WorldWideScience

Sample records for intrusion ne bohemian

  1. Geochemistry and petrogenesis of the Feshark intrusion (NE Isfahan city

    Directory of Open Access Journals (Sweden)

    Ali Kananian

    2017-11-01

    Full Text Available Introduction Granitic rocks are the most abundant rock types in various tectonic settings and they have originated from mantle-derived magmas and/or partial melting of crustal rocks. The Oligo-Miocene Feshark intrusion is situated in the northeast of the city of Isfahan, and a small part of Urumieh–Dokhtar Magmatic Arc is between 52º21' E to 52º26'E and 32º50' N to - 32º53' N. The pluton has intruded into lower Eocene volcanic rocks such as rhyolite, andesite, and dacite and limestone. Analytical methods Fifteen representative samples from the Feshark intrusion were selected on the basis of their freshness. The major elements and some trace elements were analyzed by X-ray fluorescence (XRF at Naruto University in Japan and the trace-element compositions were determined at the ALS Chemex lab. Results The Feshark intrusion can be divided into two phases, namely granodiorite with slightly granite and tonalite composition and quartz diorite with various quartz diorite and quartz monzodiorite abundant enclaves according to Middlemost (1994 classification. The quartz diorite show dark grey and are abundant at the western part of the intrusive rocks. Granodiorite are typically of white-light grey in color and change gradually into granite and tonalite. The granodiorite and granite rocks consist of quartz, K-feldspar, plagioclase, biotite, and amphibole, whereas in the quartz diorites the mineral assemblages between different minerals are very similar to those observed in the granodiorite. However, amphibole and plagioclase are more abundant and quartz and K-feldspar modal contents are lower than in the granodiorite whereas pyroxene occurs as rare grains. They are characterized as metaluminous to mildly peraluminous based on alumina saturation index (e.g. Shand, 1943 and are mostly medium-K calc-alkaline in nature (Rickwood, 1989. Discussion In the Yb vs. La/Yb and Tb/Yb variation diagrams (He et al., 2009, the studied samples show small

  2. 222Rn activity concentration differences in groundwaters of three Variscan granitoid massifs in the Sudetes (NE Bohemian Massif, SW Poland)

    International Nuclear Information System (INIS)

    Przylibski, Tadeusz A.; Gorecka, Joanna

    2014-01-01

    Based on research conducted in three Variscan granitoid massifs located within the crystalline Bohemian Massif, the authors confirmed that the higher the degree of their erosional dissection, the smaller the concentration of 222 Rn in groundwaters circulating in these massifs. This notion implies that radon waters and high-radon waters, from which at least some of the dissolved radon should be removed before feeding them as drinking water to the water-supply system, could be expected in granitoid massifs which have been poorly exposed by erosion. At the same time, such massifs must be taken into account as the areas of possible occurrence of radon medicinal waters, which in some countries can be used for balneotherapy in health resorts. Slightly eroded granitoid massifs should be also regarded as very probable radon prone areas or areas of high radon potential. - Highlights: • The concentration of 222 Rn in groundwater depends on the zone of the granitoid massif which is exposed on the ground surface. • The highest 222 Rn concentrations occur in the least eroded granitoid massifs, the lowest in massifs with exposed root parts. • The stronger the erosional dissection of a granitoid massif, the lower 222 Rn concentration in groundwaters in this massif. • Not all granitoid massifs are areas with groundwaters containing high concentrations of 222 Rn. • The least eroded granitoid massifs are radon prone areas with the occurrence of high-radon and radon groundwaters

  3. Graptolite assemblages and stratigraphy of the lower Silurian Mrákotín Formation, Hlinsko Zone, NE interior of the Bohemian Massif (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Štorch, Petr; Kraft, P.

    2009-01-01

    Roč. 84, č. 1 (2009), s. 51-74 ISSN 1214-1119 R&D Projects: GA AV ČR IAA3013405 Institutional research plan: CEZ:AV0Z30130516 Keywords : graptolites * stratigraphy * Llandovery * Hlinsko Zone * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.983, year: 2009

  4. The Nysa-Morava Zone: an active tectonic domain with Late Cenozoic sedimentary grabens in the Western Carpathians' foreland (NE Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Špaček, P.; Bábek, O.; Štěpančíková, Petra; Švancara, J.; Pazdírková, J.; Sedláček, J.

