemian Municipalities in the Years 2007–2014

    Directory of Open Access Journals (Sweden)

    Dušek Jiří

    2017-06-01

    Full Text Available The article presents results of the research of cooperation of municipalities in the South Bohemian Region, focused on the analysis of forms and means of cooperation between 2007 and 2014. The published results are part of an internal research that lasted for many years, the goal of which was both to analyse the development of cooperation of municipalities in the studied region and to identify the prerequisites and barriers of all cooperative relations. The research was done on a sample of 623 South Bohemian municipalities in the period of 2007-2010 and 2013- 2016, the obtained data was processed using descriptive statistics and multidimensional statistical methods, and the results show an almost 20% increase in the means of municipal cooperation across the entire South Bohemian Region. Based on the respective means of cooperation, National Healthy Cities Network of the Czech Republic saw the biggest growth, amounting to +3.275% between 2007 and 2014. Participation in local action groups, where the total of 580 municipalities are already engaged, increased by 32.12%. Although less dynamic, this growth is much more important, as it significantly contributes to the development of rural areas and their absorption abilities, mainly as regards financial resources from the national and European sources. However, fragmented means of municipal cooperation is a current problem of cooperation of municipalities, leading to the disintegrated power of the respective municipalities.

  19. How are the emplacement of rare-element pegmatites, regional metamorphism and magmatism interrelated in the Moldanubian domain of the Variscan Bohemian Massif, Czech Republic?

    Czech Academy of Sciences Publication Activity Database

    Melleton, J.; Gloaguen, E.; Frei, D.; Novák, M.; Breiter, Karel

    2012-01-01

    Roč. 50, č. 6 (2012), s. 1751-1773 ISSN 0008-4476 Institutional support: RVO:67985831 Keywords : LCT pegmatite * rare-element-enriched magma * columbite-tantalite * LA-SF-ICP-MS dating * Variscan orogeny * Bohemian Massif * Moldanubian domain * Bohemian Massif (Czech Republic) Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.180, year: 2012

  20. ``Granite tectonics'' revisited: insights from comparison of K-feldspar shape-fabric, anisotropy of magnetic susceptibility (AMS), and brittle fractures in the Jizera granite, Bohemian Massif

    Science.gov (United States)

    Žák, Jiří; Verner, Kryštof; Klomínský, Josef; Chlupáčová, Marta

    2009-07-01

    In the Jizera granite of the Krkonoše-Jizera Plutonic Complex, northern Bohemian Massif, contrasting patterns of magmatic K-feldspar fabrics and brittle fractures characterize different structural levels of the pluton. The uppermost exposed level at ˜800-1,100 m above sea level is dominated by flat foliation that overprints two steep foliations. In contrast, K-feldspar shape-fabric in an underground tunnel (˜660 m above sea level) shows complex variations in orientation and intensity. Magnetic fabric carried by coaxial contributions of biotite, magnetite, and maghemite is homogeneous along the examined section of the tunnel, and is decoupled from the K-feldspar fabric. The Jizera granite is crosscut by two regional sets of subvertical fractures (˜NE-SW and ˜NW-SE) and by near-surface exfoliation joints. The multiple fabrics are inferred to reflect a complex magmatic strain history at different structural levels of the pluton, bearing little or no relationship to the fracture network. In contrast to the original concept of Hans Cloos (“granite tectonics”), we conclude that no simple genetic relationship exists between fabrics and fractures in plutons. An alternative classification of fractures in plutons thus should avoid relationships to magmatic fabrics and should instead consist of cooling, syntectonic, uplift, and post-uplift fractures.

  1. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    present technique. The present technique may be useful for monitoring refractive indices of active chemical solutions which was not possible with intrusive-type FO sensors. 2. Sensor principle. For a circular beam of light with cross-sectional area A, incident at an angle θi on the surface of a second medium, the power ...

  2. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system.

  3. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position.

  4. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index ...

  5. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  6. Computer Network Equipment for Intrusion Detection Research

    National Research Council Canada - National Science Library

    Ye, Nong

    2000-01-01

    .... To test the process model, the system-level intrusion detection techniques and the working prototype of the intrusion detection system, a set of computer and network equipment has been purchased...

  7. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  8. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-12-15

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  9. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  10. Orthogneisses and orbicular granites from the Český Krumlov Varied Group of the South Bohemian Moldanubicum: the oldest known magmatic rocks of the Bohemian Massif?

    Czech Academy of Sciences Publication Activity Database

    Patočka, František; Kachlík, V.; Dostal, J.; Maluski, H.

    č. 4 (2002), s. 4-5 /v příloze/ ISSN 1210-4612. [INNOVATION 2002, The Week of Research, Development an Innovation in the CR. 03.12.2002-06.12.2002, Prague] Grant - others:FR-CZ GA MŠk(XC) Project of the joint program of Ministeries of education of the French and Czech Republics BARRANDE 2001-002-1(-2) "From crystalline massif to a pebble in (meta)conglomerate dating by Ar-Ar method in low-strain domains (Datations Ar-Ar de zones protégées diverses l'echelles: du massif au galet" Keywords : granitoid gneisses * Palaeoproterozoic * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy

  11. Reactivity of North Bohemian coals in coprocessing of coal/oil mixtures

    Energy Technology Data Exchange (ETDEWEB)

    Sebor, G.; Cerny, J.; Maxa, D.; Blazek, J. [Inst. of Chemical Technology, Prague (Czechoslovakia); Sykorova, I. [Inst. of Rock Structure and Mechanics, Prague (Czechoslovakia)

    1995-12-01

    Autoclave experiments with North Bohemian coal were done in order to evaluate their reactivity in coprocessing with petroleum vacuum residue, Selected coals were comprehensively characterized by using a number of analytical methods. While the coals were of similar geological origin, some of their characteristics differed largely from one coal to another. Despite the differences in physical and chemical structure, the coals provided very similar yields of desired reaction products. The yields of a heavy non- distillable fraction and/or an insoluble solid residue were, under experimental conditions, largely affected by retrogressive reactions (coking). The insoluble solid fractions were examined microscopically under polarized light.

  12. Cell specific primary production and phagotrophy of phytoplankton in acidified lakes of Bohemian Forest

    Czech Academy of Sciences Publication Activity Database

    Znachor, Petr; Hrubý, P.

    2000-01-01

    Roč. 4, č. 4 (2000), s. 223-232 ISSN 1211-7420. [Acidified Lakes in the Bohemian/Bavarian Forest - History, Present and Future. České Budějovice, 21.03.2000-23.03.2000] R&D Projects: GA ČR GA206/97/0072; GA ČR GA206/98/0727; GA MŠk FRV:140/1999; GA AV ČR KSK2005601 Subject RIV: DA - Hydrology ; Limnology

  13. Anthropogenic soils on spoil rock banks in North Bohemian Coal Basin, Czech Republic

    International Nuclear Information System (INIS)

    Raclavska, H.; Raclavsky, K.; Matysek, D.; Stalmachova, B.

    1997-01-01

    The area of the North Bohemian Coal Basin is devastated by the extensive exploitation of brown coal by open pit mining. Knowledge of newly formed soils, their properties, development and contamination is important from the point of view of biological regeneration of the landscape. The mineralogy of anthropogenic soils from the mining area is presented together with the geochemistry of nutrients and trace elements. Attention is paid to the soil-forming processes in the non-reclaimed spoil rock banks with the development of spontaneous vegetation. 3 refs., 1 fig., 4 tabs

  14. Evidence for partial melting of eclogite from the Moldanubian Zone of the Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Miyazaki, T.; Nakamura, D.; Tamura, A.; Svojtka, Martin; Arai, S.; Hirajima, T.

    2016-01-01

    Roč. 111, č. 6 (2016), s. 405-419 ISSN 1345-6296 Grant - others:Rada Programu interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : partial melting * eclogite * leucocratic pockets * Bohemian Massif * Moldanubian Zone Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.409, year: 2016

  15. Lateral displacement of crustal units relative to underlying mantle lithosphere: Example from the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Babuška, Vladislav; Plomerová, Jaroslava

    2017-01-01

    Roč. 48, December (2017), s. 125-138 ISSN 1342-937X R&D Projects: GA ČR GAP210/12/2381; GA MŠk(CZ) LD15029; GA MŠk LM2010008; GA MŠk(CZ) LM2015079 Institutional support: RVO:67985530 Keywords : Bohemian Massif * Teplá-Barrandian mantle lithosphere * Zone Erbendorf-Vohenstrauss * Jáchymov Fault Zone Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: Volcanology Impact factor: 6.959, year: 2016

  16. Bohemian Book Painting in the Early Modern Period in a New Context. An Illuminated Printed Book from the Property of the Bohemian Brethren Priest Vavřinec Orlík

    Czech Academy of Sciences Publication Activity Database

    Just, Jiří; Šárovcová, M.

    2016-01-01

    Roč. 64, č. 6 (2016), s. 462-479 ISSN 0049-5123 Institutional support: RVO:67985963 Keywords : The Bohemian Brethren * Vavřinec Orlík * Book Painting * Old Prints Subject RIV: AB - History OBOR OECD: History (history of science and technology to be 6.3, history of specific sciences to be under the respective headings)

  17. Post late Paleozoic tectonism in the Southern Catalan Coastal Ranges (NE Spain), assessed by apatite fission tracks analysis

    NARCIS (Netherlands)

    Juez-Larré, J.; Andriessen, P.A.M.

    2002-01-01

    We report the first apatite fission-track thermochronologic data for 17 samples from the southern Catalan Coastal Ranges of NE Spain. Thermal histories of Carboniferous metasediments, Late Hercynian intrusions and Lower-Triassic Buntsandstein sediments from three tectonics blocks, Miramar, Prades

  18. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  19. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  20. Depth-recursive tomography of the Bohemian Massif at the CEL09 transect—Part B: Interpretation

    Czech Academy of Sciences Publication Activity Database

    Novotný, Miroslav

    2012-01-01

    Roč. 33, č. 2 (2012), s. 243-273 ISSN 0169-3298 R&D Projects: GA MŠk LA08036 Institutional research plan: CEZ:AV0Z30120515 Keywords : depth-recursive refraction tomography * Bohemian Massif * CEL09 profile Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 4.125, year: 2012

  1. Soil Collembola communities within Plešné Lake and Čertovo Lake catchments, the Bohemian Forest

    Czech Academy of Sciences Publication Activity Database

    Čuchta, Peter

    2016-01-01

    Roč. 18, April (2016), EGU2016-2971 ISSN 1607-7962. [European Geosciences Union General Assembly 2016. 17.04.2016-22.04.2016, Vienna] Institutional support: RVO:60077344 Keywords : soil Collembola communities * Plešné and Čertovo Lakes * Bohemian Forest Subject RIV: EH - Ecology, Behaviour

  2. Monazite and zircon as major carriers of Th, U, and Y in peraluminous granites: examples from the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Breiter, Karel

    2016-01-01

    Roč. 110, č. 6 (2016), s. 767-785 ISSN 0930-0708 R&D Projects: GA ČR GA14-13600S Institutional support: RVO:67985831 Keywords : zircon * monazite * granites * trace elements * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.236, year: 2016

  3. Uraninite, coffinite and brannerite from shear-zone hosted uranium deposits of the Bohemian Massif (Central European Variscan belt)

    Czech Academy of Sciences Publication Activity Database

    René, Miloš; Dolníček, Z.

    2017-01-01

    Roč. 7, č. 4 (2017), č. článku 50. ISSN 2075-163X Institutional support: RVO:67985891 Keywords : uranium deposits * mineralogy * uraninite * coffinite * brannerite * Moldanubian Zone * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 2.088, year: 2016 http://www.mdpi.com/2075-163X/7/4/50

  4. Allanite-monazite-xenotime-zircon-apatite assemblage in two-mica granites of the Moldanubian (South Bohemian) batholith

    Czech Academy of Sciences Publication Activity Database

    René, Miloš

    -, - (2010), s. 460 ISSN 0365-8066. [IMA. 21.08.2010-27.08.2010, Budapest] R&D Projects: GA MŠk ME10083 Institutional research plan: CEZ:AV0Z30460519 Keywords : granite * accessory minerals * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy

  5. Zircon (re)crystallization during short-lived, high-P granulite facies metamorphism (Eger Complex, NW Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Konopásek, J.; Pilátová, E.; Košler, J.; Sláma, Jiří

    2014-01-01

    Roč. 32, č. 8 (2014), s. 885-902 ISSN 0263-4929 Institutional support: RVO:67985831 Keywords : Bohemian Massif * geochronology * granulite * zircon recrystallization * zirconium saturation modelling Subject RIV: DB - Geology ; Mineralogy Impact factor: 4.147, year: 2014

  6. Palaeoenvironments and facies on a progressively flooded rocky island (Upper Cenomanian – Lower Turonian, Bohemian Cretaceous Basin)

    Czech Academy of Sciences Publication Activity Database

    Žítt, Jiří; Vodrážka, R.; Hradecká, L.; Svobodová, Marcela

    2010-01-01

    Roč. 179, - (2010), s. 223-234 ISSN 1802-6842 Institutional research plan: CEZ:AV0Z30130516 Keywords : Cretaceous island * weathering * geomorphology * sedimentary environments * biostratigraphy * Upper Cenomanian-Lower Turonian * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy http://www.nm.cz/publikace/archiv-en.php?id=1&rok=179&f_=Show

  7. Granitic magma emplacement and deformation during early-orogenic syn-convergent transtension: The Stare Sedlo complex, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Tomek, Filip; Žák, J.; Chadima, Martin

    2015-01-01

    Roč. 87, JUL (2015), s. 50-66 ISSN 0264-3707 Institutional support: RVO:67985831 Keywords : anisotropy of magnetic susceptibility (AMS) * Bohemian Massif * pluton emplacement * granite * transtension * Variscan orogeny Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.926, year: 2015

  8. Temporal evolution of mineralization events in the Bohemian Massif inferred from the Re-Os geochronology of molybdenite

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Haluzová, Eva; Creaser, R. A.; Pašava, J.; Veselovský, F.; Breiter, Karel; Erban, V.; Drábek, M.

    2017-01-01

    Roč. 52, č. 5 (2017), s. 651-662 ISSN 0026-4598 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : Re-Os * geochronology * molybdenite * Bohemian Massif * granite Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 3.396, year: 2016

  9. Modelling tidal current-induced bed shear stress and palaeocirculation in an epicontinental seaway: the Bohemian Cretaceous Basin, Central Europe

    Czech Academy of Sciences Publication Activity Database

    Mitchell, A. J.; Uličný, David; Hampson, G. J.; Allison, P. A.; Gorman, G. J.; Piggott, M. D.; Wells, M. R.; Pain, C. C.

    2010-01-01

    Roč. 57, č. 2 (2010), s. 359-388 ISSN 0037-0746 R&D Projects: GA AV ČR(CZ) IAA300120609 Institutional research plan: CEZ:AV0Z30120515 Keywords : bed shear stress * Bohemian Cretaceous Basin * epicontinental sea * tidal circulation * Turonian Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.229, year: 2010

  10. 'The tempting girl, I know so well': Representations of Gout and the Self-Fashioning of Bohemian Humanist Scholars

    Czech Academy of Sciences Publication Activity Database

    Storchová, Lucie

    2016-01-01

    Roč. 21, č. 6 (2016), s. 511-530 ISSN 1383-7427 R&D Projects: GA ČR GB14-37038G Institutional support: RVO:67985955 Keywords : Bohemian Lands * humanism * Neo-latin poetry * gout * representation Subject RIV: AB - History Impact factor: 0.317, year: 2016

  11. Terebella phosphatica Leriche (Polychaeta) associated with phosphatic crusts and particles (Lower Turonian, Bohemian Cretaceous Basin, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Žítt, Jiří; Vodrážka, R.

    2013-01-01

    Roč. 41, April (2013), s. 111-126 ISSN 0195-6671 Institutional support: RVO:67985831 Keywords : Terebella phosphatica tubes * Atreta-Bdelloidina encrusting community * Faecal pellet accumulations * phosphogenesis * Lower Turonian * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.390, year: 2013

  12. Late Cretaceous environments and communities as recorded at Chrtníky (Bohemian Cretaceous Basin, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Žítt, Jiří; Vodrážka, R.; Hradecká, L.; Svobodová, Marcela; Zágoršek, K.

    2006-01-01

    Roč. 81, č. 1 (2006), s. 43-79 ISSN 1214-1119 R&D Projects: GA ČR(CZ) GA205/06/0842 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Cretaceous Basin * Upper Cenomanian-Lower Turonian * paleoecology * taphonomy * sedimentary environment Subject RIV: DB - Geology ; Mineralogy

  13. Late Cretaceous and Cenozoic dynamics of the Bohemian Massif inferred from the paleostress history of the Lusatian Fault Belt

    Czech Academy of Sciences Publication Activity Database

    Coubal, Miroslav; Málek, Jiří; Adamovič, Jiří; Štěpančíková, Petra

    2015-01-01

    Roč. 87, July 1 (2015), s. 26-49 ISSN 0264-3707 R&D Projects: GA ČR GAP210/12/0573 Institutional support: RVO:67985831 ; RVO:67985891 Keywords : paleostress * fault kinematics * Lusatian Fault Belt * Elbe fault system * Bohemian Massif * Alpine foreland Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.926, year: 2015

  14. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    Sulfide intrusion in seagrasses represents a global threat to seagrasses. In contrast seegrasses grow in hostile sediments, where they are constantly exposed to sulfide intrusion. Little is known about the strategies to survive sulfide intrusion, if there are detoxification mechanisms and sulfur...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  15. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  16. Geodynamic movements and deformations of the Sudetic structural unit of the Bohemian Massif

    Science.gov (United States)

    Schenk, V.; Jechumtálová, Z.; Schenková, Z.; Kottnauer, P.

    2003-04-01

    The African plate pushes to European orogenic Alpine structures that transfer the compression further to Variscan structural units, including the Bohemian Massif. Central parts of the Bohemian Massif are relatively deep-seated and, therefore, some of marginal parts of the Massif and its border geological structures should be affected intensively and moved distinctly with respect to the central parts. The geodynamical GPS network EAST SUDETEN is located just over the area mentioned above, i.e. it covers both kinetically quasi-effected and quasi-non-effected structural blocks. GPS data observed already for six annual campaigns (1997-2002) were processed and movement vectors of individual network sites were assessed. Applied data processing did not allow errors in the horizontal direction 2 mm and in the vertical direction 5-6 mm to be exceeded. Since time series of coordinate changes for several network sites gave rather pronounce movement trends, preliminary deformations among individual structural blocks were evaluated and compared to other geological, geophysical and geodetic materials. The investigation has been supported by the Grant Agency of the Czech Republic, projects 205/97/0679 and 205/01/0480, and by the research programme of the Ministry of Education, Youth and Sport of the Czech Republic, project LN00A005 "Dynamics of the Earth".

  17. Results of application of some non-traditional al restoration methods on north bohemian mines locations

    International Nuclear Information System (INIS)

    Cablik Vladimir; Rehor Michal; Lang Tomas; Fecko Peter

    2008-01-01

    The importance of brown coal implies from the growing need of energy in the Czech Republic. It is nowadays a single significant fossil raw material, without which our state would become fully dependent on the import of energetic sources. More than 70 % of mined brown coal comes from the North Bohemian Basin these days. Open cast brown coal mining has led to large damage on the landscape. That is why the reclamation work has become important on principle recently. The difficulty of reclamation of North Bohemian localities consists in extremely unfavorable properties of rock strewn to the most of dump bodies. These rocks are mechanically unstable in the wind and water erosion and it gets undesirable, acidic characteristics as SO 3 and Al ions influence by weathering. Limitation of the influence of weathering, amendment of chemistry and physical composition of top rocks strata, and definition of the required amount of fertilizable rock have been successful in recent years as suitable methods have been used. The presented article includes the characteristics of the important phytotoxic areas and the methodology of their reclamation mainly based on the application of suitable fertilizable rocks. Some tentatively used non-traditional methods were evaluated e. g. the application power plant stabilizer and ash. The paper assesses the success rate of the reclamation methods. The results are documented with the long term monitoring of physical, mineralogical, chemical and pedological parameters of rocks in the testing areas.

  18. Planning environmental restoration in the North Bohemian uranium district, Czech Republic: Progress report 1996

    International Nuclear Information System (INIS)

    Tomas, J.

    1997-01-01

    Uranium ores have been mined in Bohemian Massif in different mining districts i.e. in West Bohemia, Pribram region and Middle Bohemia, Rozna district and in Straz pod Ralskem district. The latter is represented by stratiform sandstone type of deposit where acid in-situ leaching has been applied as mining method since 1968. More than 4 million tons of leaching acids have been injected into the ore bearing sandstones. The district falls in an area of natural water protection in North Bohemian Cretaceous platform. A complex evaluation of negative impact of uranium mining and milling in this area has been clearly articulated in Government Decrees Nos.:366/92, 429/93, 244/95 and 170/96. A special declining regime of mining has been ordered for the implementation of which together with the Government Commission of Experts a remediation programme has been designed and put into operation in 1996. The uranium producer DIAMO a.s. prepared a Concept of Restoration of the area affected by in-situ leaching and MEGA a.s. has prepared the Environmental Impact Assessment (E.I.A.) according to the law No.244/1992. The Ministry of the Environment issued an Environmental Impact Statement which included evaluation of the condition of mining and restoration programme because both activities will influence the environment of the district. (author)

  19. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  20. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...

  1. Traumatic intrusions as 'worse case scenario's'.

    Science.gov (United States)

    Merckelbach, H; Muris, P; Horselenberg, R; Rassin, E

    1998-11-01

    While some clinicians assume that traumatic intrusions are historically accurate revisualizations of traumatic incidents, others have suggested that these types of intrusions may represent a worse case scenario (i.e. exaggerated) version of the trauma. To explore this issue, a survey was conducted among undergraduate students (N = 189). Of the 69 respondents who had been the victim of or witness to a relatively recent trauma, 15 (22%) reported an exaggerated perception of the traumatic incident. Exaggerated intrusions were found to have more flashback qualities and tended to have a higher frequency than 'realistic' intrusions. These findings are well in line with the idea that intrusions are not necessarily veridical copies of traumatic events.

  2. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  3. A New Method for Intrusion Detection using Manifold Learning Algorithm

    OpenAIRE

    Guoping Hou; Xuan Ma; Yuelei Zhang

    2013-01-01

    Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion fea...

  4. KM3NeT

    CERN Multimedia

    KM3NeT is a large scale next-generation neutrino telescope located in the deep waters of the Mediterranean Sea, optimized for the discovery of galactic neutrino sources emitting in the TeV energy region.

  5. Impact of Different Milk Yields on Milk Quality in Bohemian Spotted Cattle

    Directory of Open Access Journals (Sweden)

    O. Hanuš

    2007-01-01

    Full Text Available The milk yield (MY is a significant economic and health factor. MY influences the health state of dairy cows, their reproduction performance, longevity and milk indicators (MIs. Differences within MIs between 2 higher (1; 8 348 kg per lactation; 240 individual milk samples and 2 lower yielding herds (2; 7 344; 239 of Bohemian Spotted dairy cows (B were tested. Sampling was carried out during summer and winter feeding seasons. Lactation factors were well balanced. Group 1 was on a higher genetical level, had better nutrition and higher MY by 13.7% (P P P > 0.05. The U was higher (5.707 > 4.365 mmol l-1 in group 1, AC and URN as well (0.0362 > 0.0238 mmol l-1 and 51.94 > 41.97%. It corresponds with nitrogen and energy metabolism.

  6. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  7. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    is known about the strategies of seagrasses to survive sulfide intrusion, their potential detoxification mechanisms and sulfur nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  8. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  9. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  10. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  11. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  12. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  13. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  14. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  15. Structure, emplacement, and tectonic setting of Late Devonian granitoid plutons in the Teplá–Barrandian unit, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Žák, J.; Kratinová, Zuzana; Trubač, J.; Janoušek, V.; Sláma, Jiří; Mrlina, Jan

    2011-01-01

    Roč. 100, č. 7 (2011), s. 1477-1495 ISSN 1437-3254 R&D Projects: GA AV ČR KJB300120702 Institutional research plan: CEZ:AV0Z30120515; CEZ:AV0Z30130516 Keywords : Bohemian Massif * Teplá-Barrandian unit * Variscan orogeny * granite * pluton * subduction Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.342, year: 2011

  16. Impacts of hydrometeorological extremes in the Bohemian-Moravian Highlands in 1706–1889 as derived from taxation records

    Czech Academy of Sciences Publication Activity Database

    Dolák, Lukáš; Brázdil, Rudolf; Valášek, H.

    2015-01-01

    Roč. 120, č. 4 (2015), s. 465-488 ISSN 1212-0014 R&D Projects: GA ČR(CZ) GA13-19831S Institutional support: RVO:67179843 Keywords : historical climatology * ice-age * documentary * vulnerability * temperatures * europe * winter * hydrometeorological extremes * tax ation records * damage * impacts * Bohemian-Moravian Highlands Subject RIV: EH - Ecology, Behaviour Impact factor: 0.415, year: 2015

  17. Silvibacterium bohemicum gen. nov sp nov., an acidobacterium isolated from coniferous soil in the Bohemian Forest National Park

    Czech Academy of Sciences Publication Activity Database

    Lladó, Salvador; Benada, Oldřich; Cajthaml, Tomáš; Baldrian, Petr; García-Fraile, Paula

    2016-01-01

    Roč. 39, FEB (2016), s. 14-19 ISSN 0723-2020 R&D Projects: GA ČR(CZ) GP14-09040P; GA MŠk(CZ) EE2.3.30.0003; GA MŠk(CZ) LO1509 Institutional support: RVO:61388971 Keywords : Acidobacteria * Taxonomy * Bohemian Forest National Park Subject RIV: EE - Microbiology, Virology Impact factor: 3.931, year: 2016

  18. Strain coupling between upper mantle and lower crust: natural example from the Běstvina granulite body, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Machek, Matěj; Ulrich, Stanislav; Janoušek, V.

    2009-01-01

    Roč. 27, č. 9 (2009), s. 721-737 ISSN 0263-4929 R&D Projects: GA ČR GA205/09/0539 Grant - others:GA ČR(CZ) GA205/06/0688 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * eclogite * granulite * peridotite * strain coupling * Variscan orogeny * LPO Subject RIV: DB - Geology ; Mineralogy Impact factor: 4.157, year: 2009

  19. Apatite fission track implications for timing of hydrothermal fluid flow in Tertiary volcanics of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Filip, Jiří; Ulrych, Jaromír; Adamovič, Jiří; Balogh, K.

    2007-01-01

    Roč. 52, 3-4 (2007), s. 211-220 ISSN 0449-2560 R&D Projects: GA AV ČR IAA3013403 Grant - others:OTKA(HU) T060965; OTKA(HU) M41434 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Massif * fission track s * apatite * K-Ar dating * volcanic rocks * thermal events * stress field Subject RIV: DB - Geology ; Mineralogy

  20. Boundaries of mantle–lithosphere domains in the Bohemian Massif as extinct exhumation channels for high-pressure rocks

    Czech Academy of Sciences Publication Activity Database

    Babuška, Vladislav; Plomerová, Jaroslava

    2013-01-01

    Roč. 23, č. 3 (2013), s. 973-987 ISSN 1342-937X R&D Projects: GA ČR GA205/07/1088; GA ČR GAP210/12/2381; GA AV ČR IAA300120709 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * mantle lithosphere domains * fossil olivine fabric * high pressure Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 8.122, year: 2013

  1. Constraints on the origin of gabbroic rocks from the Moldanubian-Moravian units boundary (Bohemian Massif, Czech Republic and Austria)

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Ackerman, Lukáš; Kachlík, V.; Hegner, E.; Balogh, K.; Langrová, Anna; Luna, J.; Fediuk, F.; Lang, M.; Filip, Jiří

    2010-01-01

    Roč. 61, č. 3 (2010), s. 175-191 ISSN 1335-0552 R&D Projects: GA AV ČR IAA3013403; GA AV ČR IAA300130902 Institutional research plan: CEZ:AV0Z30130516 Keywords : gabbroic rocks * geochemistry * Sr-Nd isotopes * K-Ar ages * Moravian Unit * Moldanubian Unit * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 0.909, year: 2010

  2. Cenomanian and Cenomanian-Turonian boundary deposits in the southern part of the Bohemian Cretaceous Basin, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Čech, S.; Hradecká, L.; Svobodová, Marcela; Švábenická, L.

    2005-01-01

    Roč. 80, č. 4 (2005), s. 321-354 ISSN 1210-3527 Grant - others:GA MŽP1(CZ) 1975/630/02 Institutional research plan: CEZ:AV0Z3013912 Keywords : Cenomanian * biostratigraphy * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy http://www.geology.cz/bulletin/contents/2005/vol80no4/321_cech.pdf

  3. Tectonic strain changes affecting the development of deep seated gravitational slope deformations in the Bohemian Massif and Outer Western Carpathians

    Czech Academy of Sciences Publication Activity Database

    Stemberk, Josef; Hartvich, Filip; Blahůt, Jan; Rybář, Jan; Krejčí, O.

    2017-01-01

    Roč. 289, SI (2017), s. 3-17 ISSN 0169-555X R&D Projects: GA MŠk(CZ) LG15007; GA MŠk(CZ) LM2015079 Institutional support: RVO:67985891 Keywords : Deep seated gravitational slope deformations * Displacement monitoring * Tectonic strain changes * Bohemian Massif * Outer Western Carpathians Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 2.958, year: 2016

  4. Joint inversion of teleseismic P waveforms and surface-wave group velocities from ambient seismic noise in the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Růžek, Bohuslav; Plomerová, Jaroslava; Babuška, Vladislav

    2012-01-01

    Roč. 56, č. 1 (2012), s. 107-140 ISSN 0039-3169 R&D Projects: GA ČR GA205/07/1088; GA AV ČR IAA300120709; GA MŠk LM2010008 Institutional research plan: CEZ:AV0Z30120515 Keywords : receiver function * seismic noise * joint inversion * Bohemian Massif * velocity structure Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.975, year: 2012

  5. Crustal anisotropy in the Bohemian Massif, Czech Republic: observations based on Central European Lithospheric Experiment Based on Refraction (CELEBRATION) 2000

    Czech Academy of Sciences Publication Activity Database

    Růžek, Bohuslav; Vavryčuk, Václav; Hrubcová, Pavla; Zedník, Jan; Guterch, A.; Grad, M.; Keller, G. R.; Posgay, K.; Vozár, J.; Špičák, Aleš; Brückl, E.; Hajnal, Z.; Thybo, H.; Selvi, O.

    2003-01-01

    Roč. 108, B8 (2003), s. 2392, ESE 9-1-9-15, doi:10.1029/2002JB002242 ISSN 0148-0227 R&D Projects: GA ČR GA205/00/1350 Institutional research plan: CEZ:AV0Z3012916 Keywords : anisotropy * Bohemian Massif * Earth's crust * seismic waves Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 2.992, year: 2003

  6. Three-dimensional S-wave velocity model of the Bohemian Massif from Bayesian ambient noise tomography

    Science.gov (United States)

    Valentová, Lubica; Gallovič, František; Maierová, Petra

    2017-10-01

    We perform two-step surface wave tomography of phase-velocity dispersion curves obtained by ambient noise cross-correlations in the Bohemian Massif. In the first step, the inter-station dispersion curves were inverted for each period (ranging between 4 and 20 s) separately into phase-velocity maps using 2D adjoint method. In the second step, we perform Bayesian inversion of the set of the phase-velocity maps into an S-wave velocity model. To sample the posterior probability density function, the parallel tempering algorithm is employed providing over 1 million models. From the model samples, not only mean model but also its uncertainty is determined to appraise the reliable features. The model is correlated with known main geologic structures of the Bohemian Massif. The uppermost low-velocity anomalies are in agreement with thick sedimentary basins. In deeper parts (4-20 km), the S-wave velocity anomalies correspond, in general, to main tectonic domains of the Bohemian Massif. The exception is a stable low-velocity body in the middle of the high-velocity Moldanubian domain and high-velocity body resembling a promontory of the Moldanubian into the Teplá-Barrandian domain. The most pronounced (high-velocity) anomaly is located beneath the Eger Rift that is a part of a Tertiary rift system across Europe.

  7. The neural representation of intrusive thoughts

    Science.gov (United States)

    Schmiedek, Florian; Brose, Annette; Schott, Björn H.; Lindenberger, Ulman; Lövden, Martin

    2013-01-01

    Based on the philosophical notion that language embodies thought we investigated whether a habitual tendency for intrusive thought that younger and older participants report over a period of 100 sessions, spread out over about 6 months, is associated with brain regions related to language production. In favour of this hypothesis, we found that individual differences in habitual intrusive thoughts are correlated with activity in the left inferior frontal gyrus (IFG, Broca’s area) as well as the cingulate cortex (CC) during a two-choice reaction-time task in fMRI. Participants who habitually tended to experience intrusive thoughts showed greater activity during task-free (baseline) compared to task periods in brain regions involved in language production. Task performance was unrelated to individual differences in intrusive thoughts. We conclude that intrusive thoughts may be represented in a language-like format and that individuals reporting a habitually higher tendency for intrusive thoughts may have stronger and more habitual inner speech processes. PMID:22563007

  8. NE2561 and NE2611A - are they different?

    International Nuclear Information System (INIS)

    Huntley, R.; Boas, J.; Kotler, L.; Webb, D.; Stucki, G.

    2000-01-01

    Full text: Evidence is mounting that the nominally identical ionization chamber types NE2561 and NE2611A have significantly different energy dependences. This is revealed by comparing the radiation quality correction factors k q . The factor k q is the ratio of the absorbed dose to water calibration factors (for a particular type of ionization chamber) at radiation quality Q to that for 60 Co. k q values for NE2561 and NE2611A chambers have been compared for various kV and MV X-ray beams at several standards laboratories. Measurements at ARPANSA (Australia) on six NE2561 and five NE2611A show a consistent difference in k q of 1-2% for 16 and 19 MV X-rays. Work at OFMET (Switzerland) has shown similar differences at 6 and 18 MV. No such differences are seen at NPL (UK) - this inconsistency is currently ascribed to differences in the radiation beams. Consistent differences of up to 3% between these two chamber types have been observed at both ARPANSA and NRC (Canada) at the BIPM medium energy X-ray intercomparison qualities between 50 kV and 250 kV. We conclude that the two types of chamber should not be regarded as identical. ARPANSA and several other laboratories in Europe and North America will shortly participate in a Euromet project to be coordinated by OFMET, to investigate high energy X-ray beam quality specifiers. This project will provide additional data that may lead to a better understanding of this anomaly. Copyright (2000) Australasian College of Physical Scientists and Engineers in Medicine

  9. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  10. Quantitative Palynology Informing Conservation Ecology in the Bohemian/Bavarian Forests of Central Europe.

    Science.gov (United States)

    Carter, Vachel A; Chiverrell, Richard C; Clear, Jennifer L; Kuosmanen, Niina; Moravcová, Alice; Svoboda, Miroslav; Svobodová-Svitavská, Helena; van Leeuwen, Jacqueline F N; van der Knaap, Willem O; Kuneš, Petr

    2017-01-01

    In 1927, the first pollen diagram was published from the Bohemian/Bavarian Forest region of Central Europe, providing one of the first qualitative views of the long-term vegetation development in the region. Since then significant methodological advances in quantitative approaches such as pollen influx and pollen-based vegetation models (e.g., Landscape Reconstruction Algorithm, LRA) have contributed to enhance our understanding of temporal and spatial ecology. These types of quantitative reconstructions are fundamental for conservation and restoration ecology because they provide long-term perspectives on ecosystem functioning. In the Bohemian/Bavarian Forests, forest managers have a goal to restore the original forest composition at mid-elevation forests, yet they rely on natural potential vegetation maps that do not take into account long-term vegetation dynamics. Here we reconstruct the Holocene history of forest composition and discuss the implications the LRA has for regional forest management and conservation. Two newly analyzed pollen records from Prášilské jezero and Rachelsee were compared to 10 regional peat bogs/mires and two other regional lakes to reconstruct total land-cover abundance at both the regional- and local-scales. The results demonstrate that spruce has been the dominant canopy cover across the region for the past 9,000 years at both high- (>900 m) and mid-elevations (>700-900 m). At the regional-scale inferred from lake records, spruce has comprised an average of ~50% of the total forest canopy; whereas at the more local-scale at mid-elevations, spruce formed ~59%. Beech established ~6,000 cal. years BP while fir established later around 5,500 cal. years BP. Beech and fir growing at mid-elevations reached a maximum land-cover abundance of 24% and 13% roughly 1,000 years ago. Over the past 500 years spruce has comprised ~47% land-cover, while beech and fir comprised ~8% and <5% at mid-elevations. This approach argues for the "natural

  11. Quantitative Palynology Informing Conservation Ecology in the Bohemian/Bavarian Forests of Central Europe

    Directory of Open Access Journals (Sweden)

    Vachel A. Carter

    2018-01-01

    Full Text Available In 1927, the first pollen diagram was published from the Bohemian/Bavarian Forest region of Central Europe, providing one of the first qualitative views of the long-term vegetation development in the region. Since then significant methodological advances in quantitative approaches such as pollen influx and pollen-based vegetation models (e.g., Landscape Reconstruction Algorithm, LRA have contributed to enhance our understanding of temporal and spatial ecology. These types of quantitative reconstructions are fundamental for conservation and restoration ecology because they provide long-term perspectives on ecosystem functioning. In the Bohemian/Bavarian Forests, forest managers have a goal to restore the original forest composition at mid-elevation forests, yet they rely on natural potential vegetation maps that do not take into account long-term vegetation dynamics. Here we reconstruct the Holocene history of forest composition and discuss the implications the LRA has for regional forest management and conservation. Two newly analyzed pollen records from Prášilské jezero and Rachelsee were compared to 10 regional peat bogs/mires and two other regional lakes to reconstruct total land-cover abundance at both the regional- and local-scales. The results demonstrate that spruce has been the dominant canopy cover across the region for the past 9,000 years at both high- (>900 m and mid-elevations (>700–900 m. At the regional-scale inferred from lake records, spruce has comprised an average of ~50% of the total forest canopy; whereas at the more local-scale at mid-elevations, spruce formed ~59%. Beech established ~6,000 cal. years BP while fir established later around 5,500 cal. years BP. Beech and fir growing at mid-elevations reached a maximum land-cover abundance of 24% and 13% roughly 1,000 years ago. Over the past 500 years spruce has comprised ~47% land-cover, while beech and fir comprised ~8% and <5% at mid-elevations. This approach argues

  12. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  13. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  14. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  15. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  16. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  17. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  18. Clays of volcanic – detrititus strata of North the Bohemian coal basin as a raw material for the preparation of natural mineral pigments

    Directory of Open Access Journals (Sweden)

    Pavel Rucký

    2005-11-01

    Full Text Available Raw materials which are suitable for the preparation of mineral pigments are found in the area of the North Bohemian brown coal basin. Set Experiments on a hydrocyclone were realized as a part of the technological research of the suitability of “bolus” and ochres from the North Bohemian brown coal basin to be applicated as ecological pigments. It was found that this method of processing is suitable for the preparation of the product which can serve as a mineral pigment. Produced pigments were examined concerning their application in the area of paint pigments with a positive result.

  19. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2001-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  20. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2002-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  1. Radioactivity in mushrooms from selected locations in the Bohemian Forest, Czech Republic

    Energy Technology Data Exchange (ETDEWEB)

    Cadova, Michaela; Havrankova, Renata; Havranek, Jiri; Zoelzer, Friedo [University of South Bohemia in Ceske Budejovice, Institute of Radiology, Toxicology and Civil Protection, Faculty of Health and Social Sciences, Ceske Budejovice (Czech Republic)

    2017-05-15

    {sup 137}Cs is one of the most important radionuclides released in the course of atmospheric nuclear weapon tests and during accidents in nuclear power plants such as that in Chernobyl, Ukraine, or Fukushima, Japan. The aim of this study was to compare {sup 137}Cs and {sup 40}K concentrations in particular species of mushrooms from selected locations in the Bohemian Forest (Czech: Sumava), Czech Republic, where a considerable contamination from the Chernobyl accident had been measured in 1986. Samples were collected between June and October 2014. Activities of {sup 137}Cs and {sup 40}K per dry mass were measured by means of a semiconductor gamma spectrometer. The {sup 137}Cs values measured range from below detection limit to 4300 ± 20 Bq kg{sup -1}, in the case of {sup 40}K from 910 ± 80 to 4300 ± 230 Bq kg{sup -1}. Differences were found between individual locations, due to uneven precipitation in the course of the movement of the radioactive cloud after the Chernobyl accident. There are, however, also differences between individual species of mushrooms from identical locations, which inter alia result from different characteristics of the soil and depths of mycelia. The values measured are compared with established limits and exposures from other radiation sources present in the environment. In general, it can be stated that the values measured are relatively low and the effects on the health of the population are negligible compared to other sources of ionizing radiation. (orig.)

  2. Radioactivity in mushrooms from selected locations in the Bohemian Forest, Czech Republic.

    Science.gov (United States)

    Čadová, Michaela; Havránková, Renata; Havránek, Jiří; Zölzer, Friedo

    2017-05-01

    137 Cs is one of the most important radionuclides released in the course of atmospheric nuclear weapon tests and during accidents in nuclear power plants such as that in Chernobyl, Ukraine, or Fukushima, Japan. The aim of this study was to compare 137 Cs and 40 K concentrations in particular species of mushrooms from selected locations in the Bohemian Forest (Czech: Šumava), Czech Republic, where a considerable contamination from the Chernobyl accident had been measured in 1986. Samples were collected between June and October 2014. Activities of 137 Cs and 40 K per dry mass were measured by means of a semiconductor gamma spectrometer. The 137 Cs values measured range from below detection limit to 4300 ± 20 Bq kg -1 , in the case of 40 K from 910 ± 80 to 4300 ± 230 Bq kg -1 . Differences were found between individual locations, due to uneven precipitation in the course of the movement of the radioactive cloud after the Chernobyl accident. There are, however, also differences between individual species of mushrooms from identical locations, which inter alia result from different characteristics of the soil and depths of mycelia. The values measured are compared with established limits and exposures from other radiation sources present in the environment. In general, it can be stated that the values measured are relatively low and the effects on the health of the population are negligible compared to other sources of ionizing radiation.

  3. Thermal maturity of the Paleozoic units in the southeastern part of the Bohemian Massif

    Science.gov (United States)

    Kanalasova, Sona; Gerslova, Eva; Jirman, Petr

    2017-04-01

    The Palaeozoic in the eastern part of the Bohemian Massif is regarded as a part of the Rhenohercynian Zone of the Variscan orogenic belt. The Palaeozoic sequences in south-eastern Moravia are known from deep boreholes below the Carpathian Foredeep and the overthrust of the West Carpathian Flysch Belt (Dudek, 1980). The Aim of the study was to evaluate the amount of expected erosion and reconstruct subsidence history based on the set of calibrated 1D models. One-dimensional (1D) modelling was performed using PetroMod software 2014.2 (Schlumberger). The results are based on geological concept of the studied area, available well logs, and publically accessible data. Thermal maturity of the organic matter was evaluated in the Upper Carboniferous sediments of the Rhenohercynian zone within the Variscan orogen in Moravia (eastern Czech Republic). Based on the pyrolysis RockEval data, all Upper Carboniferous samples belong to type II-III kerogen. The elevated numbers of hydrogen index proved that the source potential of the studied Carboniferous sediments was not spent in full during the Variscan tectogen. The coalification trends expressed as RockEval pyrolysis peak temperature (Tmax) and vitrinite reflectance (Rr) were evaluated and geothermal gradient described. In the Variscan foreland in the SSE the Rr values are typical of diagenetic conditions ranging from 0.5 - 1.2 %Rr with maximum palaeo-temperature of 80-130 °C.

  4. Temporal evolution of mineralization events in the Bohemian Massif inferred from the Re-Os geochronology of molybdenite

    Science.gov (United States)

    Ackerman, Lukáš; Haluzová, Eva; Creaser, Robert A.; Pašava, Jan; Veselovský, František; Breiter, Karel; Erban, Vojtěch; Drábek, Milan

    2017-06-01

    Molybdenite is a common mineral accompanying Sn-W, Au, and base metal mineralizations located in different geotectonic units of the Bohemian Massif, but it is also widespread in granitoids and/or related quartz veins/pegmatites forming disseminated Mo mineralization. Thirty Re-Os ages were obtained for molybdenite samples from the Bohemian Massif to provide constraints on the timing and duration of mineralization event(s) within the framework of previously published geochronological data for the host and/or associated rocks. The obtained data for Sn-W-(Li) deposits in the Erzgebirge metallogenetic province indicate the predominance of one and/or multiple short-time mineralization events taking place between ˜319 and 323 Ma, with the exception of the Krupka deposit associated with the Altenberg-Teplice caldera where the data may suggest prolonged activity until ˜315 Ma. The ages of the Pb-Zn-(Au-Mo) Hůrky u Rakovníka and Fe-Cu-As Obří důl mineralizations from the exocontacts of the Čistá pluton and Krkonoše-Jizera Plutonic Complex, respectively, provide evidence for synchronous emplacement of the ore and the associated granitic rocks. In contrast, the Padrť Fe-As-Mo mineralization postdates the age of the associated Padrť granite. Disseminated Mo mineralization in Cadomian and Variscan granitoids and/or related to quartz veins/pegmatites provides Re-Os ages that overlap with the previously published geochronological data for the host rocks, suggesting coeval evolution. Molybdenite samples from the Sázava suite granites of the Central Bohemian Plutonic Complex (CBPC) have resolvable younger ages than their host granites, but similar to the age of spatially related Au mineralization which is associated with the latest evolution of the CBPC.