    2015-01-01

    Roč. 104, č. 4 (2015), s. 963-990 ISSN 1437-3254 R&D Projects: GA ČR GAP210/12/0573; GA MŠk LM2010008 Institutional support: RVO:67985891 Keywords : Bohemian Massif * Upper Morava Basin * tectonic evolution * seismicity * sedimentary grabens Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.133, year: 2015

  5. Eclogite facies relics and a multistage breakdown in metabasites of the KTB pilot hole, NE Bavaria: implications for the Variscan tectonometamorphic evolution of the NW Bohemian Massif

    Science.gov (United States)

    O'Brien, Patrick J.; Röhr, Christian; Okrusch, Martin; Patzak, Margarete

    1992-11-01

    Complex reaction textures in coronitic metagabbros and retrograded eclogites of the KTB pilot and an adjacent drilling provide evidence for a multistage metamorphic history in the Variscan basement of the NW Bohemian Massif. The eclogites show complete metamorphic recrystallization leaving no textural or mineral relics of their igneous precursors. In contrast, textural relics of the igneous protolith are still preserved in the metagabbros where the metamorphic overprint under high pressure conditions achieved only partial replacement of the initial assemblage plagioclase + augite + amphibole (+olivine or orthopyroxene?) + ilmenite to form the eclogite facies assemblage garnet + omphacite + kyanite + zoisite + quartz+rutile. The garnets in the metagabbros occur in the typical ‘necklace’ fashion at the borders between the original plagioclase and mafic phase domains. In the same rocks, omphacite formed by a topotactic reaction mechanism replacing igneous augite as well as in smaller grains at the margins of the texturally igneous clinopyroxene where it occurs without fixed orientation with respect to the relict phase. Both eclogites and metagabbros show a partial breakdown under high pressure granulite (transitional to high pressure amphibolite) facies conditions during which omphacite broke down to vermicular symplectites of diopside + plagioclase. A later pervasive medium pressure metamorphism under amphibolite facies conditions led to the development of assemblages dominated by hornblende + plagioclase+titanite: phases prevailing in the overwhelming majority of the surrounding metabasites. Subsequent vein-associated retrogression produced minerals typical of the greenschist to zeolite facies. All metamorphic stages may be represented in a single thin section but although the overall reaction sequence is apparent, the obvious disequilibrium in the rocks makes the use of conventional geothermobarometry difficult. However, calculations made by assuming an

  6. Geology, alteration, age dating and petrogenesis of intrusive bodies in Halak Abad prospect area, NE Iran

    Directory of Open Access Journals (Sweden)

    Maliheh Ghourchi

    2014-04-01

    Full Text Available The Halak Abad prospect occurs in the northeastern part of Central Iran zone (Sabzevar structural zone. In this investigation, geochemical evolution, age and source of part of northeastern Iran magmatic arc (intrusive bodies in Halak Abad area in the Khorasan Razavi province has been studied. The exposed rocks consist of volcanic rocks with andesite and dacite nature, limestone, plutonic rocks mostly diorite, quartz diorite, monzodiorite, quartz monzonite, granodiorite and granite and sedimentary rocks such as limestone, sandstone and conglomerate. Magnetic susceptibility of intrusive rocks is >100 × 10-5 SI, so they belong to the magnetite-series (oxidized. This magmatism is mainly low-K (tholeiite series and meta-aluminous. The amounts of Zr, Th, Nb and Ti show depletion compared to N-MORB. Trace elements behavior shows a nearly flat pattern. Age of granodiorite body based on U-Pb zircon dating is 99.7±1.8 Ma (Mid-Cretaceous and 87Sr/86Sr initial ratio is 0.7047. The geochemical signature and 87Sr/86Sr initial ratio in the area suggest volcanic arc magmatism in subduction zone. This magmatism has characteristic such as high Na2O (3-7 %, low K2O (0.12-1 %, high CaO (4-5.7%, low Rb (1-20 ppm, low total REE (<40 ppm, high Ba/Nb, Sm/Yb<2, (La/YbN<5, 87Sr/86Sr initial ratio < 0.7045 and εNd: +4.5 show differences with normal granitoids in subduction zones. Geochemical and petrological characteristics indicate melting in relatively low pressure (shallow depth. The lines of evidence demonstrate that formation of this granitoid needs a suprasubduction zone.