  5. Web Defacement and Intrusion Monitoring Tool: WDIMT

    CSIR Research Space (South Africa)

    Masango, Mfundo G

    2017-09-01

    Full Text Available at altering the content of the web pages or to make the website inactive. This paper proposes a Web Defacement and Intrusion Monitoring Tool, that could be a possible solution to the rapid identification of altered or deleted web pages. The proposed tool...

  6. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  7. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  8. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    https://dx.doi.org/10.4314/jasem.v21i2.18. Key words: Escravos, Vertical electrical sounding, Saltwater Intrusion, freshwater lenses, Aquifer, groundwater. Globally groundwater contributes a greater percentage of water usage in domestic, irrigation of agricultural farms and industrial purposes. Though groundwater is not the ...

  9. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  10. Vapor Intrusion Characterization Report (Revision 1.0)

    Science.gov (United States)

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  11. On the Feasibility of Intrusion Detection Inside Workstation Disks

    National Research Council Canada - National Science Library

    Griffin, John L; Pennington, Adam; Bucy, John S; Choundappan, Deepa; Muralidharan, Nithya; Ganger, Gregory R

    2003-01-01

    Storage-based intrusion detection systems (IDSs) can be valuable tools in monitoring for and notifying administrators of malicious software executing on a host computer, including many common intrusion tool kits...

  12. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  13. Rozvoj cyklotrasy Nežárka

    OpenAIRE

    Vondráčková, Jitka

    2010-01-01

    The aim of thesis entitled " The Development of Nežárka Cyclotourism" is using auditing methods to map current state of cycle paths and cycle routes around the river Nežárka,to identify the most appropriate line of the cycle route "Nežárka" and to propose The Cycle route "Nežárka" Master Plan. The theoretical part is focused on bicycle traffic and cycle tourism, particularly cycling infrastructure. The practical part of the thesis includes the line proposal of cycle route "Nežárka", the asses...

  14. Thermal effects of water intrusion in hydrophobic nanoporous materials.

    Science.gov (United States)

    Karbowiak, Thomas; Paulin, Christian; Ballandras, Anthony; Weber, Guy; Bellat, Jean-Pierre

    2009-07-29

    Liquid water intrusion in hydrophobic nanoporous silicalite-1, a pure siliceous zeolite, in isothermal conditions under high pressure produces an endothermic effect. After intrusion, confined water in zeolite pores is in a different state from that of the liquid bulk water. Such forced intrusion also chemically modifies the material and tends to render it slightly more hydrophilic.

  15. Rhenium-osmium isotopes in pervasively metasomatized mantle xenoliths from the Bohemian Massif and implications for the reliability of Os model ages

    Czech Academy of Sciences Publication Activity Database

    Kochergina, Y. V.; Ackerman, Lukáš; Erban, V.; Matusiak-Malek, M.; Puziewicz, J.; Halodová, P.; Špaček, P.; Trubač, J.; Magna, T.

    2016-01-01

    Roč. 430, July 15 (2016), s. 90-107 ISSN 0009-2541 Institutional support: RVO:67985831 Keywords : Bohemian Massif * depletion age * Ohře/Eger rift * Os isotopes * peridotite xenolith * Re-Os * sub-continental lithospheric mantle Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.347, year: 2016

  16. Types of soft-sediment deformation structures in a lacustrine Ploužnice member (Stephanian, Gzhelian, Pennsylvanian, Bohemian Massif), their timing, and possible trigger mechanism

    Czech Academy of Sciences Publication Activity Database

    Stárková, M.; Martínek, K.; Mikuláš, Radek; Rosenau, N.

    2015-01-01

    Roč. 104, č. 5 (2015), s. 1277-1298 ISSN 1437-3254 Institutional support: RVO:67985831 Keywords : soft- sediment deformation structures * bioturbation * early diagenetic carbonate * lacustrine facies * Bohemian Massif * Stephanian C * Krkonoše Piedmont Basin Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.133, year: 2015

  17. Lithogeochemistry and Sr-Nd isotopic composition of Neoproterozoic metasedimentary rocks of the Teplá Crystalline Complex, western Bohemian Massif: a geotectonic interpretation

    Czech Academy of Sciences Publication Activity Database

    Fiala, Jiří; Henjes-Kunst, F.; Müller-Sigmund, H.; Vejnar, Zdeněk

    2014-01-01

    Roč. 59, č. 4 (2014), s. 293-311 ISSN 1802-6222 Institutional support: RVO:67985831 Keywords : metasedimentary rocks * geochemistry * Sr-Nd isotopes * provenance * Tepla Crystalline Complex * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 1.405, year: 2014

  18. Sr-sulphate and associated minerals found from kyanite-bearing eclogite in the Moldanubian Zone of the Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Nakamura, D.; Kobayshi, T.; Shimobayashi, N.; Svojtka, Martin; Hirajima, T.

    2010-01-01

    Roč. 105, č. 5 (2010), s. 251-261 ISSN 1345-6296 Grant - others:Kyoto University(JP) 14400313 Institutional research plan: CEZ:AV0Z30130516 Keywords : celestine * Sr * eclogite * sulphide * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.677, year: 2010

  19. Trace element composition of quartz from different types of pegmatites: A case study from the Moldanubian Zone of the Bohemian Massif (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Breiter, Karel; Ackerman, Lukáš; Ďurišová, Jana; Svojtka, Martin; Novák, M.

    2014-01-01

    Roč. 78, č. 3 (2014), s. 703-722 ISSN 0026-461X Institutional support: RVO:67985831 Keywords : Bohemian Massif * mineralogy * Moldanubian Zone * pegmatite evolution * quartz * trace elements Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.026, year: 2014

  20. Multiple fluid sources/pathways and severe thermal gradients during formation of the Jílové orogenic gold deposit, Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Zachariáš, J.; Žák, Karel; Pudilová, M.; Snee, L. W.

    2013-01-01

    Roč. 54, October (2013), s. 81-109 ISSN 0169-1368 Institutional research plan: CEZ:AV0Z30130516 Institutional support: RVO:67985831 Keywords : Orogenic gold deposits * Carbon isotopes * Oxygen isotopes * Bismuth * Age * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.383, year: 2013

  1. Plio-Pleistocene basanitic and melilititic series of the Bohemian Massif: K-Ar ages, major/trace element and Sr–Nd isotopic data

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Ackerman, Lukáš; Balogh, K.; Hegner, E.; Jelínek, E.; Pécskay, Z.; Přichystal, A.; Upton, B. G. J.; Zimák, J.; Foltýnová, R.

    2013-01-01

    Roč. 73, č. 4 (2013), s. 429-450 ISSN 0009-2819 Institutional support: RVO:67985831 Keywords : Bohemian Massif * Plio-Pleistocene * Basanite * Melilitite * K-Ar age * Magmatism * Sr–Nd isotopes Subject RIV: DD - Geochemistry Impact factor: 1.397, year: 2013

  2. Origin of the Okrouhlá Radouň episyenite-hosted uranium deposit, Bohemian Massif, Czech Republic: fluid inclusion and stable isotope constraints

    Czech Academy of Sciences Publication Activity Database

    Dolníček, Z.; René, Miloš; Hermannová, S.; Prochaska, W.

    2014-01-01

    Roč. 49, č. 4 (2014), s. 409-425 ISSN 0026-4598 R&D Projects: GA MŠk ME10083 Institutional support: RVO:67985891 Keywords : Bohemian Massif * Uranium mineralization * Episyenite * Fluid inclusions Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.561, year: 2014

  3. Halloysite from karst Sediments of the Koněprusy Area: Evidence for Acid Hydrothermal Speleogenesis in the Bohemian Karst, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Melka, Karel; Suchý, Václav; Zeman, A.; Bosák, Pavel; Langrová, Anna

    2002-01-01

    Roč. 44, 2-4 (2002), s. 117-124, 2 s. tabulek ISSN 0001-7132. [Conference on Clay Mineralogy and Petrology /16./. Prague, 27.08.2000-31.08.2000] Institutional research plan: CEZ:AV0Z3013912 Keywords : halloysite * X-ray diffraction * Bohemian Karst Subject RIV: DB - Geology ; Mineralogy

  4. U-Pb zircon ages and structural development of metagranitoids of the Teplá crystalline complex: evidence for pervasive Cambrian plutonism within the Bohemian massif (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Dörr, W.; Fiala, Jiří; Vejnar, Zdeněk; Zulauf, G.

    1998-01-01

    Roč. 87, č. 1 (1998), s. 135-149 ISSN 0016-7835 R&D Projects: GA AV ČR KSK1012601 Grant - others:DFG(DE) Zu73/1-3 Keywords : Cambrian plutonism * U-Pb analyses * Bohemian massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.841, year: 1998

  5. Behavior of trace elements in quartz from plutons of different geochemical signature: A case study from the Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Breiter, Karel; Ackerman, Lukáš; Svojtka, Martin; Müller, A.

    175/176, 15 August (2013), s. 54-67 ISSN 0024-4937 R&D Projects: GA ČR GAP210/10/1105 Institutional support: RVO:67985831 Keywords : Quartz * trace elements * granites * fractionation * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 3.654, year: 2013

  6. Response of the Karst Phreatic Zone to Flood Events in a Major River (Bohemian Karst, Czech Republic) and its Implication for Cave Genesis

    Czech Academy of Sciences Publication Activity Database

    Vysoká, H.; Bruthans, J.; Žák, Karel; Mls, J.

    2012-01-01

    Roč. 74, č. 1 (2012), s. 65-81 ISSN 1090-6924 R&D Projects: GA ČR GAP210/10/1760 Institutional research plan: CEZ:AV0Z30130516 Keywords : karst * cave genesis * Bohemian Karst Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.474, year: 2012

  7. The Blaník Gneiss in the southern Bohemian Massif (Czech Republic): a rare rock composition among the early palaeozoic granite of Variscan Central Europe

    Czech Academy of Sciences Publication Activity Database

    René, Miloš; Finger, F.

    2016-01-01

    Roč. 110, č. 4 (2016), 503-514 ISSN 0930-0708 R&D Projects: GA MŠk ME 555 Institutional support: RVO:67985891 Keywords : leucogranite * turmaline * petrology * geochemistry * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.236, year: 2016

  8. Deciphering the Variscan tectonothermal overprint and deformation partitioning in the Cadomian basement of the Teplá-Barrandian unit, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Hajná, J.; Žák, J.; Kachlík, V.; Chadima, Martin

    2012-01-01

    Roč. 101, č. 7 (2012), s. 1855-1873 ISSN 1437-3254 Institutional support: RVO:67985831 Keywords : Avalonian-Cadomian belt * Bohemian Massif * Shear zone * Teplá-Barrandian unit * transpression * Variscan orogeny Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.261, year: 2012

  9. Upper Pleistocene Gulo gulo (Linne, 1758) remains from the Srbsko Chlum-Komin Hyena den cave in the Bohemian Karst, Czech Republic, with comparisons to contemporary wolverines

    Science.gov (United States)

    Cajus G. Diedrich; Jeffrey P. Copeland

    2010-01-01

    Wolverine bone material is described from the famous Upper Pleistocene cave Srbsko Chlum-Komin in the Bohemian Karst, Czech Republic, along with an overview of recently known Czech sites. The Gulo gulo Linne material was found in one of the largest Ice Age spotted-hyena dens in Europe. As a result of non-systematic excavations, the taphonomy is partly unclear. Lower-...

  10. Origin of eclogite and garnet pyroxenite from the Moldanubian Zone of the Bohemian Massif, Czech Republic and its implication to other mafic layers embedded in orogenic peridotites

    Czech Academy of Sciences Publication Activity Database

    Obata, M.; Hirajima, T.; Svojtka, Martin

    2006-01-01

    Roč. 88, 1-2 (2006), s. 321-340 ISSN 0930-0708 R&D Projects: GA AV ČR IAA3013006 Institutional research plan: CEZ:AV0Z30130516 Keywords : eclogite * pyroxenite * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.038, year: 2006

  11. New biostratigraphic evidence (texanitid ammonites, inoceramids and calcareous nannofossils) for the Upper and the uppermost Coniacian in the Bohemian Cretaceous Basin

    Czech Academy of Sciences Publication Activity Database

    Svobodová, Andrea; Košťák, M.; Čech, S.; Švábenická, L.

    2014-01-01

    Roč. 165, č. 4 (2014), s. 577-589 ISSN 1860-1804 Institutional support: RVO:67985831 Keywords : Bohemian Cretaceous Basin * Upper Coniacian * biostratigraphy * ammonites * inoceramids * calcareous nannofossils Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.569, year: 2014

  12. Pleistocene speleothem fracturing in the foreland of the Western Carpathians: a case study from the seismically active eastern margin of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Bábek, O.; Briestenský, Miloš; Přecechtělová, G.; Štěpančíková, Petra; Hellstrom, J.C.; Drysdale, R.N.

    2015-01-01

    Roč. 59, č. 3 (2015), s. 491-506 ISSN 1641-7291 R&D Projects: GA ČR GAP210/12/0573 Institutional support: RVO:67985891 Keywords : speleothems * U/Th series dating * palaeoseismicity * Pleistocene * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.858, year: 2015

  13. The polycyclic Lausche Volcano (Lausitz Volcanic Field) and its message concerning landscape evolution in the Lausitz Mountains (northern Bohemian Massif, Central Europe)

    Czech Academy of Sciences Publication Activity Database

    Wenger, E.; Büchner, J.; Tietz, O.; Mrlina, Jan

    2017-01-01

    Roč. 292, September (2017), s. 193-210 ISSN 0169-555X Institutional support: RVO:67985530 Keywords : Lausche * polycyclic volcanism * Lausitz Overthrust (Lusatian Fault ) * North Bohemian-Saxonian Cretaceous Basin Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: Volcanology Impact factor: 2.958, year: 2016

  14. Alkaline and Carbonate-rich Melt Metasomatism and Melting of Subcontinental Lithospheric Mantle: Evidence from Mantle Xenoliths, NE Bavaria, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Špaček, Petr; Magna, T.; Ulrych, Jaromír; Svojtka, Martin; Hegner, E.; Balogh, K.

    2013-01-01

    Roč. 54, č. 12 (2013), s. 2597-2633 ISSN 0022-3530 R&D Projects: GA ČR GA205/09/1170 Institutional research plan: CEZ:AV0Z30130516; CEZ:AV0Z30120515 Institutional support: RVO:67985831 ; RVO:67985530 Keywords : peridotite * metasomatism * subcontinental lithosphere * Sr-Nd-Li isotopes * microstructure Subject RIV: DB - Geology ; Mineralogy Impact factor: 4.485, year: 2013

  15. Chronological implications of the paleomagnetic record of the Late Cenozoic volcanic activity along the Moravia-Silesia border (NE Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Cajz, Vladimír; Schnabl, Petr; Pécskay, Z.; Skácelová, Z.; Venhodová, Daniela; Šlechta, Stanislav; Čížková, Kristýna

    2012-01-01

    Roč. 63, č. 5 (2012), s. 423-435 ISSN 1335-0552 R&D Projects: GA AV ČR IAA300130612; GA ČR GAP210/10/2351 Institutional research plan: CEZ:AV0Z30130516 Institutional support: RVO:67985831 Keywords : Plio-Pleistocene basalts * paleomagnetism * magnetostratigraphy * volcanology * K/Ar dating, * airborne magnetometry and gravimetry * Moravia and Silesia Subject RIV: DE - Earth Magnetism, Geodesy, Geography Impact factor: 1.143, year: 2012 http://www.geologicacarpathica.sk/ src /main.php

  16. Main Directions of the Fractures in the Limestone and Granite Quarries along the Sudetic Marginal fault near Vápenná village, NE Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Nováková, Lucie

    2008-01-01

    Roč. 5, č. 1 (2008), s. 49-55 ISSN 1214-9705 R&D Projects: GA MŠk(CZ) LC506; GA MŠk 1P05ME781 Institutional research plan: CEZ:AV0Z30460519 Keywords : brittle tectonics * geodynamics Subject RIV: DB - Geology ; Mineralogy http://www.irsm.cas.cz/abstracts/AGG/5_Novakova.pdf

  17. Upper Cretaceous to Pleistocene melilitic volcanic rocks of the Bohemian Massif: petrology and mineral chemistry

    Directory of Open Access Journals (Sweden)

    Skála Roman

    2015-06-01

    Full Text Available Upper Cretaceous to Pleistocene volcanic rocks of the Bohemian Massif represent the easternmost part of the Central European Volcanic Province. These alkaline volcanic series include rare melilitic rocks occurring as dykes, sills, scoria cones and flows. They occur in three volcanic periods: (i the Late Cretaceous to Paleocene period (80–59 Ma in northern Bohemia including adjacent territories of Saxony and Lusatia, (ii the Mid Eocene to Late Miocene (32.3–5.9 Ma period disseminated in the Ohře Rift, the Cheb–Domažlice Graben, Vogtland, and Silesia and (iii the Early to Late Pleistocene period (1.0–0.26 Ma in western Bohemia. Melilitic magmas of the Eocene to Miocene and Pleistocene periods show a primitive mantle source [(143Nd/144Ndt=0.51280–0.51287; (87Sr/86Srt=0.7034–0.7038] while those of the Upper Cretaceous to Paleocene period display a broad scatter of Sr–Nd ratios. The (143Nd/144Ndt ratios (0.51272–0.51282 of the Upper Cretaceous to Paleocene rocks suggest a partly heterogeneous mantle source, and their (87Sr/86Srt ratios (0.7033–0.7049 point to an additional late- to post-magmatic hydrothermal contribution. Major rock-forming minerals include forsterite, diopside, melilite, nepheline, sodalite group minerals, phlogopite, Cr- and Ti-bearing spinels. Crystallization pressures and temperatures of clinopyroxene vary widely between ~1 to 2 GPa and between 1000 to 1200 °C, respectively. Nepheline crystallized at about 500 to 770 °C. Geochemical and isotopic similarities of these rocks occurring from the Upper Cretaceous to Pleistocene suggest that they had similar mantle sources and similar processes of magma development by partial melting of a heterogeneous carbonatized mantle source.

  18. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  19. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  20. The Development of Agent Information for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro

    2017-10-01

    Full Text Available As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

  1. Changes in runoff in two neighbouring catchments in the Bohemian Forest related to climate and land cover changes

    Directory of Open Access Journals (Sweden)

    Bernsteinová Jana

    2015-12-01

    Full Text Available There is public concern that large-scale disturbances to forest cover caused by insects and storm winds in the Bohemian Forest could intensify high water flows and enhance the expected flooding risks predicted in current regional climate change scenarios. We analysed stream discharge in Upper Vydra and Große Ohe, neighbouring catchments in the Bohemian Forest, the largest contiguous forested area in Central Europe. Upper Vydra, in the Šumava National Park, and Große Ohe (including the Upper Große Ohe headwater catchment in the Bavarian Forest National Park are similar in size, but differ in land use cover and the extent of disturbed Norway spruce stands. Publicly available runoff and meteorological data (1978–2011 were examined using non-parametric trend and breakpoint analysis. Together with mapped vegetation cover changes, the results were used to address the following questions: 1 are there significant changes in the hydrological cycle and, if so, do these changes relate to 2 the extent and expansion of disturbance in forests stands and/or 3 altered precipitation dynamics and thermal conditions?

  2. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  3. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  4. A simplified approach to true molar intrusion

    Directory of Open Access Journals (Sweden)

    Flieger Stefanie

    2012-11-01

    Full Text Available Abstract Background Orthodontic management of anterior open bites is a demanding task for orthodontists. Molar intrusion as a primary means of open bite correction entails the need for appropriate anchorage. Orthodontic mini implants can provide the required mechanical support. The suggested procedure aims to reduce the risk of complications such as root damage or soft tissue irritations while minimizing overall complexity. Methods Three female patients aged 14, 18 and 19 years who decided against a surgical correction were treated with a device consisting of mini implants in the palatal slope, a palatal bar and intrusion cantilevers. Results In all three patients, an open bite reduction of more than a millimeter occurred within four months. An anterior overbite of 2 mm or more could be established within 6 to 9 months. Conclusions The method presented in this article enables the practitioner to use mini implants in an easily accessible insertion site. A lab-side procedure is optional but not required.

  5. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  6. Intrusion Learning: An Overview of an Emergent Discipline

    Directory of Open Access Journals (Sweden)

    Tony Bailetti

    2016-02-01

    Full Text Available The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.

  7. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  8. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  9. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  10. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  11. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  12. Noble gas systematics of the Skaergaard intrusion

    Science.gov (United States)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Raatmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  13. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  14. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  15. Nanogranitoids in garnet clinopyroxenites of the Granulitgebirge (Bohemian Massif): evidence for metasomatism and partial melting?

    Science.gov (United States)

    Borghini, Alessia; Ferrero, Silvio; Wunder, Bernd; O'Brien, Patrick J.; Ziemann, Martin A.

    2017-04-01

    Primary nanogranitoids occur in garnet from the garnet clinopyroxenites of the Granulitgebirge, Bohemian Massif. They form clusters in the inner part of the garnet, and may occur both as polycrystalline and glassy inclusions with size from 5 to 20 µm. Because of their random distribution in garnet these inclusions are interpreted as primary inclusions, thus formed during the growth of the garnet. Garnet does not show any major element zoning. Nanogranitoids were identified in garnet clinopyroxenites from two different locations and show slightly different mineral assemblages. Kumdykolite or albite, phlogopite, osumilite, kokchetavite and a variable amount of quartz occur in both locations. However, osumilite is more abundant in one locality and kokchetavite in the other. All these phases are identified using Raman Spectroscopy. Both assemblages are consistent with the origin of these inclusions as former droplets of melt. Nanogranitoids from one locality have been re-homogenized at 1000°C and 22 kbar to a hydrous glass of granodioritic/quartz-monzonitic composition in a piston cylinder apparatus. The chosen experimental conditions correspond to the formation of the host garnet (O'Brien & Rötzler, 2003) and thus of melt entrapment. Nanogranitoid-bearing garnet clinopyroxenites occur in bodies of serpentinized peridotites, hosted in turn in felsic granulites. The garnet clinopyroxenites show granoblastic texture dominated by garnet and clinopyroxene porphyroblasts with a variable amount of interstitial plagioclase, biotite, two generations of amphiboles (brown and green) and rutile and opaque minerals as accessories. The bulk rock composition is basic to intermediate, and the garnet chemistry varies from 24% Alm, 65% Prp and 11% Grs to 38% Alm, 36% Prp and 26 % Grs between one outcrop and the other. The origin of the investigated inclusions could be due to different processes: localized melting of metasomatized mafic rocks with simultaneous production of garnet or

  16. Non-intrusive, fast and sensitive ammonia detection by laser photothermal deflection

    International Nuclear Information System (INIS)

    Vries, H.S.M. de; Harren, F.J.M.; Wyers, G.P.; Otjes, R.P.; Slanina, J.; Reuss, J.