  7. Geochemical and Isotopic Features of Çaykara (Trabzon, NE Turkey) Intrusive Complex

    Science.gov (United States)

    Sen, Cuneyt; Aydınçakır, Emre; Aydin, Faruk; Dokuz, Abdurrahman; Karslı, Orhan; Yılmazer, Sinan; Dündar, Buket

    2017-04-01

    Çaykara (Trabzon) Intrusive Complex is located at the eastern part of the Kaçkar Batholith. In the complex, Gündoǧdu-Boǧalı Plutons is Upper Cretaceous in aged, and Uzundere and Eǧerler Plutons are Eocene in aged. Gündoǧdu-Boǧa Plutons crop out around Araklı-Bahçecik villages, and are represented by the granitic to granodioritic rocks in composition showing porphyritic-granular texture. These rocks contain dark coloured, semi-rounded to rounded, wedged, fine-grained diorite and monzodiorite anclaves. Uzuntarla Pluton extends at E-W from Köknar-Karaçam-Uzuntarla sub-districs to south of Çaykara towards Bahçecik sub-district of Araklı. The rocks of the Uzuntarla Pluton are generally diorite to granodiorite in composition with porphyritic in texture. Eǧerler Pluton exposes at southern of the Çaykara Intrusive Complex. It's mineralogical composition is changing from diorite to granite with medium-coarse grain granular texture. The Upper Cretaceous plutonic rocks are characterized by ɛNd(i) values range from -1.5 to -9.7, whereas 87Sr/86Sr(i) values range from 0.7052 to 0.7119. Nd model ages are between 0.94 and 1.52 Ga. 206Pb/204Pb(i), 207Pb/204Pb(i) and 208Pb/204Pb(i) contents of samples change from 18.24 to 18.72, 15.59 to 15.66 and 37.93-38.64, respectively. The δ18O values in the investigated samples range from 4.0 ‰ to 6.7 ‰ and have similar ratios to I-type granitoides.The Eocene plutonic rocks are characterized by ɛNd(i) values range from -0.4 to -6.0, whereas 87Sr/86Sr(i) values range from 0.7050 to 0.7143. Nd model ages are between 0.81 and 1.32 Ga. 206Pb/204Pb(i), 207Pb/204Pb(i) and 208Pb/204Pb(i) contents of samples change from 18.241to 18.57, 15.58 to 15.63 and 38.22-38.92, respectively. The δ18O values in the investigated samples range from 5.8 ‰ to 7.1 ‰ and have similar ratios to I-type granitoides. Upper Cretaceous and Eocene aged Plutons in the study area are high-K calc-alkaline in composition and display metaluminous to

  8. Mineralogical and Geochemical Characterization of the Kimmeria Intrusion-Related Deposit, Xanthi, NE Greece

    Science.gov (United States)

    Theodoridou, Stella; Melfos, Vasilios; Voudouris, Panagiotis; Miskovic, Aleksandar