    1995-01-01

    A recently developed non-intrusive photothermal deflection (PTD) instrument allows sensitive, rapid and quantitative detection of local ammonia concentrations in the air. Ammonia is vibrationally excited by an infrared CO 2 laser in an intracavity configuration. A HeNe beam passing over the CO 2 laser beam (multipass arrangement) is deflected by the induced refractive index gradient. The detection limit for ammonia in ambient air is 0.5 ppbv with a spatial resolution of a few mm 3 . The time resolution is 0.1 s (single line) or 15 s (multi line). The system is fully automated and suited for non-stop measuring periods of at least one week. Results were compared to those obtained with a continuous-flow denuder (CFD). (author)

  17. Shoshonitic intrusion magmatism in Pajeu-Paraiba belt: the Bom Jardim complex

    International Nuclear Information System (INIS)

    Guimaraes, I.P. de; Silva Filho, A.F. da

    1990-01-01

    The Bom Jardim complex is a multi phase intrusion emplaced within the basement of the Pajeu-Paraiba belt, in the Borborema province, N.E., Brazil, during the Pan African (Brasiliano) orogeny, 600 Ma ago. The Bom Jardim complex is primarily composed of monzonites and syenites with subordinated granites. The major and trace elements geochemistry has established a shoshonitic affinity for the monzonite-syenite assemblages, whereas the granites are clearly of a high-K calc-alkaline character. The main geochemical trends determined for the complex are the result of fractionation of mainly amphibole, biotite, alkali feldspar ±clinopyroxene within the developing magmas. The enrichment in transition metal elements, LILE and high LILE/HSFE ratios, coupled with an initial Sr sup(87)/Sr sup(86) ratio of 0.70709 is consistent with a subduction related magma source. (author)

  18. Marlène Mocquet

    OpenAIRE

    Saudrais, Anthony

    2012-01-01

    Les œuvres (de 2009 à 2011) ici réunies réinterprètent le divorce des idées reçues entre l’art figuratif et l’art abstrait. La retranscription d’une conversation, justement intitulée « Les Gigognes », entre l’artiste et Gaëlle Rageot-Deshayes, aide à cerner les références de Marlène Mocquet, la matérialité de ses œuvres, « le principe de la poupée russe [qui] gouverne [ses] images » (p.12) ou encore le jeu des titres et du récit imaginaire [« La Fraise dans ma bouche » (2009) ; « Lire l’oisea...

  19. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  20. MiniBooNE Oscillation Results

    International Nuclear Information System (INIS)

    Djurcic, Zelimir

    2009-01-01

    These proceedings summarize the MiniBooNE ν μ → ν e results, describe the first (bar ν) μ → (bar ν) e result, and current analysis effort with the NuMI neutrinos detected in the miniBooNE detector

  1. MiniBooNE overview and status

    Indian Academy of Sciences (India)

    physics pp. 611-614. MiniBooNE overview and status. P KAsPER (for the BooNE Collaboration). Fermilab, P.O. Box 500, Batavia, IL 60510-0500, USA. Abstract. Recent discoveries in the neutrino sector have opened a new frontier in high- energy physics and cosmology. Evidence from neutrino oscillation experiments from.

  2. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  3. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  4. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  5. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  6. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2015-09-01

    Training enhancement (not treatment)  Addressing intrusive thoughts (secondary prevention of PTSD ?? decrease distress)  Mindfulness based intervention...AWARD NUMBER: W81XWH-09-1-0535 TITLE: Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts PRINCIPAL INVESTIGATOR...SUBTITLE 5a. CONTRACT NUMBER W81XWH-09-1-0535 Enhancing BATTLEMIND: Preventing PTSD by Coping With Intrusive Thoughts 5b. GRANT NUMBER 08194004

  7. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  8. Two species of Selaginella cones and their spores from the Bohemian Carboniferous continental basins of the Czech Republic.

    Science.gov (United States)

    Bek, J; Oplustil, S; Drábková, J

    2001-03-01

    Two species of Selaginella cones from the Bohemian Upper Carboniferous continental basins of the Bolsovian and Westphalian D age are described, together with their in situ spores. Two specimens of Selaginella gutbierii yielded microspores closely comparable with the dispersed species Cirratriradites saturnii and megaspores closely comparable with the dispersed species Triangulatisporites vermiculatus. Microspores closely comparable with the dispersed species Cirratriradites annulatus and megaspores resemble the dispersed species Triangulatisporites tertius were isolated from cones of Selaginella cf. leptostachys. All the spores isolated from one cone are of the same type and would be referred to one dispersed micro- and megaspore species if found as Sporae dispersae. The paper contains a review of all palynologically studied Carboniferous Selaginella and Selaginella-like cones and reviews of all in situ and dispersed Cirratriradites and Triangulatisporites spores.

  9. Multistage evolution of UHT granulites from the southernmost part of the Gföhl Nappe, Bohemian Massif, Lower Austria

    Science.gov (United States)

    Schantl, Philip; Hauzenberger, Christoph; Linner, Manfred

    2016-04-01

    A detailed petrological investigation has been undertaken in leucocratic kyanite-garnet bearing and mesocratic orthopyroxene bearing granulites from the Dunkelsteiner Wald, Pöchlarn-Wieselburg and Zöbing granulite bodies from the Moldanubian Zone in the Bohemian Massif (Austria). A combination of textural observations, conventional geothermobarometry, phase equilibrium modelling as well as major and trace element analyses in garnet enables us to confirm a multistage Variscan metamorphic history. Chemically homogenous garnet cores with near constant grossular-rich plateaus are considered to reflect garnet growth during an early HP/UHP metamorphic evolution. Crystallographically oriented rutile exsolutions restricted to those grossular-rich garnet cores point to a subsequent isothermal decompression of the HP/UHP rocks. Overgrowing garnet rims show a pronounced zonation and are interpreted as the result of dehydration melting reactions during an isobaric heating phase which could have taken place near the base of an overthickened continental crust, where the previously deeply subducted rocks were exhumed to. For this HP granulite facies event maximum PT conditions of ~1050 °C and 1.6 GPa have been estimated from leucocratic granulites comprising the peak mineral assemblage quartz, ternary feldspar, garnet, kyanite and rutile. The pronounced zoning of garnet rims indicates that the HP granulite facies event must have been short lived since diffusion in this temperature region is usually sufficient fast to homogenize a zoning pattern in garnet. A retrogressive metamorphic stage is documented in these rocks by the replacement of kyanite to sillimanite and the growth of biotite. This retrograde event took place within the granulite facies but at significantly lower pressures and temperatures with ~0.8 GPa and ~760 °C. This final stage of re-equilibration is thought to be linked with a second exhumation phase into middle crustal levels accompanied by intensive

  10. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  11. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  12. Estimation of crystallization pressure of granite intrusions

    Science.gov (United States)

    Yang, Xue-Ming

    2017-08-01

    A numerical method is presented to estimate the crystallization pressure of granite intrusions based on two polynomial equations obtained by an analysis of the existing haplogranite ternary phase diagram and associated dataset. The results indicate that the pressure is correlated respectively with normative quartz (Qtz) content and with normative albite (Ab) plus orthoclase (Or) contents of granitic rocks as follows. where P is pressure in MPa, and R denotes correlation coefficient. It is noted that the procedure of normalizing the sum of CIPW norm (quartz, albite, orthoclase) contents to 100% is required before using Eqs. (1) and (2). The difference in pressure calculations between these two equations is ≤ 16 MPa for the range of normative quartz contents from 15 to 40 wt%. An example of how to use these equations to estimate the crystallization pressure of a granite intrusion is also provided to show the validity and convenience of this method. The uncertainty of such pressure estimation is not well known, although it must fall into the uncertainty range of the existing experimental work on pressure constraints. The simplicity of this empirical method is appreciable, although its applicability to natural granitoids needs further test. More experimental work is required to constrain the effects of components, such as CaO, FeO, MgO, F, Cl, CO2, on the granite phase equilibria. These equations, however, can be used for estimating crystallization pressures of water-saturated and quartz-oversaturated granitic systems.

  13. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  14. Molar Intrusion in Open-bite Adults Using Zygomatic Miniplates.

    Science.gov (United States)

    Marzouk, Eiman S; Abdallah, Essam Mohamed; El-Kenany, Walid A

    2015-01-01

    The aim of this study is to evaluate the skeletal, dental and soft tissue changes that arise after intrusion of the maxillary molars using zygomatic miniplates in adult skeletal anterior open bite patients. In addition to measuring the amount and rate of molar intrusion; with special emphasis on changes in the axial inclination of the intruded molars. The study group was composed of 13 anterior open bite patients (mean age 18 years, 8 months ± 2 years, 2 months) with posterior dentoalveolar excess. Mini-plates were placed in the zygomatic buttress bilaterally. The upper arch was segmentally leveled and a double Trans-Palatal Arch (TPA) was bonded. Closed NiTi coil spring was placed bilaterally between the book of the mini-plate just mesial and distal to the first molar buccal tube applying intrusive force of 450 gper side. Lateral and posteroanterior cephalograms were taken before intrusion (T1: post upper segmental leveling) and after intrusion (T2). Comparison between means before and after the intrusion was done using Wilcoxon Signed Ranks test (WSRT). Mandibular autorotation followed the molar intrusion, SNB and SN-Pog angles significantly increased while the ANB, MP-SN angle and N-S-Gn angle significantly decreased. The mean amount of accomplished molar intrusion was 3.1mm ± 0.74mm, with a rate of 0.36mm per month ± 0.08mm per month and a bite closure of 6.55mm ± 1.83mm. There was no significant buccal tip in the right and left molars upon intrusion. Conclusion: Miniplates zygomatic anchorage can be used effectively for skeletal open bite correction through posterior dento-alveolar intrusion. Intrusion of the posterior teeth with skeletal anchorage induced counterclockwise rotation of the mandible and, as a consequence, corrected the anteroposterior intermaxillary relationship with a dramatic improvement in the facial soft tissue convexity.

  15. Depth-recursive tomography of the Bohemian Massif at the CEL09 transect—Part A: Resolution estimates and deblurring aspects

    Czech Academy of Sciences Publication Activity Database

    Novotný, Miroslav

    2011-01-01

    Roč. 32, č. 6 (2011), s. 827-855 ISSN 0169-3298 R&D Projects: GA MŠk LA08036; GA MŽP SB/630/2/00 Institutional research plan: CEZ:AV0Z30120515 Keywords : depth-recursive refraction tomography * Bohemian Massif * CEL09 profile Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 3.093, year: 2011

  16. The crust-mantle transition and the Moho beneath the Vogtland/West Bohemian region in the light of different seismic methods

    Czech Academy of Sciences Publication Activity Database

    Hrubcová, Pavla; Geissler, W.H.

    2009-01-01

    Roč. 53, č. 3 (2009), s. 275-294 ISSN 0039-3169 R&D Projects: GA AV ČR IAA300120801 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * Vogtland/West Bohemia * crustal structure * Moho * refraction and wide-angle reflection * receiver function * seismic methods * Eger Rift Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.000, year: 2009

  17. Three-dimensional velocity model of the crust of the Bohemian Massif and its effects on seismic tomography of the upper mantle

    Czech Academy of Sciences Publication Activity Database

    Karousová, Hana; Plomerová, Jaroslava; Babuška, Vladislav

    2012-01-01

    Roč. 56, č. 1 (2012), s. 249-267 ISSN 0039-3169 R&D Projects: GA ČR GA205/07/1088; GA AV ČR IAA300120709 Institutional research plan: CEZ:AV0Z30120515 Keywords : crustal structure * seismic methods * Bohemian Massif * teleseismic tomography Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.975, year: 2012

  18. Tectonic and paleogeographic interpretation of the paleomagnetism of Variscan and pre-Variscan formations of the Bohemian Massif, with special reference to the Barrandian terrane

    Czech Academy of Sciences Publication Activity Database

    Krs, Miroslav; Pruner, Petr; Man, Otakar

    2001-01-01

    Roč. 332, 1-2 (2001), s. 93-114 ISSN 0040-1951 R&D Projects: GA AV ČR KSK3012103; GA ČR GA205/99/0594; GA AV ČR IAA3013802 Institutional research plan: CEZ:AV0Z3013912 Keywords : Bohemian Massif * paleomagnetism * paleogeography Subject RIV: DE - Earth Magnetism, Geodesy, Geography Impact factor: 1.473, year: 2001

  19. Fault slip versus slope deformations: Experience from paleoseismic trenches in the region with low slip-rate faults and strong Pleistocene periglacial mass wasting (Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Špaček, P.; Valenta, Jan; Tábořík, Petr; Ambrož, V.; Urban, M.; Štěpančíková, Petra

    2017-01-01

    Roč. 451, 7 SEP (2017), s. 56-73 ISSN 1040-6182 R&D Projects: GA ČR GAP210/12/0573; GA MŠk(CZ) LM2015079; GA MŠk 7AMB13AT023 Institutional support: RVO:67985891 Keywords : Active fault ing * Paleoseismology * Slope deformation * Solifluction * Colluvium * Quaternary * Bohemian massif Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 2.199, year: 2016

  20. The MiniBooNE detector

    International Nuclear Information System (INIS)

    Aguilar-Arevalo, A.A.; Anderson, C.E.; Bartoszek, L.M.; Bazarko, A.O.; Brice, S.J.; Brown, B.C.; Bugel, L.; Cao, J.; Coney, L.; Conrad, J.M.; Cox, D.C.; Curioni, A.; Djurcic, Z.; Finley, D.A.; Fleming, B.T.; Ford, R.; Garcia, F.G.; Garvey, G.T.; Green, C.; Green, J.A.

    2009-01-01

    The MiniBooNE neutrino detector was designed and built to look for ν μ →ν e oscillations in the (sin 2 2θ,Δm 2 ) parameter space region where the LSND experiment reported a signal. The MiniBooNE experiment used a beam energy and baseline that were an order of magnitude larger than those of LSND so that the backgrounds and systematic errors would be completely different. This paper provides a detailed description of the design, function, and performance of the MiniBooNE detector.

  1. Modelling reversibility of Central European mountain lakes from acidification: Part I - the Bohemian forest

    Directory of Open Access Journals (Sweden)

    V. Majer

    2003-01-01

    Full Text Available A dynamic, process-based acidification model, MAGIC7, has been applied to three small, strongly acidified lakes in the Bohemian Forest, the Czech Republic. The model was calibrated for a set of experimental records on lake water composition over the 1984–2000 period, and produced hindcast concentrations that compared well, even with older (40-year irregular determinations of nitrate, chloride and pH. Water and soil chemistry forecasts up to 2050 were based on reductions in S and N emissions presupposed by the Gothenburg Protocol. Modelled sulphate and chloride concentrations were predicted to decrease to the levels at the beginning of the 20th century by 2050. The lake water carbonate buffering system is predicted to be re-established in only two lakes (Cerné and Plešné, with current soil base saturations of 12-15%. Concentrations of ionic aluminium species decreased sharply, from 110 μeq l-1 in the mid-1980s to the current ~40 μeq l-1, and were predicted to decrease below 10 μeq l-1 in the 2020s. Diatom-inferred pH in pre-industrial times was substantially lower than modelled pH. It is suggested that the diatom pH, based almost entirely on non-planktonic species, is biased by inwash of diatoms from more acidic tributaries into the sediment of these small lakes. Generally significant results can be summarised as follows: (1 Simulated sulphate levels agree well with observations during acidification progress and retreat only for values of soil SO42- adsorption capacity three to six times (20 to 40 μeq kg-1 higher than those found experimentally. This implies a further mechanism of S retention and release in addition to physical sulphate adsorption to Fe and Al oxides of soils. (2 The catchments’ ability to retain deposited N appeared to decline after ~1950 but this was not connected with a sufficient change in the C:N ratio of the soils. Agreement between modelled and observed concentrations of nitrate was therefore achieved by

  2. Deformation mechanisms and grain size evolution in the Bohemian granulites - a computational study

    Science.gov (United States)

    Maierova, Petra; Lexa, Ondrej; Jeřábek, Petr; Franěk, Jan; Schulmann, Karel

    2015-04-01

    A dominant deformation mechanism in crustal rocks (e.g., dislocation and diffusion creep, grain boundary sliding, solution-precipitation) depends on many parameters such as temperature, major minerals, differential stress, strain rate and grain size. An exemplary sequence of deformation mechanisms was identified in the largest felsic granulite massifs in the southern Moldanubian domain (Bohemian Massif, central European Variscides). These massifs were interpreted to result from collision-related forced diapiric ascent of lower crust and its subsequent lateral spreading at mid-crustal levels. Three types of microstructures were distinguished. The oldest relict microstructure (S1) with large grains (>1000 μm) of feldspar deformed probably by dislocation creep at peak HT eclogite facies conditions. Subsequently at HP granulite-facies conditions, chemically- and deformation- induced recrystallization of feldspar porphyroclasts led to development of a fine-grained microstructure (S2, ~50 μm grain size) indicating deformation via diffusion creep, probably assisted by melt-enhanced grain-boundary sliding. This microstructure was associated with flow in the lower crust and/or its diapiric ascent. The latest microstructure (S3, ~100 μm grain size) is related to the final lateral spreading of retrograde granulites, and shows deformation by dislocation creep at amphibolite-facies conditions. The S2-S3 switch and coarsening was interpreted to be related with a significant decrease in strain rate. From this microstructural sequence it appears that it is the grain size that is critically linked with specific mechanical behavior of these rocks. Thus in this study, we focused on the interplay between grain size and deformation with the aim to numerically simulate and reinterpret the observed microstructural sequence. We tested several different mathematical descriptions of the grain size evolution, each of which gave qualitatively different results. We selected the two most

  3. The systematics and paleobiogeographic significance of Sub-Boreal and Boreal ammonites (Aulacostephanidae and Cardioceratidae from the Upper Jurassic of the Bohemian Massif

    Directory of Open Access Journals (Sweden)

    Hrbek Jan

    2014-10-01

    Full Text Available Upper Jurassic marine deposits are either rarely preserved due to erosion or buried under younger sediments in the Bohemian Massif. However, fossil assemblages from a few successions exposed in northern Bohemia and Saxony and preserved in museum collections document the regional composition of macro-invertebrate assemblages and thus provide unique insights into broad-scale distribution and migration pathways of ammonites during the Late Jurassic. In this paper, we focus on the systematic revision of ammonites from the Upper Oxfordian and Lower Kimmeridgian deposits of northern Bohemia and Saxony. The ammonites belong to two families (Aulacostephanidae and Cardioceratidae of high paleobiogeographic and stratigraphic significance. Six genera belong to the family Aulacostephanidae (Prorasenia, Rasenia, Eurasenia, Rasenioides, Aulacostephanus, Aulacostephanoides and one genus belongs to the family Cardioceratidae (Amoeboceras. They show that the Upper Jurassic deposits of the northern Bohemian Massif belong to the Upper Oxfordian and Lower Kimmeridgian and paleobiogeographically correspond to the German-Polish ammonite branch with the geographical extent from the Polish Jura Chain to the Swabian and Franconian Alb. Therefore, the occurrences of ammonites described here imply that migration pathway connecting the Polish Jura Chain with habitats in southern Germany was located during the Late Oxfordian and Early Kimmeridgian in the Bohemian Massif.

  4. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  5. Mineralogy and petrogenesis of a Ba-Ti-Zr-rich peralkaline dyke from Šebkovice (Czech Republic): Recognition of the most lamproitic Variscan intrusion

    Science.gov (United States)

    Krmíček, Lukáš; Cempírek, Jan; Havlín, Aleš; Přichystal, Antonín; Houzar, Stanislav; Krmíčková, Michaela; Gadas, Petr

    2011-01-01

    A peralkaline, ultrapotassic dyke found at Šebkovice (Třebíč district, western Moravia) is a mineralogically extreme member of a dyke swarm occurring along the south-eastern border of the Moldanubian Region of the Bohemian Massif. The dyke shows a simple zoning, with a very fine-grained marginal zone grading into a medium-grained central zone. It has a primary mineral assemblage of microcline and potassic amphiboles, with accessory apatite and altered phlogopite. The microcline exhibits an unusual red luminescence colour and pronounced substitution of Fe3+ for Al, with measured contents of Fe2O3 up to 8.5 wt.% (0.31 apfu Fe3+). Amphiboles have very high K (up to 0.99 apfu) and Si contents; their compositions follow an alkaline fractionation trend from potassic-richterite to potassic-magnesio-arfvedsonite, characterized by an increase of Na/K and a decrease of Ca, Mg, Fe2+ and Ti via heterovalent substitutions [B]Ca + [C](Mg,Fe2+) → [B]Na + [C]Fe3+ and Ti + Mg → 2Fe3+. The most evolved apatite is significantly enriched in SrO (up to 9.7 wt.%; 0.49 apfu Sr). The core of the dyke and late veinlets contain unique late- to post-magmatic Ba-Ti-Zr-bearing mineral assemblages of baotite, henrymeyerite, titanite, rutile, benitoite and bazirite. Anhedral baotite fills interstices distributed inhomogeneously in the dyke centre; it is locally replaced by a Ba-bearing titanite + henrymeyerite + rutile + quartz assemblage. Henrymeyerite (the second record in a lamproite) shows variable Fe/Ti ratios and represents a solid solution of the hepta- and hexatitanate components. Euhedral crystals of benitoite and bazirite are enclosed in the late-stage quartz-titanite-apatite veinlets in the fine-grained margin of the intrusion. In terms of a mineralogical-genetic classification, the Šebkovice dyke can be considered as a new high-silica (~ 57 wt.% SiO2) variety of lamproite (variety Šebkovice), and represents a unique expression of post-collisional potassic magmatism on the

  6. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  7. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  8. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    Science.gov (United States)

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  9. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  10. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  11. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  12. Statistical decision making for authentication and intrusion detection

    NARCIS (Netherlands)

    Dimitrakakis, C.; Mitrokotsa, A.

    2009-01-01

    User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose alternatives based on a

  13. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    A fairly good fitness between the observed and computed values was obtained by a manual trial-and-error method. ... controlling seawater intrusion in such coastal aquifer systems. 1. Introduction. Seawater intrusion constitutes a ..... reveals that FEFLOW is an effective and robust simulation tool for studying variable-density.

  14. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The

  15. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    through honeypots, machines explicitly designated solely to learn the methods used by black-hats to probe and hack a system so that a network...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration

  16. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  17. [Proceedings of the VII international symposium 'Cultural heritage in geosciences, mining and metallurgy : libraries, archives, museums' : "Museums and their collections" held at the Nationaal Natuurhistorisch Museum Leiden (The Netherlands), 19-23 May, 2003 / Cor F. Winkler Prins and Stephen K. Donovan (editors)]: Bohemian mineralogy in the early 19th century: the Vaterlandisches Museum in Bohmen

    NARCIS (Netherlands)

    Schweizer, C.R.

    2004-01-01

    The Vaterlandisches Museum in Prague was officially founded in 1822 by Caspar and Franz Sternberg as a manifestation of Bohemian nationalism. It aimed at 1) the education of the public, 2) the sponsorship of Bohemian scientific and cultural research, and 3) the economical utilization of scientific

  18. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  19. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  20. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  1. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  2. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  3. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  4. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  5. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  6. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  7. Poleward intrusion in the northern Galician shelf

    Science.gov (United States)

    Alvarez, I.; Ospina-Alvarez, N.; deCastro, M.; Varela, M.; Gomez-Gesteira, M.; Prego, R.

    2010-05-01

    The evolution of a warm water mass related to the Iberian Poleward Current (IPC) was characterized along the northern Galician shelf in November 2008 by means of Sea Surface Temperature and wind data. It was observed that under upwelling favorable conditions water temperature decreased along the northern coast and a temperature break appeared between Cape Vilano and Cape Ortegal showing a relaxation of the poleward intrusion. The effect of the IPC was also analyzed inside the Northern Galician Rias taking into account the hydrographical and biogeochemical properties measured on November 18. Water driven by the IPC was observed close to the mouth of the rias, around Cape Estaca de Bares, causing a nutrient salts decrease. Inside the rias a slight biological activity was found near surface resulting from fluvial contributions.

  8. Emplacement of sandstone intrusions during contractional tectonics

    Science.gov (United States)

    Palladino, Giuseppe; Grippa, Antonio; Bureau, Denis; Alsop, G. Ian; Hurst, Andrew

    2016-08-01

    Sandstone injections are created by the forceful emplacement of remobilized sand in response to increases in overpressure. However, the contribution provided by horizontal compressive stress to the build-up in overpressure, and the resulting emplacement of sand injection complexes, is still to be substantiated by robust field observations. An opportunity to address this issue occurs in Central California where a large volume of sandstone intrusions record regionally-persistent supra-lithostatic pore-pressure. Detailed fieldwork allows sandstone-filled thrusts to be recognized and, for the first time, permits us to demonstrate that some sandstone intrusions are linked to contractional deformation affecting the western border of the Great Valley Basin. Fluidized sand was extensively injected along thrust surfaces, and also fills local dilatant cavities linked to thrusting. The main aims of this paper are to provide detailed descriptions of the newly recognized syn-tectonic injections, and describe detailed cross-cutting relationships with earlier sandstone injection complexes in the study area. Finally, an evolutionary model consisting of three phases of sand injection is provided. In this model, sand injection is linked to contractional tectonic episodes affecting the western side of the Great Valley Basin during the Early-Middle Cenozoic. This study demonstrates that sand injections, driven by fluid overpressure, may inject along thrusts and folds and thereby overcome stresses associated with regional contractional deformation. It is shown that different generations of sand injection can develop in the same area under the control of different stress regimes, linked to the evolving mountain chain.

  9. Web life: Mahalo.ne.Trash

    Science.gov (United States)

    2014-05-01

    Mahalo.ne.Trash is the personal blog of John Asher Johnson, an astronomer at Harvard University in the US who began blogging in 2007, when he was about to begin a postdoctoral fellowship at the University of Hawaii.

  10. UCB-NE-107 user's manual

    International Nuclear Information System (INIS)

    Lee, W.W.L.

    1989-03-01

    The purpose of this manual is to provide users of UCB-NE-107 with the information necessary to use UCB-NE-107 effectively. UCB-NE-107 is a computer code for calculating the fractional rate of readily soluble radionuclides that are released from nuclear waste emplaced in water-saturated porous media. Waste placed in such environments will gradually dissolve. For many species such as actinides and rare earths, the process of dissolution is governed by the exterior flow field, and the chemical reaction rate or leaching rate. However, for readily soluble species such as 135 Cs, 137 Cs, and 129 I, it has been observed that their dissolution rates are rapid. UCB-NE-107 is a code for calculating the release rate at the waste/rock interface, to check compliance with the US Nuclear Regulatory Commission's (USNRC) subsystem performance objective. It is an implementation of the analytic solution given below. 5 refs., 2 figs

  11. Is any awareness necessary for an Ne?

    Directory of Open Access Journals (Sweden)

    Shani eShalgi

    2012-05-01

    Full Text Available The Error-Related Negativity (Ne or ERN is a reliable electrophysiological index of error processing, which has been found to be independent of whether a subject is aware of an error or not. A large Ne was equally seen after errors that were consciously detected (Aware errors and those that were not (Unaware errors, compared to a small negativity for correct responses (CRN. This suggests a dissociation between an automatic, preconscious error processing mechanism and subjective evaluation. A common concern regarding this finding is that subjects could have been somewhat aware of their errors, but did not report them due to lack of confidence. Here we tested this possibility directly using a betting paradigm which allowed us to separate occasions in which the subjects were confident of their response and trials in which they were unsure. In a choice reaction time task, subjects directly judged the accuracy of each response (correct or error and then bet on this judgment using a high, medium or low amount of money. The bets were used to determine the level of confidence the subjects had of their response. The average across all subjects regardless of confidence (betting measure replicated the reported finding of an equal Ne for Aware and Unaware errors which was larger than the CRN. However, when Ne measurement was confined to high confidence (high bet trials in confident subjects, a prominent Ne was seen only for Aware errors, while confident Unaware errors (i.e., error trials on which subjects made high bets that they were correct elicited a response that did not differ from the CRN elicited by truly correct answers. In contrast, for low confidence trials in unconfident subjects, an intermediate and equal Ne/CRN was elicited by Correct responses, Aware and Unaware errors. These results provide direct evidence that the Ne is related to error awareness, and suggest the amplitude of the Ne/CRN depends on individual differences in error reporting

  12. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  13. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  14. The Experience of Intrusions Scale: a preliminary examination.

    Science.gov (United States)

    Salters-Pedneault, Kristalyn; Vine, Vera; Mills, Mary Alice; Park, Crystal; Litz, Brett T

    2009-01-01

    Intrusive thoughts (i.e., unwelcome, distressing, involuntary thoughts) are prevalent in a variety of clinical conditions and are increasingly a focus of translational research. The goal of this study was to develop and preliminarily examine a brief self-report measure designed to assess clinically relevant aspects of the experience of intrusive thoughts related to a particular target. The Experience of Intrusions Scale (EIS) is a five-item measure that assesses the frequency, unpredictability, and unwantedness of intrusive thoughts, as well as the interference and distress caused by the intrusions, each on a five-point Likert-type scale. Five times over a four-] period, female undergraduates (N=160) completed the EIS in response to intrusive thoughts regarding a film clip depicting a sexual assault. On the first and last days, participants completed the EIS five minutes after watching the clip. In between film clip viewings, participants completed the EIS once per day. The EIS demonstrated good internal consistency, good to excellent test-retest reliability using both immediate post-stimulus and 24-hour time intervals, and convergent validity with two existing measures of intrusive phenomena: the White Bear Suppression Inventory (Wegner & Zanakos, 1994) and the Post-traumatic Stress Disorder Checklist-Civilian Version (Weathers, Litz, Herman, Huska, & Keane, 1993).

  15. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. August, 2002 - floods events, affected areas revitalisation and prevention for the future in the central Bohemian region, Czech Republic

    Science.gov (United States)

    Bina, L.; Vacha, F.; Vodova, J.

    2003-04-01

    Central Bohemian Region is located in a shape of a ring surrounding the capitol of Prague. Its total territorial area is 11.014 sq.km and population of 1 130.000 inhabitants. According to EU nomenclature of regional statistical units, the Central Bohemian Region is classified as an independent NUTS II. Bohemia's biggest rivers, Vltava and Labe form the region's backbone dividing it along a north-south line, besides that there are Sazava and Berounka, the two big headwaters of Vltava, which flow through the region and there also are some cascade man made lakes and 2 important big dams - Orlik and Slapy on the Vltava River in the area of the region. Overflowing of these rivers and their feeders including cracking of high-water dams during the floods in August 2002 caused total or partial destruction or damage of more than 200 towns and villages and total losses to the extend of 450 mil. EUR. The worst impact was on damaged or destroyed human dwellings, social infrastructure (schools, kindergartens, humanitarian facilities) and technical infrastructure (roads, waterworks, power distribution). Also businesses were considerably damaged including transport terminals in the area of river ports. Flowage of Spolana Neratovice chemical works caused critical environmental havoc. Regional crisis staff with regional Governor in the lead worked continuously during the floods and a regional integrated rescue system was subordinated to it. Due to the huge extent of the floods the crisis staff coordinated its work with central bodies of state including the Government and single "power" resorts (army, interior, transport). Immediately after floods a regional - controlled management was set up including an executive body for regional revitalisation which is connected to state coordinating resort - Ministry for Local Development, EU sources and humanitarian aid. In addition to a program of regional revitalisation additional preventive flood control programs are being developed

  17. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  18. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  19. MicroBooNE: The Search For The MiniBooNE Low Energy Excess

    Energy Technology Data Exchange (ETDEWEB)

    Kaleko, David [Columbia Univ., New York, NY (United States)

    2017-01-01

    This thesis describes work towards the search for a low energy excess in MicroBooNE. What MicroBooNE is, what the low energy excess is, and how one searches for the latter in the former will be described in detail.

  20. Intrusion signature creation via clustering anomalies

    Science.gov (United States)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  1. A Review of Vapor Intrusion Models

    Science.gov (United States)

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulation, and can increase the difficulty of obtaining a solution, especially when explicitly considering coupled oxygen transport and consumption. The models of contaminant building entry pathway are often coupled to calculations of indoor air contaminant concentration, and both are influenced by building construction and operational features. The description of entry pathway involves consideration of building foundation characteristics, while calculation of indoor air contaminant levels requires characterization of building enclosed space and air exchange within this. This review summarizes existing VI models, and discusses the limits of current screening tools commonly used in this field. PMID:23360069

  2. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  3. Simulating the influence of groundwater table fluctuation on vapor intrusion

    Science.gov (United States)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  4. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  5. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  6. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  7. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  8. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  9. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  10. Slick: An Intrusion Detection System for Virtualized Storage Devices

    NARCIS (Netherlands)

    Bacs, A.; Giuffrida, C.; Grill, B.; Bos, H.J.; Ossowski, Sascha

    2016-01-01

    Cloud computing is rapidly reshaping the server administration landscape. The widespread use of virtualization and the increasingly high server consolidation ratios, in particular, have introduced unprecedented security challenges for users, increasing the exposure to intrusions and opening up new

  11. Information Assurance Intrusion Detection Sensor Database Design: Lessons Learned

    National Research Council Canada - National Science Library

    Spink, Brian

    2001-01-01

    Current architectural trends in information assurance for the DOD focuses on the fusion and correlation of large volumes of data collected across several intrusion detection systems and boundary devices...

  12. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  13. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  14. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  15. Reaction cross section for Ne isotopes

    International Nuclear Information System (INIS)

    Panda, R.N.; Sahu, B.K.; Patra, S.K.

    2012-01-01

    In the present contribution, first the bulk properties are calculated, such as binding energy (BE), root mean square charge radius r ch , matter radius r m and quadrupole deformation parameter β 2 for 18-32 Ne isotopes in the Relativistic mean field (RMF) and effective field theory motivated RMF (E-RMF) formalisms . Then the total nuclear reaction cross section σR is analyzes for the scattering of 20 Ne and 28-32 Ne from a 12 C target at 240 MeV/nucleon by using the RMF model. Thus the objective of the present study is to calculate the bulk properties as well as a systematic analysis of σR over a range of neutron rich nuclei in the frame work of Glauber model

  16. Preliminary Study of the Pozzolanic Activity of Dumped Mine Wastes Obtained from the North Bohemian Basin in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Konstantinos SOTIRIADIS

    2017-02-01

    Full Text Available Three dumped raw materials, a tuff and two bentonites, obtained from two mining sites at the North Bohemian basin in the Czech Republic, have been studied in order to evaluate them as pozzolanic admixtures in lime mortars for employment in restoration of cultural heritage objects. After thermal activation (800 °C; 5 h, their pozzolanic properties were compared with those of commercial metakaolin. Quantitative phase analysis with the Rietveld method from X-ray powder diffraction patterns, morphological observations, as well as the Frattini and the modified Chapelle tests were performed. In addition, lime mortars, incorporating the fired materials, were prepared and subjected to simultaneous thermal analysis after a 28-day initial curing (20 ± 1 °C; 60 ± 5 % RH. The results showed that all three materials possess pozzolanic activity. However, when employed in lime mortars they did not result in formation of pozzolanic reaction products. Two methods were proposed to improve their reactivity; grinding to obtain finer particle size and removal of quartz content where necessary.DOI: http://dx.doi.org/10.5755/j01.ms.23.1.14864

  17. Bulk deposition and throughfall fluxes of elements in the Bohemian Forest (central Europe) from 1998 to 2009

    Energy Technology Data Exchange (ETDEWEB)

    Kopacek, J.; Turek, J.; Hejzlar, J.; Porcal, P. (Biology Centre AS CR, Inst. of Hydrobiology, Ceske Budejovice (Czech Republic))

    2011-07-01

    We measured element concentrations and fluxes in bulk precipitation (at two sites) and throughfall (at four sites) in Norway spruce mountain stands in the Bohemian Forest (Czech Republic) from 1998-2009, with the aim to evaluate net atmospheric inputs of nutrients to the area, and (together with previous data from 1991-1997) long-term trends in acidic deposition. The average net atmospheric inputs of nutrients were 11, 4, 9, 62, 62, 45, 26, and 0.7-1.3 mmol m-2 yr-1 for Ca2+, Mg2+, K+, NO{sub 3}{sup -}, NH{sub 4}{sup +}, total organic N, S, and total P (TP), respectively. The TP deposition was affected by a notable contribution from local dust and pollen sources. Throughfall pH increased from 3.6-3.7 in 1991-1994 to 4.7-5.0 in 2006-2009, due to average declines in the SO{sub 4}{sup 2-} plus NO{sub 3}{sup -} concentrations by 202 gammaeq l-1 and the H+ concentration by 147 gammaeq l-1. The decline in throughfall concentrations of SO{sub 4}{sup 2-} (by 184 gammaeq 1-1) was the dominant driving force for the pH increase. (orig.)

  18. Artists and Multiple Job Holding—Breadwinning Work as Mediating Between Bohemian and Entrepreneurial Identities and Behavior

    Directory of Open Access Journals (Sweden)

    Sofia Lindström

    2016-10-01

    Full Text Available Artists are known to manage low income and work insecurity by holding multiple jobs. Through an analysis of interview data, this study explores the narratives of 20 visual artists in Sweden regarding breadwinning work. Positive and negative experiences of such work are analyzed in relation to the artists’ work behavior and identity as either ‘bohemian’ or ‘entrepreneurial.’ Breadwinning work may be seen by artists as either enabling autonomy from the market or hindering the construction of a professional identity, depending on these behaviors/identities. However, conditions such as low wage, temporary contracts, and low control over work hours ultimately decides artist’s experiences of breadwinning work. This article adds to the existing knowledge on artistic labour markets by highlighting the role of multiple job holding in mediating between an understanding of the bohemian art for art’s sake artist role and the entrepreneurial role of the artist. NB: The endnotes 7 and 8 have switched places, where endnote 7 should belong to the text of endnote 8 and vice versa

  19. Cross-borehole flow analysis to characterize fracture connections in the Melechov Granite, Bohemian-Moravian Highland, Czech Republic

    Science.gov (United States)

    Paillet, Frederick L.; Williams, John H.; Urik, Joseph; Lukes, Joseph; Kobr, Miroslav; Mares, Stanislav

    2012-01-01

    Application of the cross-borehole flow method, in which short pumping cycles in one borehole are used to induce time-transient flow in another borehole, demonstrated that a simple hydraulic model can characterize the fracture connections in the bedrock mass between the two boreholes. The analysis determines the properties of fracture connections rather than those of individual fractures intersecting a single borehole; the model contains a limited number of adjustable parameters so that any correlation between measured and simulated flow test data is significant. The test was conducted in two 200-m deep boreholes spaced 21 m apart in the Melechov Granite in the Bohemian-Moravian Highland, Czech Republic. Transient flow was measured at depth stations between the identified transmissive fractures in one of the boreholes during short-term pumping and recovery periods in the other borehole. Simulated flows, based on simple model geometries, closely matched the measured flows. The relative transmissivity and storage of the inferred fracture connections were corroborated by tracer testing. The results demonstrate that it is possible to assess the properties of a fracture flow network despite being restricted to making measurements in boreholes in which a local population of discrete fractures regulates the hydraulic communication with the larger-scale aquifer system.

  20. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  1. Classification of Intrusion Detection Dataset using machine learning Approaches

    OpenAIRE

    Neethu B

    2012-01-01

    The paper describes about a method of intrusion detection that uses machine learning algorithms. Here we discuss about the combinational use of two machine learning algorithms called Principal Component Analysis and Naive Bayes classifier. The dimensionality of the dataset is reduced by using the principal component analysis and the classification of the dataset in to normal and attack classes is done by using Naïve Bayes Classifier. The experiments were conducted on the intrusion detection d...

  2. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  3. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  4. MicroBooNE: The Search For The MiniBooNE Low Energy Excess

    Science.gov (United States)

    Kaleko, David

    This thesis describes work towards the search for a low energy excess of electromagnetic events in the MicroBooNE detector. A background primer on the current state of neutrino physics is provided, including a description of the MiniBooNE detector and its published observation of an excess of electromagnetic events at low energies. A description of the MicroBooNE Liquid Argon Time Projection Chamber (LArTPC) detector is given, along with a description of the event selection and reconstruction algorithms developed to select electron neutrino charge-current interactions. A MiniBooNE-like signal is simulated in MicroBooNE with assumptions about the origin of the excess, and the sensitivity to observe such a signal above backgrounds in MicroBooNE is computed. An additional analysis is presented which constrains a dominant background in the MicroBooNE low energy excess search: the beam-intrinsic electron neutrino interactions which come from kaon decay in the beam-line. An essential step in this analysis is to reconstruct the energy of muon neutrino charge-current interactions in which the muon produced in the interaction escapes the detector. A publication detailing the algorithm which leverages the phenomenon of multiple Coulomb scattering to reconstruct the energy of escaping muons is provided as an appendix.

  5. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  6. FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    OpenAIRE

    Borgohain, Rajdeep

    2012-01-01

    With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion dete...

  7. Re-Os and Lu-Hf isotopic constraints on the formation and age of mantle pyroxenites from the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Bizimis, M.; Haluzová, Eva; Sláma, Jiří; Svojtka, Martin; Hirajima, T.; Erban, V.

    256/257, July (2016), s. 197-210 ISSN 0024-4937 Grant - others:Rada Programu interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : Bohemian Massif * Lu-Hf * mantle * pyroxenite * Re-Os Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.677, year: 2016

  8. Petrological, Geochemical and Sr–Nd–O Isotopic Constraints on the Origin of Garnet and Spinel Pyroxenites from the Moldanubian Zone of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Svojtka, Martin; Ackerman, Lukáš; Medaris Jr., G.; Hegner, E.; Valley, J. W.; Hirajima, T.; Jelínek, E.; Hrstka, Tomáš

    2016-01-01

    Roč. 57, č. 5 (2016), s. 897-920 ISSN 0022-3530 Grant - others:Rada Programu interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : garnet and spinel pyroxenites * Bohemian Massif * Sr, Nd, and oxygen isotopes * trace elements * subduction Subject RIV: DD - Geochemistry Impact factor: 3.280, year: 2016

  9. Neutron spectrometer using NE218 liquid scintillator

    International Nuclear Information System (INIS)

    Dance, J.B.; Francois, P.E.

    1976-01-01

    A neutron spectrometer has been constructed using NE218 liquid scintillator. Discrimination against electron-gamma events was obtained usng a charge-comparison pulse shape discrimination system. The resolution obtained was about 0.25 MeV F.W.H.M. at 2.0 MeV

  10. MiniBooNE overview and status

    Indian Academy of Sciences (India)

    P KAsPER (for the BooNE Collaboration). Fermilab, P.O. Box 500, Batavia, IL 60510-0500, USA. Abstract. Recent discoveries in the neutrino sector have opened a new frontier in high- energy physics and cosmology. Evidence from neutrino oscillation experiments from around the world indicate that neutrinos oscillate ...

  11. Mini Networked Screens (MiNeS)

    NARCIS (Netherlands)

    Prins, C.A.; Maris, M.; Breen, P.C.; Versteeg, N.; Terwisga, P.F. van; Ort, C.M.; Blok, J.J.

    2005-01-01

    The forward areas for an LPD in littoral waters can be full of surprises. A novel concept is presented for a networked screen consisting of elements of increasing capability to provide a progressive response to the threat. This MiNeS concept substantially improves the capability of the LPD as an

  12. The DAΦNE cryogenic system

    International Nuclear Information System (INIS)

    Modena, M.

    1997-12-01

    The DAΦNE Project utilises superconductivity technology for a total of six superconducting magnets: the two Experiment magnets (KLOE and FINUDA) and the four Compensator Solenoid magnets needed to compensate the magnetic effect of the Experiment magnets on the electron and positron beams. This effect, on beams of 510 MeV (nominal DAΦNE Energy), is expected to be relevant, especially with the aim of achieving a very high luminosity, which is the main target of the Project. The KLOE superconducting magnet has two possible working positions: the first in the DAΦNE Hall, when the Experiment will be in operation, and the second one in the KLOE Assembly Hall. This second position is the first to be utilised for the KLOE magnet Acceptance Test and magnetic field mapping, prior to the mounting of all the experimental apparatus inside the magnet. This note intends to present the DAΦNE Cryogenic System and how the authors have converged to the definition of a common Cryogenic System compatible with all the six superconducting magnets

  13. Stalled eruption or dike intrusion at Harrat Lunayyir, Saudi Arabia?

    Science.gov (United States)

    Zahran, H. M.; McCausland, W. A.; Pallister, J. S.; Lu, Z.; El-Hadidy, S.; Aburukba, A.; Schawali, J.; Kadi, K.; Youssef, A.; Ewert, J. W.; White, R. A.; Lundgren, P.; Mufti, M.; Stewart, I. C.

    2009-12-01

    Since 2007 there have been periodic small earthquake swarms recorded at seismic stations located around Harrat Lunayyir in northwest Saudi Arabia. In response to a longer-lived and larger seismic swarm, in early May 2009 the Saudi Geological Survey (SGS) installed a network of broadband seismometers surrounding the Harrat, with real-time data transmitted by VSAT back to its Earthquake and Volcano Center in Jeddah. The new network captured data from the swarm, which culminated with a M5.4 earthquake on 19 May that caused very minor structural damage in the town of Al Ays, 40 km to the southeast. Because of the strength of ground-shaking and resulting structural damage, the Saudi government evacuated more than 30,000 people from a 40 km radius surrounding Harrat Lunayyir, including the town of Al Ays. At the request of the SGS and the U.S. Consulate in Jeddah, the Volcano Disaster Assistance Program (a partnership program of the USGS and USAID’s Office of Foreign Disaster Assistance) sent two advisers to work with the SGS to determine if the unrest was volcanic in origin and to assess hazards associated with the unrest. The SGS-USGS team collected geologic, geodetic and seismic data that confirmed the volcanic nature of the activity. 1) A 3-km-long NW-trending surface rupture appeared in the central part of the Harrat before 19 May, during a time when maximum earthquake magnitudes exceeded M4. 2) The length of this rupture extended to 8 km with the M5.4 earthquake on 19 May. 3) The rupture opened 0.5 m and had an absolute motion of 0.9 m to N35W with a 63 degree plunge to the NE- a tensional offset consistent with that expected from an M5.4 earthquake in a rift-shoulder setting. 4) InSAR data showed about a meter of extension and uplift (as of July 2009) with the majority of deformation associated with the 19 May M5.4 earthquake. The InSAR-derived deformation field is best modeled by intrusion of a narrow (~2 m wide), 8-km-long dike to shallow crustal levels. 5

  14. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  15. Nivation forms and processes in unconsolidated sediments, NE Greenland

    DEFF Research Database (Denmark)

    Christiansen, Hanne Hvidtfeldt

    1998-01-01

    Nivation, Nivation Hollow, Nival Backwall Faliure, Active layer Interflow, Pronival alluvial fans, NE Greenland......Nivation, Nivation Hollow, Nival Backwall Faliure, Active layer Interflow, Pronival alluvial fans, NE Greenland...