    2016-04-01

    Although intrusion-related systems have not been previously recognized in the European segment of the Tethyan Metallogenic Belt, the Rhodope metallogenic province of SE Balkan peninsula hosts numerous such occurrences. The Kimmeria hydrothermal system incorporates two styles of ore mineralization: i) a massive Au-bearing magnetite-pyrrhotite skarn and ii) a Mo-Cu-Bi-W quartz vein-hosted mineralization, both of which are related to the Oligocene Xanthi pluton (25.5±1.2 to 30±1 My, K-Ar in hornblende and biotite). The Xanthi pluton, consisting of I-type gabbros, monzonites and amphibole-biotite granodiorites, intrudes the basement gneisses, mica schists, amphibolites and marbles of the Southern Rhodope Core Complex; a dome that has gradually exhumed from Paleocene/mid Eocene to Miocene (starting between 65 and >42 to 10 My). The Xanthi pluton emplacement and the magmatically derived hydrothermal fluid circulation were controlled by two major regional structures: the low-angle Kavala-Xanthi-Komotini detachment fault and the Nestos thrust fault. The Kimmeria Au-Cu-Fe skarn mineralization features a well-preserved aureole at the contact between the granodiorite and the surrounding marbles. It consists of two paragenetic stages comprising magnetite and pyrrhotite-rich assemblages. Alteration minerals comprise chlorite and sericite. Bulk chemical analyses of the skarn mineralization revealed relatively high concentration of Cu (1 wt.%), Pb (288 ppm) and Zn (0.74 wt.%). The mineralization is also enriched in As (molybdenite as dominant sulfides. Minor sphalerite, tetrahedrite-tennantite, galena and rutile are also present, while sericite and chlorite as the alteration minerals. The Cu and Mo content of the vein type mineralization exceed 1.0 and 0.2 wt.% respectively, along with < 2.7 ppm Au, 1.3 to 79.5 ppm W and 0.6 to 456 ppm Bi. A first approach fluid study has revealed small variations in δ34S values of sulfides (0 - 2.3 ‰ VCDT) from both types of mineralization

  9. Tertiary alkaline Roztoky Intrusive Complex, České středohoří Mts., Czech Republic: petrogenetic characteristics

    Czech Academy of Sciences Publication Activity Database

    Skála, Roman; Ulrych, Jaromír; Ackerman, Lukáš; Jelínek, E.; Dostal, J.; Hegner, E.; Řanda, Zdeněk

    2014-01-01

    Roč. 103, č. 5 (2014), s. 1233-1262 ISSN 1437-3254 R&D Projects: GA AV ČR IAA300130902 Institutional support: RVO:67985831 ; RVO:61389005 Keywords : Bohemian Massif * Cenozoic * continental rift * Roztoky Intrusive Complex * alkaline intrusions * geochemistry Subject RIV: DD - Geochemistry Impact factor: 2.093, year: 2014

  10. Mantle reservoirs (EM-1, OIB, E-MORB and N-MORB), long duration and polystages history for PGE-bearing paleoproterozoic layered intrusions in the N-E part of Fennoscandian Shield.

    Science.gov (United States)

    Bayanova, Tamara; Nerovich, Ludmila; Serov, Pavel; Kunakkuzin, Evgeniy; Elizarov, Dmitriy

    2015-04-01

    Paleoproterozoic layered PGE -bearing intrusions located in the N-E part of the Fennoscandian Shield and have a total are about 2000 km2. Long multidisciplinary studies using isotope Nd-Sr, U-Pb and 3He/4He systematics permit create a big bank of geochemistry data for different part of the intrusions: barren and main Cu-Ni-Cr-Ti-V and PGE phases, dykes complexes and host rocks. Based on U-Pb isotope data (on baddeleyite and zircon) and Sm-Nd mineral isochrones (on rock-forming and sulphides minerals) there is distinguished long magmatic duration from 2.53 to 2.40 Ga. Using precise U-Pb and Sm-Nd data for different part of the intrusions there are established four main impulses: 2.53, 2.50, 2.45, and 2.40 Ga of magmatic (LIP) activities for gabbronorite, anothosite et.set. rocks. The primary reservoir for all precious and multimetal massifs are considered as enriched mantle EM-1 using ɛNd- ISr system with negative ɛNd values and low ISr data for whole rocks of the intrusions. Dyke complexes are presented as three groups: high Ti-ferrodolerites, low Ti and low Fe-gabbronorites. Complex isotope (U-Pb, Sm-Nd) and geochemistry (REE, ɛNd, ISr) data investigations reflect OIB, E-MORB and N-MORB reservoirs for its origin (Nerovich et all., 2014). Isotope 3He/4He and 3He concentrations for accessory minerals ( ilmenite, magnetite et. set ) from the layered paleoproterozoic intrusions reflect significant lower mantle component and upper mantle contribution. According to the model of binary mixing (Jahn et all, 2000) there were calculated mantle and core component into plume magmatic reservoir connected with the origin of the PGE paleoproterozoic intrusions. The mantle contributions lie in the interval from 85 to 93% and core component are very less. All investigations are devoted to memory of academician RAS, professor F.Mitrofanov (Russia), he was a leader of scientific school for geology, geochemistry and metallogenesis of ore deposits. The studies are