  16. Long-lasting Cadomian magmatic activity along an active northern Gondwana margin: U-Pb zircon and Sr-Nd isotopic evidence from the Brunovistulian Domain, eastern Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Soejono, I.; Janoušek, V.; Žáčková, E.; Sláma, Jiří; Konopásek, J.; Machek, Matěj; Hanžl, P.

    2017-01-01

    Roč. 106, č. 6 (2017), s. 2109-2129 ISSN 1437-3254 Institutional support: RVO:67985530 ; RVO:67985831 Keywords : Cadomian magmatic arc * Brunovistulian Domain * Bohemian Massif * Gondwana margin * U–Pb geochronology * geochemistry Subject RIV: DB - Geology ; Mineralogy; DC - Siesmology, Volcanology, Earth Structure (GFU-E) OBOR OECD: Geology; Volcanology (GFU-E) Impact factor: 2.283, year: 2016

  17. Petrogenesis of the Cenozoic alkaline volcanic rock series of the České Středohoří Complex (Bohemian Massif), Czech Republic: A case for two lineages

    Czech Academy of Sciences Publication Activity Database

    Dostal, J.; Schellnutt, J. G.; Ulrych, Jaromír

    2017-01-01

    Roč. 317, June (2017), s. 677-706 ISSN 0002-9599 Institutional support: RVO:67985831 Keywords : Bohemian Massif * Central European volcanic province * continental alcaline volcanism * fractional crystallization * magmatic fluids Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 4.099, year: 2016

  18. Transition from island-arc to passive setting on the continental margin of Gondwana: U-Pb zircon dating of Neoproterozoic metaconglomerates from the SE margin of the Teplá-Barrandian Unit, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Sláma, Jiří; Dunkley, D. J.; Kachlík, V.; Kusiak, M. A.

    2008-01-01

    Roč. 461, 1-4 (2008), s. 44-59 ISSN 0040-1951 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Massif * Teplá–Barrandian Unit * Neoproterozoic * Armorican Terrane Assemblage * Gondwana * zircon dating Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.677, year: 2008

  19. Metamorphic history of garnet-rich gneiss at Ktiš in the Lhenice shear zone, Moldanubian Zone of the southern Bohemian Massif, inferred from inclusions and compositional zoning of garnet

    Czech Academy of Sciences Publication Activity Database

    Kobayashi, T.; Hirajima, T.; Kawakami, T.; Svojtka, Martin

    2011-01-01

    Roč. 124, 1/2 (2011), s. 46-65 ISSN 0024-4937 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Massif * Lhenice shear zone * garnet * P-T path * partial melting Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.246, year: 2011

  20. A Comment on „Two distinctive granite suites in SW Bohemian Massif and their record of emplacement: Constraints from geochemistry and Zircon 207Pb/206Pb geochronology“ by Siebel et al. Journal of Petrology 49, 1853-1872

    Czech Academy of Sciences Publication Activity Database

    Finger, F.; René, Miloš

    2009-01-01

    Roč. 50, č. 4 (2009), s. 591-593 ISSN 0022-3530 R&D Projects: GA MŠk MEB060802 Institutional research plan: CEZ:AV0Z30460519 Keywords : Bohemian Massif * Moldanubian Zone * granite Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.738, year: 2009

  1. Geochemical and petrological constraints on mantle composition of the Ohře(Eger) rift, Bohemian Massif: peridotite xenoliths from the České Středohoří Volcanic complex and northern Bohemia

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Medaris Jr., G.; Špaček, P.; Ulrych, Jaromír

    2015-01-01

    Roč. 104, č. 8 (2015), s. 1957-1979 ISSN 1437-3254 R&D Projects: GA ČR GA205/09/1170 Institutional support: RVO:67985831 Keywords : Bohemian Massif * mantle * metasomatism * Ohře(Eger) rift * xenolith Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.133, year: 2015

  2. Preliminary results of a study on the soil mesofauna in disturbed spruce forest stands near Čertovo and Plešné Lakes in the Bohemian Forest (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Čuchta, Peter; Starý, Josef

    2015-01-01

    Roč. 79, č. 3 (2015), s. 161-167 ISSN 1211-376X R&D Projects: GA ČR GAP504/12/1218 Institutional support: RVO:60077344 Keywords : windthrow * bark beetle * soil arthropods * Bohemian Forest Subject RIV: EH - Ecology, Behaviour

  3. Molybdenite-tungstenite association in the tungsten-bearing topaz greisen at Vítkov (Krkonoše-Jizera Crystalline Complex, Bohemian Massif): indication of changes in physico-chemical conditions in mineralizing system

    Czech Academy of Sciences Publication Activity Database

    Pašava, J.; Veselovský, F.; Drábek, M.; Svojtka, Martin; Pour, O.; Klomínský, J.; Škoda, R.; Ďurišová, Jana; Ackerman, Lukáš; Halodová, P.; Haluzová, Eva

    2015-01-01

    Roč. 60, č. 3 (2015), s. 149-161 ISSN 1802-6222 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : LA-ICP-MS * EMPA * molybdenite * tungstenite * transitional Mo–W and W–Mo disulfides * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.326, year: 2015

  4. “The Upper Turonian of the Bohemian Cretaceous Basin (Czech Republic) exemplified by the Úpohlavy working quarry: integrated stratigraphy and palaeoceanography of a gateway to the Tethys” [Cretaceous Research 25 (2004) 329–352] – Discussion

    Czech Academy of Sciences Publication Activity Database

    Laurin, Jiří

    2005-01-01

    Roč. 26, č. 4 (2005), s. 733-735 ISSN 0195-6671 Institutional research plan: CEZ:AV0Z30120515 Keywords : Upper Turonian * Bohemian Cretaceous Basin * stratigraphy Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.981, year: 2005

  5. Lääne-Virumaa TOP 100 aastal 2000

    Index Scriptorium Estoniae

    2001-01-01

    Lääne-Virumaa edukamad ettevõtted; Lääne-Virumaa käibe TOP 100; Käibe kasvu TOP 20; Käibe languse TOP 10; Kasumi TOP 20; Kasumi kasvu TOP 20; Rentabluse TOP 20; ROA TOP 20; Kasumi languse TOP 10; Kahjumi TOP 10; Lääne-Virumaa käibelt suuremate ettevõtete finantsandmed. Lääne-Virumaa ettevõtete üldandmed

  6. Yrast and high spin states in 22Ne

    International Nuclear Information System (INIS)

    Szanto, E.M.; Toledo, A.S. de

    1982-08-01

    High spin states in 22 Ne have been investigated by the reactions 11 B( 13 C,d) 22 Ne and 13 C( 11 B,d) 22 Ne up to E* approximately=19 MeV. Yrast states were observed at 11.02 MeV (8 + ) and 15.46 MeV (10 + ) excitation energy. A backbending in 22 Ne is observed around spin 8 + . The location of high spin states I [pt

  7. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  8. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  9. Seismic signature of active intrusions in mountain chains.

    Science.gov (United States)

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  10. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  11. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  12. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  13. Recovery of freshwater marsh vegetation after a saltwater intrusion event.

    Science.gov (United States)

    Flynn, K M; McKee, K L; Mendelssohn, I A

    1995-07-01

    Greenhouse mesocosms of freshwater marsh vegetation were exposed to a simulated saltwater intrusion event followed by a recovery period during which water levels and interstitial water salinity were adjusted over a range of conditions. Virtually all above-ground vegetation, including the three dominant species, Sagittaria lancifolia L., Leersia oryzoides (L.) Swartz, and Panicum hemitomon Schultes, was killed by the initial saltwater intrusion event. P. hemitomon did not recover, but S. lancifolia and L. oryzoides, as well as many of the other species initially present, exhibited some ability to recover depending on post-saltwater intrusion conditions. Increasingly harsh recovery conditions (for freshwater marsh vegetation), including more reduced soil conditions, higher interstitial salinities, and higher interstitial sulfide concentrations were associated with decreased live above-ground biomass and species richness. The effect of elevated salinity on vegetative recovery became more pronounced under flooded conditions. This experiment illustrates that the response of a freshwater marsh community to the long-term disturbance effect of a transient saltwater intrusion event will be strongly influenced by post-intrusion salinity and water levels.

  14. Latest Cambrian-Early Ordovician rift-related magmatic activity in the Kouřim Unit, Bohemian Massif

    Science.gov (United States)

    Soejono, Igor; Machek, Matej; Sláma, Jiří; Janoušek, Vojtěch

    2017-04-01

    Pre-collisional history of high-grade Variscan complexes is mostly difficult to reveal, due to intense reworking during the development of the orogenic belt. An ancient magmatism could provide a unique possibility to study it. The Kouřim Unit represents an extensive pre-Variscan plutonic body involved into the tectonic collage of the Kutná Hora Crystalline Complex, at the northern margin of the Moldanubian Domain in the Bohemian Massif. The LA-ICP-MS zircon ages and geochemical characteristics of (meta-)igneous rocks from the Kouřim Unit allow us to determine the timing and nature of magmatic activity within this part of the Bohemian Massif and thus to decipher its pre-Variscan evolution. The Kouřim Unit is composed of strongly metamorphosed and deformed sequence of magmatic rocks, dominated mainly by various types of migmatites, coarse-grained orthogneisses and minor metadiorites. The newly obtained LA-ICP-MS U-Pb zircon ages of four orthogneisses ranging between 486 ± 2 Ma and 484 ± 2 Ma are interpreted as timing the magma crystallization. The single metadiorite gave concordia age of 337 ± 2 Ma interpreted as the age of migmatitization. Few discordant older ages from metadiorite are considered as older xenocrysts more or less reset during the Variscan metamorphism. The orthogneisses are acid (SiO2 = 68.6-76.4 wt. %), exclusively subaluminous and seem to form a single calc-alkaline trend, whereas the metadiorite is intermediate (SiO2 = 54.3 wt. %; mg# = 61), distinctly metaluminous and displays tholeiitic character. The chondrite-normalized REE patterns for the orthogneisses show LREE enrichment (LaN/YbN = 1.5-8.9) and deep negative Eu anomalies (Eu/Eu* = 0.42-0.32); the NMORB-normalized spiderplots feature LILE/HFSE enrichment with deep negative Nb- Ta-Ti anomalies. In contrast, both patterns of metadiorite resemble those of NMORB (LaN/YbN = 0.5, Eu/Eu* = 0.96). The apparent magmatic arc-like geochemical signature of the orthogneisses is interpreted as

  15. Country, cover or protection: what shapes the distribution of red deer and roe deer in the Bohemian Forest Ecosystem?

    Science.gov (United States)

    Heurich, Marco; Brand, Tom T G; Kaandorp, Manon Y; Šustr, Pavel; Müller, Jörg; Reineking, Björn

    2015-01-01

    The Bohemian Forest Ecosystem encompasses various wildlife management systems. Two large, contiguous national parks (one in Germany and one in the Czech Republic) form the centre of the area, are surrounded by private hunting grounds, and hunting regulations in each country differ. Here we aimed at unravelling the influence of management-related and environmental factors on the distribution of red deer (Cervus elaphus) and roe deer (Capreolus capreolus) in this ecosystem. We used the standing crop method based on counts of pellet groups, with point counts every 100 m along 218 randomly distributed transects. Our analysis, which accounted for overdispersion as well as zero inflation and spatial autocorrelation, corroborated the view that both human management and the physical and biological environment drive ungulate distribution in mountainous areas in Central Europe. In contrast to our expectations, protection by national parks was the least important variable for red deer and the third important out of four variables for roe deer; protection negatively influenced roe deer distribution in both parks and positively influenced red deer distribution in Germany. Country was the most influential variable for both red and roe deer, with higher counts of pellet groups in the Czech Republic than in Germany. Elevation, which indicates increasing environmental harshness, was the second most important variable for both species. Forest cover was the least important variable for roe deer and the third important variable for red deer; the relationship for roe deer was positive and linear, and optimal forest cover for red deer was about 70% within a 500 m radius. Our results have direct implications for the future conservation management of deer in protected areas in Central Europe and show in particular that large non-intervention zones may not cause agglomerations of deer that could lead to conflicts along the border of protected, mountainous areas.

  16. Country, cover or protection: what shapes the distribution of red deer and roe deer in the Bohemian Forest Ecosystem?

    Directory of Open Access Journals (Sweden)

    Marco Heurich

    Full Text Available The Bohemian Forest Ecosystem encompasses various wildlife management systems. Two large, contiguous national parks (one in Germany and one in the Czech Republic form the centre of the area, are surrounded by private hunting grounds, and hunting regulations in each country differ. Here we aimed at unravelling the influence of management-related and environmental factors on the distribution of red deer (Cervus elaphus and roe deer (Capreolus capreolus in this ecosystem. We used the standing crop method based on counts of pellet groups, with point counts every 100 m along 218 randomly distributed transects. Our analysis, which accounted for overdispersion as well as zero inflation and spatial autocorrelation, corroborated the view that both human management and the physical and biological environment drive ungulate distribution in mountainous areas in Central Europe. In contrast to our expectations, protection by national parks was the least important variable for red deer and the third important out of four variables for roe deer; protection negatively influenced roe deer distribution in both parks and positively influenced red deer distribution in Germany. Country was the most influential variable for both red and roe deer, with higher counts of pellet groups in the Czech Republic than in Germany. Elevation, which indicates increasing environmental harshness, was the second most important variable for both species. Forest cover was the least important variable for roe deer and the third important variable for red deer; the relationship for roe deer was positive and linear, and optimal forest cover for red deer was about 70% within a 500 m radius. Our results have direct implications for the future conservation management of deer in protected areas in Central Europe and show in particular that large non-intervention zones may not cause agglomerations of deer that could lead to conflicts along the border of protected, mountainous areas.

  17. Uraninite, Coffinite and Brannerite from Shear-Zone Hosted Uranium Deposits of the Bohemian Massif (Central European Variscan Belt

    Directory of Open Access Journals (Sweden)

    Miloš René

    2017-03-01

    Full Text Available New mineralogical data are presented for shear-zone hosted uranium mineralisation from selected uranium deposits that occur in the Bohemian Massif. The uranium mineralisation is in high-grade metamorphic rocks of the Moldanubian Zone and/or in granitic rocks of the Moldanubian batholith and Bor pluton as complex uraninite–coffinite and uraninite–coffinite–brannerite assemblages. For analysed coffinites and brannerites, anomalous enrichment of Y (up to 3.4 wt % Y2O3 and Zr (up to 13.8 wt % ZrO2 is significant. The microprobe data indicate that coffinites from the Rožná and Okrouhlá Radouň uranium deposits contain variable PbO (0–4.3 wt %, FeO (0–2.5 wt %, Al2O3 (0–3.5 wt %, P2O5 (0–1.8 wt %, and CaO (0.7–3.5 wt %. Brannerite is present in unaltered and altered grains with variable concentrations of U4+ (0–0.5 apfu, U6+ (0.06–0.49 apfu, Ti (0.90–2.63 apfu, Ca (0.09–0.41 apfu, and low concentrations of Al (0–0.19 apfu, Th (0–0.04 apfu, Y (0–0.08 apfu, Zr (0–0.13 apfu and REE (0–0.14 apfu.

  18. The Chaîne des Puys: how complicated can monogentic get?

    Science.gov (United States)

    Van Wyk de Vries, B.; Grosse, P.; Marquez, A.; Petronis, M. S.; Kervyn, M.; Delcamp, A.; Mossoux, S.; Troll, V. R.

    2012-12-01

    The Chaîne des Puys (Massif Centrale of France) is part of a prospective volcano-tectonic UNESCO World Heritage site including the Limagne Rift fault (http://www.chainedespuys-failledelimagne.com/). The strategy is to present the monogentic field that is as representative of other such fields, but which itself is uniquely special. Effectively, the Chaîne des Puys would become a sort of ambassador for monogentic volcanism, raising the profile of all other sites. Here, I want to go through some recent work on the chain, looking at morphology, morphometry, structure, lithology and petrology and show some of the intriguing complexities of this classic highly variable monogentic alignment. Also, I want to build on the historical development of ideas that can be traced back to characters such as Montlosier, Humphrey Davey, Faraday, Lyell, and Von Humbolt... and many more. I focus, first, on the central the Puy de Dôme. This classic trachyte dome has been known for some time to be the product of two eruptions, and recently we have found that it is related to a number of cryptodome intrusions that have created flanking bulges, fed at least two major explosive eruptions, and extensively modified the topography of the field. Strangely, Von Humbolt's concept of 'craters of elevation' rises up in a reanalysis of these structures. Secondly, I visit Lemptégy (www.auvergne-volcan.com/), that in 1857, Scrope called 'an insignificant cone grazed by sheep', but now quarried out and showing the internal structure expected for the Puy de Dôme bulges, as well as illustrating that a seemingly simple scoria cone plumbing can be infernally complicated. Thirdly, I consider the Beaunit, a bucolic village in a maar, where the process of crustal ingestion suggests an intimate relationship between eruptive dynamics and assimilation. With these three examples I show some of the complications and interactions of monogentic basaltic to trachytic volcanism typified by the Chaîne des Puys.

  19. Distress and Recurrence of Intrusive Thoughts in Younger and Older Adults

    Science.gov (United States)

    Magee, Joshua C.; Teachman, Bethany A.

    2011-01-01

    The current study incorporated a lifespan perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults, despite not differing in the actual recurrence of the intrusive thought. With regard to distress, ooHAcrosslder adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts. PMID:21707184

  20. Distress and recurrence of intrusive thoughts in younger and older adults.

    Science.gov (United States)

    Magee, Joshua C; Teachman, Bethany A

    2012-03-01

    The current study incorporated a life span perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and they also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults despite the fact that they did not differ in the actual recurrence of the intrusive thought. With regard to distress, older adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but they were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts.

  1. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  2. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  3. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been...... developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...

  4. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  5. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  7. Intrusive upwelling in the Central Great Barrier Reef

    Science.gov (United States)

    Benthuysen, Jessica A.; Tonin, Hemerson; Brinkman, Richard; Herzfeld, Michael; Steinberg, Craig

    2016-11-01

    In the Central Great Barrier Reef, the outer continental shelf has an open reef matrix that facilitates the exchange of waters with the Coral Sea. During austral summer, cool water intrudes onto the shelf along the seafloor. Temperature observations reveal cool, bottom intrusions during a 6 year period from the Queensland Integrated Marine Observing System's Palm Passage mooring. A metric is used to identify 64 intrusion events. These intrusions predominantly occur from October to March including the wet season. During an event, the outer-shelf's near-bottom temperature decreases by 1-3°C typically over 1 week. The near-bottom salinity tends to increase, while near-surface changes do not reflect these tendencies. Intrusion events occur predominantly with either weakening equatorward winds or poleward wind bursts. A regional hydrodynamic model for the Great Barrier Reef captures the timing and amplitude of these intrusions. During intrusion events, isotherms tend to uplift over the continental slope and onto the shelf and the East Australian Current intensifies poleward. Over the shelf, a bottom-intensified onshore current coincides with bottom cooling. For numerous events, the model diagnostics reveal that the cross-shelf flow is dominated by the geostrophic contribution. A vertical circulation tilts the isopycnals upward on the southern side of the passage, causing an along-shelf density gradient and geostrophic onshore flow with depth. While wind fluctuations play a major role in controlling the along-shelf currents, model results indicate that a concurrent topographically induced circulation can assist the onshore spread of cool water.

  8. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Status of KM3NeT

    Directory of Open Access Journals (Sweden)

    Riccobene G.

    2016-01-01

    Full Text Available The recent observation of cosmic neutrinos by IceCube has pushed the quest towards the identification of cosmic sources of high-energy particles. The KM3NeT Collaboration is now ready to launch the massive construction of detection units to be installed in deep sea to build a km-cubic size neutrino telescope. The main elements of the detector, the status of the project and the expected perfomances are briefly reported.

  10. An Approach for Cross-Domain Intrusion Detection

    Science.gov (United States)

    2012-01-01

    supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view and manipulate network trace data...multilevel (trusted) components, supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view...component is implemented by the open source object-relational database system PostgreSQL 0). 4.4.3 Intrusion analysis engine The intrusion analysis

  11. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  12. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  13. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  14. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  15. Performance Analysis of Different NeQuick Ionospheric Model Parameters

    Directory of Open Access Journals (Sweden)

    WANG Ningbo

    2017-04-01

    Full Text Available Galileo adopts NeQuick model for single-frequency ionospheric delay corrections. For the standard operation of Galileo, NeQuick model is driven by the effective ionization level parameter Az instead of the solar activity level index, and the three broadcast ionospheric coefficients are determined by a second-polynomial through fitting the Az values estimated from globally distributed Galileo Sensor Stations (GSS. In this study, the processing strategies for the estimation of NeQuick ionospheric coefficients are discussed and the characteristics of the NeQuick coefficients are also analyzed. The accuracy of Global Position System (GPS broadcast Klobuchar, original NeQuick2 and fitted NeQuickC as well as Galileo broadcast NeQuickG models is evaluated over the continental and oceanic regions, respectively, in comparison with the ionospheric total electron content (TEC provided by global ionospheric maps (GIM, GPS test stations and JASON-2 altimeter. The results show that NeQuickG can mitigate ionospheric delay by 54.2%~65.8% on a global scale, and NeQuickC can correct for 71.1%~74.2% of the ionospheric delay. NeQuick2 performs at the same level with NeQuickG, which is a bit better than that of GPS broadcast Klobuchar model.

  16. Geochronology, geochemistry and Sr-Nd-Pb-Hf isotopes of the Early Jurassic granodiorite from the Sankuanggou intrusion, Heilongjiang Province, Northeastern China: Petrogenesis and geodynamic implications

    Science.gov (United States)

    Deng, Ke; Li, Qiugen; Chen, Yanjing; Zhang, Cheng; Zhu, Xuefeng; Xu, Qiangwei

    2018-01-01

    Mesozoic granitoid rocks represent a volumetrically component of the Northeastern (NE) China and preserve useful information about the tectonomagmatic history of this region. The Sankuanggou intrusion associated with skarn Fe-Cu deposit in the Duobaoshan ore field within NE China primarily consists of granodiorite with minor alkali-feldspar granite and diorite, which intrudes the Ordovician Duobaoshan Formation in the region. Zircon LA-ICP-MS U-Pb geochronology and whole-rock geochemistry, and Sr-Nd-Pb-Hf isotope analysis were performed on the Sankuanggou intrusion to investigate the petrogenesis and geodynamic implications. Zircon U-Pb dating of magmatic zircons from the granodiorite rock suggests that the intrusion was emplaced in the Early Jurassic (177 ± 1 Ma). Geochemically, it belongs to the metaluminous to slightly peraluminous high-K calc-alkaline I-type granitoids with a narrow range of SiO2 concentration (65.73-67.33 wt.%), high Ba, Sr, LREE and LILE contents and low abundance of Rb, Y, HREE and HFSE. All of these studied samples have homogeneous initial isotope traits with (87Sr/86Sr)i ranging from 0.70415 to 0.70423, εNd(t) of + 3.6 to + 4.0, (206Pb/204Pb)i = 17.933-18.458, (207Pb/204Pb)i = 15.520-15.587 and (208Pb/204Pb)i = 37.523-38.087, and zircon εHf(t) values varying from + 4.8 to + 9.9. These results, combined with the previous data, demonstrate that the Sankuanggou granitoids were formed by partial melting of the pre-existing juvenile crust in an extensional regime related to the post-collisional setting following the closure of the CAOB rather than previously proposed continental arc setting related to Paleo-Pacific or the Mongol-Okhotsk subduction, although their potential influence should not be dismissed.

  17. Sterile Neutrino Searches in MiniBooNE and MicroBooNE

    Energy Technology Data Exchange (ETDEWEB)

    Ignarra, Christina M. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    2014-09-01

    Tension among recent short baseline neutrino experiments has pointed toward the possible need for the addition of one or more sterile (non-interacting) neutrino states into the existing neutrino oscillation framework. This thesis first presents the motivation for sterile neutrino models by describing the short-baseline anomalies that can be addressed with them. This is followed by a discussion of the phenomenology of these models. The MiniBooNE experiment and results are then described in detail, particularly the most recent antineutrino analysis. This will be followed by a discussion of global fits to world data, including the anomalous data sets. Lastly, future experiments will be addressed, especially focusing on the MicroBooNE experiment and light collection studies. In particular, understanding the degradation source of TPB, designing the TPB-coated plates for MicroBooNE and developing lightguide collection systems will be discussed. We find an excess of events in the MiniBooNE antineutrino mode results consistent with the LSND anomaly, but one that has a different energy dependence than the low-energy excess reported in neutrino mode. This disagreement creates tension within global fits which include up to three sterile neutrinos. The low-energy excess will be addressed by the MicroBooNE experiment, which is expected to start taking data in early 2015. Tension among existing experiments calls for additional, more decisive future experiments.

  18. Sterile Neutrino Searches in MiniBooNE and MicroBooNE

    Energy Technology Data Exchange (ETDEWEB)

    Ignarra, Christina M. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    2014-09-01

    Tension among recent short baseline neutrino experiments has pointed toward the possible need for the addition of one or more sterile (non-interacting) neutrino states into the existing neutrino oscillation framework. This thesis fi rst presents the motivation for sterile neutrino models by describing the short-baseline anomalies that can be addressed with them. This is followed by a discussion of the phenomenology of these models. The MiniBooNE experiment and results are then described in detail, particularly the most recent antineutrino analysis. This will be followed by a discussion of global fits to world data, including the anomalous data sets. Lastly, future experiments will be addressed, especially focusing on the MicroBooNE experiment and light collection studies. In particular, understanding the degradation source of TPB, designing the TPB-coated plates for MicroBooNE and developing lightguide collection systems will be discussed. We find an excess of events in the MiniBooNE antineutrino mode results consistent with the LSND anomaly, but one that has a di fferent energy dependence than the low-energy excess reported in neutrino mode. This disagreement creates tension within global fi ts which include up to three sterile neutrinos. The low-energy excess will be addressed by the MicroBooNE experiment, which is expected to start taking data in early 2015. Tension among existing experiments calls for additional, more decisive future experiments.

  19. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  20. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  1. Geophysical study of saline water intrusion in Lagos municipality

    African Journals Online (AJOL)

    aghomotsegin

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  2. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  3. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    1. Introduction. Seawater intrusion constitutes a prominent hydro- logical problem in many coastal areas of the world. It is generally defined as the encroachment of saline water into fresh groundwater domains in coastal aquifer settings (Werner and Simmons 2008). This phenomenon will occur when the natural equilib-.

  4. Intrusive Thoughts: A Primary Variable in Breakup Distress

    Science.gov (United States)

    Field, Tiffany; Diego, Miguel; Pelaez, Martha; Deeds, Osvelia; Delgado, Jeannette

    2013-01-01

    University students who were high versus low on breakup distress scores were given self-report measures to assess their intrusive thoughts about the romantic breakup and their somatic symptoms that followed the breakup as well as their extracurricular activities and social support that might alleviate their breakup distress. In a regression…

  5. Depressed mood mediates the relationship between rumination and intrusions

    NARCIS (Netherlands)

    Smets, Jorien; Luyckx, Koen; Wessel, Ineke; Raes, Filip

    2012-01-01

    Research suggests that rumination is a causal factor for intrusive memories. These are disturbing autobiographical memories that pop into one's mind involuntarily, spontaneously, and repetitively. A three-wave longitudinal study was conducted to replicate this finding and to test whether one route

  6. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the

  7. Fast Content-Based Packet Handling for Intrusion Detection

    National Research Council Canada - National Science Library

    Fisk, Mike

    2001-01-01

    ... use of Royer-Moore currently used in the popular intrusion detection platform Snort. We then measure the actual performance of several search algorithms on actual packet traces and rulesets. Our results provide lessons on the structuring of content-based handlers.

  8. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  9. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... A multisensor-based IDS enables identification of the intrusion patterns semantically by correlating the events and context information provided by multiple sensors. ... R Bhargavi1 V Vaidehi1. Department of Information Technology, Madras Institute of Technology, Anna University, Chennai 600 044, India ...

  10. A bagging approach to network intrusion detection | Adetunmbi ...

    African Journals Online (AJOL)

    The presences of these flaws make a secured system a mirage for now, hence the need for intrusion detection system. In this paper, an ensemble approach – Bagging was used on five different machine learning techniques to improve accuracy of classifiers. Machine learning seeks for methods of extracting hidden pattern ...

  11. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    user

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and. February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  12. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  13. Attenuating fearful memories: effect of cued extinction on intrusions.

    Science.gov (United States)

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  14. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  15. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  16. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  17. Saltwater Intrusion Simulation in Heterogeneous Aquifer Using Lattice Boltzmann Method

    Science.gov (United States)

    Servan-Camas, B.; Tsai, F. T.

    2006-12-01

    This study develops a saltwater intrusion simulation model using a lattice Boltzmann method (LBM) in a two- dimensional coastal confined aquifer. The saltwater intrusion phenomenon is described by density-varied groundwater flow and mass transport equations, where a freshwater-saltwater mixing zone is considered. Although primarily developed using the mesoscopic approach to solve macroscopic fluid dynamic problems (e.g. Navier-Stoke equation), LBM is able to be adopted to solve physical-based diffusion-type governing equations as for the groundwater flow and mass transport equations. The challenge of using LBM in saltwater intrusion modeling is to recover hydraulic conductivity heterogeneity. In this study, the Darcy equation and the advection-dispersion equation (ADE) are recovered in the lattice Boltzmann modeling. Specifically, the hydraulic conductivity heterogeneity is represented by the speed of sound in LBM. Under the consideration on the steady-state groundwater flow due to low storativity, in each time step the flow problem is modified to be a Poisson equation and solved by LBM. Nevertheless, the groundwater flow is still a time-marching problem with spatial-temporal variation in salinity concentration as well as density. The Henry problem is used to compare the LBM results against the Henry analytic solution and SUTRA result. Also, we show that LBM is capable of handling the Dirichlet, Neumann, and Cauchy concentration boundary conditions at the sea side. Finally, we compare the saltwater intrusion results using LBM in the Henry problem when heterogeneous hydraulic conductivity is considered.

  18. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  19. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    The abandonment of shallow boreholes is presumed to have been caused by saltwater intrusion from the ocean. ... The evidence revealed by the 2D electrical resistivity tomography investigation combined with geochemistry of groundwater from literature suggested that abandonment of shallow boreholes are probably not ...

  20. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal aquifers is generally three dimensional. (3-D) in nature. In the literature, there is a general lack ...

  1. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  2. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  3. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  4. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, R.; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  5. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  6. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  7. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    1Department of Civil Engineering, Regional Engineering College, Durgapur. 713 209, India. 2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal ...

  8. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  9. Intrusion detection for the solution of security problems

    International Nuclear Information System (INIS)

    Buchmueller, R.

    1982-01-01

    Constantly growing security problems in public as well as private sectors can no longer be solved without the use of modern intrusion detection systems. BBC, as general contractor, offers the system solutions to fully meet these problems. These solutions include analysis of the site to be protected, installation, commissioning and maintenance of the security system. (orig.) [de

  10. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 120; Issue 2. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh ... Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing.

  11. Groundwater quality degradation due to salt water intrusion in ...

    African Journals Online (AJOL)

    Saltwater intrusion problems are widespread where there are over pumping of groundwater from coastal aquifers. Water samples were collected from production boreholes in Zanzibar municipality and analyzed for salinity indication parameters comprising of chloride, electrical conductivity, total dissolved salts and ...

  12. Brief exercise enhances intrusive memories of traumatic stimuli.

    Science.gov (United States)

    Keyan, Dharani; Bryant, Richard A

    2017-05-01

    Brief physical exercise enhances memories for neutral events, and recently has been shown to modulate fear learning in animals. To date there is no evidence pertaining to the impact of exercise on emotional memories in humans. Accordingly, this study investigated the role of brief exercise in the development of emotional intrusive memories. Forty-nine university students (18-29year olds) viewed a car accident film depicting accident and injury, and were then randomly assigned to engage in either 10min of intense exercise or easy walking. Two days following the experiment participants were assessed for both intrusive memories of the film and intentional recall of film details. Results indicated that participants in the exercise relative to the walking condition reported more intrusive memories, but not voluntarily recalled memories, of the car accident film two days later. These findings are consistent with recent evidence of exercise-induced emotional learning in animals, and point to the potential for physical activity to contribute to the development of intrusions in the context of encoding emotionally-laden information. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  14. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  15. Geophysical study of saline water intrusion in Lagos municipality ...

    African Journals Online (AJOL)

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  16. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from ...

  17. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Science.gov (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  18. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    (Chattopadhyay and Hashmi 1984; Maitra 1992;. Srivastava et al 2005; Srivastava ... Keywords. Melanite garnet; nepheline syenite minor intrusion; Mesozoic magmatism; Mawpyut complex; Meghalaya plateau. J. Earth Syst. Sci. 120, No. 6, December 2011, pp. ... dated 110–120 Ma (Coffin et al 2002; Srivastava et al 2005).

  19. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  20. Microstructure in hardened cement pastes measured by mercury intrusion porosimetry and low temperature microcalorimetry

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Baroghel, V.B.; Künzel, H.M.

    1996-01-01

    , image analysis, mercury intrusion porosimetry and low temperature microcalorimetry.The present paper is dealing with cumulated pore size distributions measured by mercury intrusion porosimetry (MIP) from two laboratories (LCPC, IBP) and low temperature microcalorimetry (CAL) from one laboratory (BKM...

  1. Why do close partners snoop? Predictors of intrusive behavior in newlywed couples

    NARCIS (Netherlands)

    Vinkers, C. D. W.; Finkenauer, C.; Hawk, S. T.

    2011-01-01

    Existing research shows that intrusive behavior has detrimental consequences for relationships. Surprisingly, little is known about why close relationship partners snoop. This study examined why romantic partners engage in intrusive behavior among newlywed couples in the Netherlands. As predicted,

  2. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  3. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    Science.gov (United States)

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  4. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  5. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  6. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  7. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  8. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    Science.gov (United States)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  9. A new physical barrier system for seawater intrusion control

    Science.gov (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  10. Detection of stratospheric ozone intrusions by windprofiler radars.

    Science.gov (United States)

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-08

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport.

  11. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Individual protection standard for human intrusion. 63.321... Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE must determine the earliest time after disposal that the waste package would degrade sufficiently that a human...

  12. X-ray Ne/O Ratio in Cataclysmic Variables

    Science.gov (United States)

    Schlegel, Eric M.; Rana, V.; Singh, K.; Girish, V.; Barrett, P.

    2006-12-01

    The Ne/O ratio has recently become a topic of considerable debate given the difficulties and discrepancies in recent measures of the Ne abundance in the Sun. We describe the results of an analysis of the permitted branches of the X-ray triplet transitions of Ne and O using the available spectra from the Chandra X-ray Observatory's High Energy Transmission Grating observations of cataclysmic variables. We compare our results with those obtained from the Sun and nearby stars.

  13. The hyperfine field on 19Ne in Fe

    International Nuclear Information System (INIS)

    Ekwall, B.; Johansson, K.; Lidbjoerk, P.; Lindgren, B.; Bedi, S.

    1984-04-01

    The hyperfine field on 19 Ne in iron was measured with the TDPAD method. At 77 K the 19 Ne hyperfine field in iron was found to be -4.48(7) T. The temperature dependence of the hyperfine field in iron was studied between 77 K and 650 K. It was not possible to observe any hyperfine field on 19 Ne in nickel, using the same method. (author)

  14. L'hydrogène Hydrogen

    Directory of Open Access Journals (Sweden)

    Balaceanu J. C.

    2006-11-01

    Full Text Available La crise pétrolière et le bouleversement du classement économique des énergies primaires qu'elle entraîne conjuguent leurs effets avec ceux d'une sensibilisation de l'opinion au respect de l'environnement pour favoriser l'avènement industriel d'innovations scientifiques et techniques dont l'intervention n'était prévisible que dans un avenir de plusieurs décennies. Le développement de l'énergie électrique nucléaire, qui actuellement s'impose économiquement, implique, pour élargir la pénétration de cette forme d'énergie à toutes les utilisations, une énergie chimique relais permettant un stockage et une régulation de la production; l'hydro- gène obtenu par électrolyse de l'eau semble pouvoir constituer ce combustible relais dans un délai raisonnable en tenant compte des contraintes de pollution. La chaleur nucléaire soulève a fortiori des problèmes identiques, elle peut théoriquement par dissociation thermique étagée de l'eau liquide fournir de l'hydrogène avec des rendements très satisfaisants, mais les problèmes de principe et de technologie posés par la mise en opération d'une suite de transformations chimiques et de séparations impliquant des composés particulièrement réactifs sont ardus et leur inventaire même n'est pas achevé. L'hydrogène, nouveau combustible polyvalent d'une industrie gazière perpétuelle, semble pouvoir bénéficier également, au niveau de son utilisation disséminée, de techniques nouvelles : stockages solides, turbines à hauts rendements, piles à combustible, qui ouvrent le marché de la traction et le marché électrique des installations isolées. Agent de réduction réactif et puissant, l'hydrogène peut également se substituer aux réducteurs conventionnels en métallurgie et donner une dimension nouvelle à l'hydrogénométallurgie par voie sèche ou par voie humide. Mais plus encore la mise en valeur économique des combustibles fossiles abondants . charbon, schistes

  15. Irène Jacob visits CERN

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    French actress Irène Jacob, the daughter of physicist Maurice Jacob, visited the ATLAS and CMS control rooms on Monday 17 May together with Italian theatre actor-director Pippo Delbono, in search of inspiration for a short film. The film will be screened at the “nuit des particules” event accompanying this year’s ICHEP.   Pippo Delbono et Irène Jacob discussing their project. “La nuit des particules” (night of the particles) is an event open to the general public that is being organised for the evening of Tuesday, 27 July, to accompany the 35th International Conference on High Energy Physics (ICHEP). ICHEP is a major highlight in every physicist’s calendar, and this year’s edition is being held in Paris from 22 to 28 July. The short film will be screened during the evening, which will include a lecture and a show at the legendary Parisian cinema Le Grand Rex, with a colossal seating capacity of 2 700 spe...

  16. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  17. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  18. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  19. Development of the body size in stallions of selected Bohemian-Moravian Belgian horse, Silesian Noriker and Noriker breeds in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Jan NAVRÁTIL

    2016-06-01

    Full Text Available The aim of this work was to evaluate the basic body measurements (stick height at withers - KVH, tape height at withers - KVP, chest perimeter - OHR, shin perimeter - OHOL from data available from the 40th years of the 20th century in the Bohemian-Moravian Belgian horse, Silesian Noriker and Noriker breeds. The evaluation included a total of 1,080 stallions aged 2-3 years, used in mating and breeding. Processing and evaluation of a data set was done using Microsoft Office Excel and the statistical program SAS 9.3. Numerous statistically significant differences were found among the evaluated breeds (P < 0.05 to 0.01. The highest values of KVH, KVP and OHR were achieved by stallions of Bohemian-Moravian Belgian horse. The increase of the basic dimensions from 40´s years to 70´s – 90´s years was found during a detailed evaluation focusing on decade of stallions’ birth year. After year 2000, there was a dramatic +drop in the values of the fundamental physical dimensions. Statistically significant differences (P < 0.05 to 0.01 were evaluated primarily between stallions born in the 70´s years, and most other decades. A declining tendency in all assessed dimensions was observed during evaluation of the race and decade interaction effect mainly for the Czech-Moravian Belgian horse stallions born from 70´s, respectively 80´s. Apparent downward trend between the 90´s and stallions born after year 2000 was detected especially for stallions of Silesian Noriker breed. Decline of body size parameters was not observed for stallions of Noriker breed. The more likely slightly increased tendencies for KVH, KVP, OHR and OHOL were determined in Noriker stallions.

  20. Lääne-Viru metskonnad osalevad pilootprojektis / Eva Klaas

    Index Scriptorium Estoniae

    Klaas, Eva, 1977-

    2008-01-01

    Riigimetsa majandamise keskuse Kirde regioonis alustati pilootprojektiga, mis seitsme metskonna territooriumil lahutab metsakasutuse ja -kasvatuse. Projektis osalevad Lääne-Virumaalt Triigi, Tudu ja Paasvere metskond

  1. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  2. Repeated cortisol administration does not reduce intrusive memories - A double blind placebo controlled experimental study.

    Science.gov (United States)

    Graebener, Alexandra Heike; Michael, Tanja; Holz, Elena; Lass-Hennemann, Johanna

    2017-11-01

    PTSD is a severe mental disorder, which may develop after exposure to traumatic events and is characterized by intrusive memories. Intrusions are sudden brief sensory memories of the traumatic event, that cause immense distress and impairment in every day functioning. Thus, the reduction of intrusive memories is one of the main aims of PTSD therapy. Recently, the glucocorticoid cortisol has been proposed as a pharmacological option to reduce intrusive memories, because cortisol is known to have memory retrieval inhibiting effects. However, the research on the effects of cortisol administration on intrusive memories is not conclusive. The aim of the present study was to examine if repeated cortisol administration inhibits intrusions and recognition memory in an experimental study using the trauma film paradigm. In a randomized double-blind placebo controlled design participants were exposed to a traumatic film (known to induce intrusions in healthy participants) and received either a low dose of cortisol (20mg) or placebo on the three days following "trauma exposure". Intrusive memories were assessed with an Electronic Diary and an Intrusion Triggering Task. Furthermore, we assessed explicit memory for the traumatic film clip with a recognition test. Contrary to our predictions, the cortisol group did not report fewer intrusions than the placebo group nor did it show diminished performance on the recognition test. Our results show that sole cortisol administration after a traumatic experience cannot reduce intrusive re-experiencing. Copyright © 2017 Elsevier B.V. and ECNP. All rights reserved.

  3. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  4. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  5. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  6. Non-intrusive Load Disaggregation Based on Kernel Density Estimation

    Science.gov (United States)

    Sen, Wang; Dongsheng, Yang; Chuchen, Guo; Shengxian, Du

    2017-05-01

    Aiming at the problem of high cost and difficult implementation of high frequency non-intrusive load decomposition method, this paper proposes a new method based on kernel density estimation(KDE) for low frequency NILM (Non-intrusive load monitoring). The method establishes power reference model of electricity load in different working conditions and appliance’s possible combinations first, then probability distribution is calculated as appliances features by kernel density estimation. After that, target power data is divided by step changes, whose distributions will be compared with reference models, and the most similar reference model will be chosen as the decomposed consequence. The proposed approach was tested with data from the GREEND public data set, it showed better performance in terms of energy disaggregation accuracy compared with many traditional NILM approaches. Our results show good performance which can achieve more than 93% accuracy in simulation.

  7. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  8. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  9. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  10. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  11. An artificial bioindicator system for network intrusion detection.

    Science.gov (United States)

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  12. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  13. Men’s stranger intrusions : rethinking street harassment.

    OpenAIRE

    Vera-Gray, F.

    2016-01-01

    Women's experiences of intrusive men in public space, popularly termed ‘street harassment’, are the most understudied yet commonly experienced forms of violence against women. Despite acknowledgement of its importance, an explicit debate on naming – with an exploration of how language creates both openings and restrictions of what can be said – is yet to be had in the literature. This paper begins this conversation, detailing the benefits and challenges in current terminology, and exploring t...

  14. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  15. Research on chronicles correlation based network intrusion detection techniques

    International Nuclear Information System (INIS)

    Han Zhengping; Jin Yan; Chen Taiwei; Xu Rongsheng

    2007-01-01

    According to some problems existed in network intrusion detection technique, such as alerts overwhelming, false-positives and lack of alert description, this paper introduces chronicle correlation method to alert events analysis by some correlative examples. With designed chronicle recognition language, portscan's alerts can be reduced, false-positives in buffer overflow's alerts can be detected, and NetBios DCERPC attack's alerts semantics can be improved. (authors)

  16. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  17. Animal intrusion status report for fiscal year 1989

    Energy Technology Data Exchange (ETDEWEB)

    Landeen, D.S.

    1990-08-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  18. Intrusion of anterior teeth to improve smile esthetics.

    Science.gov (United States)

    Chandrasekharan, Deepak; Balaji, S M

    2010-03-01

    A gummy smile is probably one of the most common causes of an unaesthetic smile. Causes include overeruption of maxillary anterior teeth and maxillary vertical excess. Intrusion of maxillary anterior teeth with Orthodontics and Le forte I superior repositioning may form a part of the solution. Of late the use of micro implants have improved the smile esthetics of borderline surgical cases by allowing the Orthodontist to intrude teeth more than what was possible with conventional Orthodontics.

  19. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  20. Mechanisms of extrusion and intrusion formation in fatigued crystalline materials

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Man, Jiří

    2014-01-01

    Roč. 596, FEB (2014), s. 15-24 ISSN 0921-5093 R&D Projects: GA ČR(CZ) GAP108/10/2371; GA ČR(CZ) GA13-23652S Institutional support: RVO:68081723 Keywords : Fatigue * Extrusion * Intrusion * Persistent slip band * Fatigue crack initiation Subject RIV: JL - Materials Fatigue, Friction Mechanics Impact factor: 2.567, year: 2014

  1. Phase transition and angular momentum dependence of correlations in the rotational spectra of Ne20 and Ne22

    International Nuclear Information System (INIS)

    Satpathy, L.; Schmid, K.W.; Krewald, S.; Faessler, A.

    1974-01-01

    Multi-Configuration-Hartree-Fock (MCHF) calculations with angular momentum projection before the variation of the internal degree of freedom have been performed for the nuclei Ne 20 and Ne 22 . This procedure yields different correlated intrinsic states for the different members of a rotational band. Thus, the angular momentum dependence of correlations has been studied. Experimentally, the ground state spectra of Ne 20 and Ne 22 show properties similar to the phase transitions observed in some rare earth nuclei which have been well reproduced through the present calculations. The calculated spectra show a significant improvement compared to the ones obtained by variation before the angular momentum projection is effected. (author)

  2. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  3. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  4. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  5. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  6. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

    Directory of Open Access Journals (Sweden)

    Al Quhtani Masoud

    2017-03-01

    Full Text Available Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

  7. Intrusive imagery in people with a specific phobia of vomiting.

    Science.gov (United States)

    Price, Katy; Veale, David; Brewin, Chris R

    2012-03-01

    AND OBJECTIVES: Specific phobia of vomiting (SPOV) is a chronic, pervasive and debilitating disorder which is clinically regarded as difficult to treat. Research into its development, maintenance and treatment has been limited. This study explored the prevalence and characteristics of intrusive mental imagery in people with SPOV. It investigated the relationship between presence of imagery and severity of phobia. Thirty-six participants meeting DSM-IV criteria for SPOV were recruited from online support groups and outpatient clinics. A semi-structured quantitative interview was administered. Twenty-nine (81%) participants reported multi-sensory intrusive imagery of adult (52%) and childhood memories (31%) and worst case scenarios ("flashforwards") of vomiting (17%). Extent of imagery was significantly related to severity of phobia. Participants primarily fearing others vomiting had less severe phobic symptoms. No control group was used and a heterogeneous sample of clinical and community participants was recruited. Correlational data comparing extent of imagery with severity of SPOV symptoms were derived from as yet unvalidated measures. Intrusive mental imagery is a clinically important feature of SPOV and may contribute to its maintenance. Causality needs to be demonstrated. Copyright © 2011 Elsevier Ltd. All rights reserved.

  8. Dimensionality reduction using Principal Component Analysis for network intrusion detection

    Directory of Open Access Journals (Sweden)

    K. Keerthi Vasan

    2016-09-01

    Full Text Available Intrusion detection is the identification of malicious activities in a given network by analyzing its traffic. Data mining techniques used for this analysis study the traffic traces and identify hostile flows in the traffic. Dimensionality reduction in data mining focuses on representing data with minimum number of dimensions such that its properties are not lost and hence reducing the underlying complexity in processing the data. Principal Component Analysis (PCA is one of the prominent dimensionality reduction techniques widely used in network traffic analysis. In this paper, we focus on the efficiency of PCA for intrusion detection and determine its Reduction Ratio (RR, ideal number of Principal Components needed for intrusion detection and the impact of noisy data on PCA. We carried out experiments with PCA using various classifier algorithms on two benchmark datasets namely, KDD CUP and UNB ISCX. Experiments show that the first 10 Principal Components are effective for classification. The classification accuracy for 10 Principal Components is about 99.7% and 98.8%, nearly same as the accuracy obtained using original 41 features for KDD and 28 features for ISCX, respectively.

  9. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  10. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  11. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  12. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  13. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  14. Reduction of saltwater intrusion by modifying hydraulic conductivity

    Science.gov (United States)

    Strack, O. D. L.; Stoeckl, L.; Damm, K.; Houben, G.; Ausk, B. K.; de Lange, W. J.

    2016-09-01

    We present an approach for reducing saltwater intrusion in coastal aquifers by artificially reducing the hydraulic conductivity in the upper part of selected areas by using a precipitate. We apply a previously presented analytical approach to develop formulas useful for the design of artificial barriers. Equations for the location of the tip of the saltwater wedge are presented and verified through a sand-tank experiment. The analysis is capable of computing discharges exactly, but requires the Dupuit-Forchheimer approximation to compute points of the interface between flowing fresh and stationary saltwater. We consider a vertical coastline and boundaries in the freshwater zone of either given discharge or given head. We demonstrate in the paper that reduction of the hydraulic conductivity in the upper part of a coastal aquifer will result in a decrease of saltwater intrusion, and present analytic expressions that can be used for design purposes. The previously presented analytical approach can be applied to design systems to reduce saltwater intrusion caused by pumping inland from the zone that contains saline groundwater.

  15. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  16. Emplacement depths and radiometric ages of Paleozoic plutons of the Neukirchen-Kdyně massif:differential uplift and exhumation of Cadomian basement due to Carboniferous orogenic collapse (Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Bues, C.; Dörr, W.; Fiala, Jiří; Vejnar, Zdeněk; Zulauf, G.

    2002-01-01

    Roč. 352, 1-2 (2002), s. 225-243 ISSN 0040-1951 R&D Projects: GA AV ČR KSK3012103; GA AV ČR KSK1012601 Grant - others:DFG(DE) Zu73/1-5; DFG(DE) BL191/12 Keywords : Cadomian orogeny * Variscan orogenic collapse * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.409, year: 2002

  17. Domain structure and texture in fine grained symplectite from garnet breakdown in peridotite xenoliths (Zinst, Bavaria, Bohemian Massif)

    Science.gov (United States)

    Habler, G.; Špaček, P.; Abart, R.

    2012-04-01

    Lherzolite xenoliths entrained in Oligocene basanite at the locality of Zinst (Bavaria, western Bohemian Massif) contain rare fine-grained symplectites forming about 5 millimeter sized patches comprising several microstructurally and chemically distinct concentric zones. The symplectites reflect a complex reaction history of lherzolite during decompression and interaction with melt. Here we focus on ultra-fine grained symplectite with an integrated bulk composition expressed in terms of garnet end-member component percentages as Prp(69-71)Alm(11-13)Grs(2.5-5)And(7.5-10)Uvr(4). According to the composition and the microstructural occurrence in lherzolite the ultra-fine grained symplectite is interpreted as a product of isochemical garnet breakdown, although the precursor phase is not preserved. Under cross polarized light patches with similar extinction show a domain microstructure in symplectite. BSE images reveal an intimate intergrowth of orthopyroxene, spinel and plagioclase. All phases have a shape preferred orientation within distinct domains, whereas discontinuous SPO changes occur at microstructural domain boundaries. Three types of symplectite were microstructurally discerned: The most pristine type A occurs in a 10-30 micrometers wide zone along the symplectite margin. Spinel forms several tens of nanometers wide rods or lamellae within Opx, whereas Pl and Opx represent the symplectite matrix. All phases show a strong SPO with the maximum elongation perpendicular to the symplectite boundary. At edges of this interface, the SPO of the symplectite phases changes accordingly. Discontinuities in SPO may coincide with changes in crystallographic orientation. EBSD data showed that symplectite phases have strict crystallographic orientation relations with Opx(100)//Spl(111) and Opx(010)//Spl(110). Whereas the initial lattice orientation is controlled by adjacent phases at the symplectite boundary, the crystallographic orientation within symplectite domains

  18. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  19. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  20. An investigation of potential neural correlates of intrusive retrieval of distressing memories.

    Science.gov (United States)

    Battaglini, Eva; Liddell, Belinda J; Das, Pritha; Malhi, Gin S; Felmingham, Kim; Bryant, Richard A

    2018-03-01

    Despite the prevalence of intrusive memories across psychological disorders, little is known about the neural networks that underpin this form of memory. This study used functional magnetic resonance imaging (fMRI) to identify neural circuits associated with the retrieval of intrusive memories. Participants with moderate levels of anxiety (N = 30) underwent a cold pressor task to induce a physiological stress response, after which they viewed 10 neutral and 10 negative film clips. In a method designed to induce intrusive memories, participants then completed an fMRI scan in which they viewed short (2 s) depictions of neutral components from the original film clips. There were no significant differences in activations during intrusion and non-intrusion responses. Exploratory analyses comparing intrusive responses to neutral stimuli found the insula, inferior frontal gyrus, precuneus, right cerebellum and bilateral supplementary motor area were uniquely activated during experience of intrusions (compared to the neutral cue baseline), whereas no significant activations were in response to negative scenes that did not trigger intrusions. This study did not compare the different neural processes implicated in intrusive and intentional emotional memories. The limited intrusions that could be elicited in the scanning environment restricted the number of trials that could be employed. Although no differences in neural activations were observed between intrusive and non-intrusive responses, the observation of precuneus involvement is consistent with models that propose that intrusive memories are impacted by the extent to which there is contextual integration of the relevant memories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Depleted subcontinental lithospheric mantle and its tholeiitic melt metasomatism beneath NE termination of the Eger Rift (Europe): the case study of the Steinberg (Upper Lusatia, SE Germany) xenoliths

    Science.gov (United States)

    Kukuła, Anna; Puziewicz, Jacek; Matusiak-Małek, Magdalena; Ntaflos, Theodoros; Büchner, Jörg; Tietz, Olaf

    2015-12-01

    The ca. 30 Ma Steinberg basanite occurs at the NE termination of the Eger (Ohře) Rift in the NW Bohemian Massif, Central Europe, and belongs to the Cenozoic alkaline Central European Volcanic Province. The basanite hosts a suite of mantle xenoliths, most of which are harzburgites containing relatively magnesian olivine (Fo 90.5-91.6) and Al-poor (0.04-0.13 a pfu) orthopyroxene (mg# 0.90-0.92). Some of these harzburgites also contain volumetrically minor clinopyroxene (mg# 0.92-0.95, Al 0.03-0.13 a pfu) and have U-shaped LREE-enriched REE patterns. The Steinberg harzburgites are typical for the Lower Silesian - Upper Lusatian domain of the European subcontinental lithospheric mantle. They represent residual mantle that has undergone extensive partial melting and was subsequently affected by mantle metasomatism by mixed carbonatite-silicate melts. The Steinberg xenolith suite comprises also dunitic xenoliths affected by metasomatism by melt similar to the host basanite, which lowered the Fo content in olivine to 87.6 %. This metasomatism happened shortly before xenolith entrainment in the erupting lava. One of the xenoliths is a wehrlite (olivine Fo 73 %, clinopyroxene mg# 0.83-0.85, subordinate orthopyroxene mg# 0.76-0.77). Its clinopyroxene REE pattern is flat and slightly LREE-depleted. This wehrlite is considered to be a tholeiitic cumulate. One of the studied harzburgites contains clinopyroxene with similar trace element contents to those in wehrlite. This type of clinopyroxene records percolation of tholeiitic melt through harzburgite. The tholeiitic melt might be similar to Cenozoic continental tholeiites occurring in the Central European Volcanic Province (e.g., Vogelsberg, Germany).

  2. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  3. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  4. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  5. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  6. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  7. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  8. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  9. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  10. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  11. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  12. A graphical feature generation approach for intrusion detection

    OpenAIRE

    Chen Shi; Zuo Zhen; Huang Zhi Ping; Guo Xiao Jun

    2016-01-01

    In order to develop a novel effective and efficient intrusion detection system, a novel hybrid method based on a graphical features-based k-nearest neighbor approach, namely GFNN, is proposed in this paper. In GFNN, k-means clustering algorithm is used to extract cluster centre of each class in the given dataset. Then, the distance between a specific data sample and each cluster centre is calculated, and a radar chart is plotted based on the new data composed of distance based features. The s...

  13. Deep Learning MicroBooNE

    Science.gov (United States)

    Genty, Victor; Terao, Kazuhiro; Wonjirad, Taritree

    2017-01-01

    The Liquid Argon Time Projection Chamber (LAr TPC) technology provides a high resolution image of ionizing particle trajectories raising a need for new event reconstruction techniques based on pattern recognition. The traditional bottoms-up reconstruction approach to extract physics involves a complex sequence of signal waveform processing, 2D and/or 3D geometrical pattern recognition, calorimetry, and finally particle identification before a neutrino interaction can be identified in an event. We present a top-down reconstruction approach using a machine learning algorithm called Deep Learning which uses convolutional neural networks to find a neutrino interaction in a LAr TPC image. We trained our network on images of simulated single particles and neutrinos overlaid on cosmic-ray background data taken from the MicroBooNE detector. In this talk, we present our result that shows convolutional networks can successfully learn LAr TPC images to perform particle identification, neutrino event selection, and localization of a neutrino interaction vertex in a large LAr TPC image.

  14. Exclusive measurements of nuclear breakup reactions of 17Ne

    Directory of Open Access Journals (Sweden)

    Wamers F.

    2014-03-01

    Full Text Available We have studied one-proton-removal reactions of about 500MeV/u 17Ne beams on a carbon target at the R3B/LAND setup at GSI by detecting beam-like 15O-p and determining their relative-energy distribution. We exclusively selected the removal of a 17Ne halo proton, and the Glauber-model analysis of the 16F momentum distribution resulted in an s2 contribution in the 17Ne ground state of about 40%.

  15. The role of compassion, suffering, and intrusive thoughts in dementia caregiver depression.

    Science.gov (United States)

    Schulz, Richard; Savla, Jyoti; Czaja, Sara J; Monin, Joan

    2017-09-01

    Exposure to suffering of a relative or friend increases the risk for psychological and physical morbidity. However, little is known about the mechanisms that account for this effect. We test a theoretical model that identifies intrusive thoughts as a mediator of the relation between perceived physical and psychological suffering of the care recipient and caregiver depression. We also assess the role of compassion as a moderator of the relation between perceived suffering and intrusive thoughts. Hispanic and African American caregivers (N = 108) of persons with dementia were assessed three times within a one-year period. Using multilevel modeling, we assessed the mediating role of intrusive thoughts in the relation between perceived physical and psychological suffering and CG depression, and we tested moderated mediation to assess the role of caregiver compassion in the relation between perceived suffering and intrusive thoughts. The effects of perceived physical suffering on depression were completely mediated through intrusive thoughts, and compassion moderated the relation between physical suffering and intrusive thoughts. Caregivers who had greater compassion reported more intrusive thoughts even when perceived physical suffering of the CR was low. For perceived psychological suffering, the effects of suffering on depression were partially mediated through intrusive thoughts. Understanding the role of intrusive thoughts and compassion in familial relationships provides new insights into mechanisms driving caregiver well-being and presents new opportunities for intervention.

  16. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  17. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Directory of Open Access Journals (Sweden)

    Laura Jobson

    Full Text Available Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1. In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed. The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  18. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  19. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  20. Nuclear-power-plant perimeter-intrusion alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  1. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  2. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi

    2013-01-01

    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

  3. ESTIMATION OF INTRUSION DETECTION PROBABILITY BY PASSIVE INFRARED DETECTORS

    Directory of Open Access Journals (Sweden)

    V. V. Volkhonskiy

    2015-07-01

    Full Text Available Subject of Research. The paper deals with estimation of detection probability of intruder by passive infrared detector in different conditions of velocity and direction for automated analyses of physical protection systems effectiveness. Method. Analytic formulas for detection distance distribution laws obtained by means of experimental histogram approximation are used. Main Results. Applicability of different distribution laws has been studied, such as Rayleigh, Gauss, Gamma, Maxwell and Weibull distribution. Based on walk tests results, approximation of experimental histograms of detection distance probability distribution laws by passive infrared detectors was done. Conformity of the histograms to the mentioned analytical laws according to fitting criterion 2 has been checked for different conditions of velocity and direction of intruder movement. Mean and variance of approximate distribution laws were equal to the same parameters of experimental histograms for corresponding intruder movement parameters. Approximation accuracy evaluation for above mentioned laws was done with significance level of 0.05. According to fitting criterion 2, the Rayleigh and Gamma laws are corresponded mostly close to the histograms for different velocity and direction of intruder movement. Dependences of approximation accuracy for different conditions of intrusion have been got. They are usable for choosing an approximation law in the certain condition. Practical Relevance. Analytic formulas for detection probability are usable for modeling of intrusion process and objective effectiveness estimation of physical protection systems by both developers and users.

  4. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  5. Features extraction algorithm about typical railway perimeter intrusion event

    Science.gov (United States)

    Zhou, Jieyun; Wang, Chaodong; Liu, Lihai

    2017-10-01

    Research purposes: Optical fiber vibration sensing system has been widely used in the oil, gas, frontier defence, prison and power industries. But, there are few reports about the application in railway defence. That is because the surrounding environment is complicated and there are many challenges to be overcomed in the optical fiber vibration sensing system application. For example, how to eliminate the effects of vibration caused by train, the natural environments such as wind and rain and how to identify and classify the intrusion events. In order to solve these problems, the feature signals of these events should be extracted firstly. Research conclusions: (1) In optical fiber vibration sensing system based on Sagnac interferometer, the peak-to-peak value, peak-to-average ratio, standard deviation, zero-crossing rate, short-term energy and kurtosis may serve as feature signals. (2) The feature signals of resting state, climbing concrete fence, breaking barbed wire, knocking concrete fence and rainstorm have been extracted, which shows significant difference among each other. (3) The research conclusions can be used in the identification and classification of intrusion events.

  6. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  7. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  8. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  9. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  10. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  11. Coulomb and nuclear excitations of narrow resonances in 17Ne

    Directory of Open Access Journals (Sweden)

    J. Marganiec

    2016-08-01

    Full Text Available New experimental data for dissociation of relativistic 17Ne projectiles incident on targets of lead, carbon, and polyethylene targets at GSI are presented. Special attention is paid to the excitation and decay of narrow resonant states in 17Ne. Distributions of internal energy in the O15+p+p three-body system have been determined together with angular and partial-energy correlations between the decay products in different energy regions. The analysis was done using existing experimental data on 17Ne and its mirror nucleus 17N. The isobaric multiplet mass equation is used for assignment of observed resonances and their spins and parities. A combination of data from the heavy and light targets yielded cross sections and transition probabilities for the Coulomb excitations of the narrow resonant states. The resulting transition probabilities provide information relevant for a better understanding of the 17Ne structure.

  12. Sensitivity studies for the KM3NeT

    Energy Technology Data Exchange (ETDEWEB)

    Shanidze, R.; Kuch, S. [Physics Inst. 1, Univ. of Erlangen-Nuremberg (Germany)

    2007-07-01

    KM3NeT is an European deep-sea research infrastructure, which will host a neutrino telescope with a volume of at least one cubic kilometre at the bottom of the Mediterranean Sea. The parameters and technical specifications of KM3NeT project will be finalized in the framework of EU-funded Design Study which started in 2006. KM3NeT neutrino telescope will search for the point sources of extra-terrestrial high energy neutrinos as well as for diffuse flux from unidentified sources. The sensitivity for these neutrino fluxes have been studied for the different models of KM3NeT detector, including various geometries and optical modules. The preliminary results of these studies, obtained with Monte Carlo simulations are presented in the talk. (orig.)

  13. Simulation studies for KM3NeT

    Energy Technology Data Exchange (ETDEWEB)

    Shanidze, Rezo [Erlangen Centre for Astroparticle Physics (ECAP), Erlangen University, Erwin-Rommel-Str. 1, 91058 Erlangen (Germany)

    2009-07-01

    KM3NeT is a future European deep-sea research infrastructure in the Mediterranean Sea, which will host the world's most sensitive high-energy neutrino telescope. The Design Study for the KM3NeT infrastructure is supported by the EU in FP6 and started in 2006. The KM3NeT consortium, which is formed by the ANTARES, NEMO and NESTOR collaborations as well as marine science and technology institutes, is currently investigating two design options for the final document of the Design Study, the KM3NeT technical design report (TDR). These options and the results of corresponding Monte Carlo studies are presented and discussed.

  14. Discharge modulation noise in He---Ne laser radiation

    NARCIS (Netherlands)

    Bolwijn, P.T.

    1967-01-01

    Discharge modulation noise in He---Ne laser radiation is considered theoretically, including explicitly the laser oscillator properties. Experiments reported previously by us and other authors are in agreement with our analysis.

  15. WE FRIENDS, Lääne-Eesti arengupartnerlus / Ingrit Kera

    Index Scriptorium Estoniae

    Kera, Ingrit

    2006-01-01

    Naised saavad osa hiidlaste kirjutatud europrojektist "We Friends", mille eesmärk on Lääne-Eesti madala konkurentsivõimega naiste ja lapsi üksi kasvatavate noorte emade tööhõivele kaasaaitamine

  16. neXtProt: a knowledge platform for human proteins.

    Science.gov (United States)

    Lane, Lydie; Argoud-Puy, Ghislaine; Britan, Aurore; Cusin, Isabelle; Duek, Paula D; Evalet, Olivier; Gateau, Alain; Gaudet, Pascale; Gleizes, Anne; Masselot, Alexandre; Zwahlen, Catherine; Bairoch, Amos

    2012-01-01

    neXtProt (http://www.nextprot.org/) is a new human protein-centric knowledge platform. Developed at the Swiss Institute of Bioinformatics (SIB), it aims to help researchers answer questions relevant to human proteins. To achieve this goal, neXtProt is built on a corpus containing both curated knowledge originating from the UniProtKB/Swiss-Prot knowledgebase and carefully selected and filtered high-throughput data pertinent to human proteins. This article presents an overview of the database and the data integration process. We also lay out the key future directions of neXtProt that we consider the necessary steps to make neXtProt the one-stop-shop for all research projects focusing on human proteins.

  17. 77 FR 6481 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2012-02-08

    ...] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Final rule... power television rulemaking petitions requesting channel substitutions in May 2011, it subsequently... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  18. Investigation of 35S NE-78241 mobility in plants

    International Nuclear Information System (INIS)

    Enisz, J.; Orsos, S.

    1982-01-01

    The mobility of 35 S NE-78241 (N-iso-thiocyanato-methyl-2,6-dimethyl-chloracetanilide) in plants has been studied. The compound is not absorbed via the leaves from aqueous solutions. It shows active transport through the root-system. It is strongly bound to soil. In bean plant (Phaseolus vulgaris) inoculated with Uromyces appendiculatus 35 S NE-78241 is selectively enriched at the place of infection. (author)

  19. NESTOR participation in the KM3NeT

    CERN Document Server

    Anassontzis, E

    2008-01-01

    The NESTOR Collaboration is a leading participant in the Design Study of the KM3NeT, the European Deep Sea Neutrino Telescope. In this report we describe briefly the KM3NeT and the NESTOR experience and contribution towards this objective; the 4500m deep NESTOR site, the star-like detector, the deployment and recovery of telescope modules and the "DELTA-BERENIKE", the specially constructed deployment ship.

  20. The MicroBooNE Technical Design Report

    Energy Technology Data Exchange (ETDEWEB)

    Fleming, Bonnie [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2012-02-24

    MicroBooNE will build, operate, and extract physics from the first large liquid argon time projection chamber (LArTPC) that will be exposed to a high-intensity neutrino beam. With its unparalleled capabilities in tracking, vertexing, calorimetry, and particle identification, all with full electronic readout, MicroBooNE represents a major advance in detector technology for neutrino physics in the energy regime of most importance for elucidating oscillation phenomena.