  11. Geochronology and geochemistry of Mesozoic intrusive rocks in the Xing'an Massif of NE China: Implications for the evolution and spatial extent of the Mongol-Okhotsk tectonic regime

    Science.gov (United States)

    Li, Yu; Xu, Wen-Liang; Tang, Jie; Pei, Fu-Ping; Wang, Feng; Sun, Chen-Yang

    2018-04-01

    This study presents new zircon U-Pb-Hf and whole-rock geochemical data for intrusive rocks in the Xing'an Massif of NE China, with the aim of furthering our understanding of the evolution and spatial influence of the Mongol-Okhotsk tectonic regime. Zircon U-Pb dating indicates that five stages of Mesozoic magmatism are recorded in the Xing'an Massif, namely during the Middle Triassic ( 237 Ma), the Late Triassic ( 225 Ma), the Early Jurassic ( 178 Ma), the Middle Jurassic ( 168 Ma), and the late Early Cretaceous ( 130 Ma). The Middle Triassic-Early Jurassic intrusive rocks in the Xing'an Massif are dominantly granodiorites, monzogranites, and syenogranites that formed from magma generated by partial melting of newly accreted continental crust. Geochemistry of the Middle Triassic-Early Jurassic granitoid suites of the Xing'an Massif indicates their formation at an active continental margin setting, related to the southwards subduction of the Mongol-Okhotsk oceanic plate. The Middle Jurassic monzogranites in the Xing'an Massif are geochemically similar to adakites and have εHf(t) values (+3.8 to +5.8) and Hf two-stage model ages (TDM2; 979-850 Ma) that are indicative of derivation from magma generated by partial melting of thickened juvenile lower crust. The Middle Jurassic monzogranites formed in a compressional setting related to the closure of the Mongol-Okhotsk Ocean. The late Early Cretaceous intrusive rocks in the Xing'an Massif are dominated by A-type granitoids that are associated with bimodal volcanic rocks, suggesting their formation in an extensional environment related to either (i) delamination of a previously thickened region of the crust, associated with the Mongol-Okhotsk tectonic regime; (ii) the subduction of the Paleo-Pacific Plate; or (iii) the combined influence of these two tectonic regimes.

  12. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  13. Highly differentiated magmas linked with polymetallic mineralization: A case study from the Cuihongshan granitic intrusions, Lesser Xing'an Range, NE China

    Science.gov (United States)

    Fei, Xianghui; Zhang, Zhaochong; Cheng, Zhiguo; Santosh, M.; Jin, Ziliang; Wen, Bingbing; Li, Zixi; Xu, Lijuan

    2018-03-01

    The genetic link between granitoids and polymetallic skarn mineralization has remained equivocal. The Cuihongshan skarn-porphyry W-Mo-Pb-Zn-(Fe-Cu) deposit in the eastern part of the Central Asian Orogenic Belt provides a unique example to address this issue. The major rock types in the mine area are Early Paleozoic intrusions composed of biotite syenogranite and biotite porphyritic granite and Early Mesozoic intrusions represented by porphyritic quartz monzonite, biotite monzogranite, and porphyritic granite. The diagnostic mineralogical and geochemical features indicate that the rocks belong to A2-type granites. The Early Paleozoic suite shows zircon U-Pb ages of 501 Ma, and εHf(t) values of - 4.4 to + 2.7 and + 2.4 to + 7.6, respectively. In combination with their coherent geochemical trends, these rocks are inferred to be products of in-situ differentiation. Although the Mesozoic suite shows crystallization ages of 194-196 Ma, εHf(t) values are in the range of - 2.5 to + 7.5 for the porphyritic quartz monzonite, the - 1.8 to + 4.5 values for the monzogranite and the + 2.3 to + 8.0 range for the porphyritic granite. The porphyritic quartz monzonite displays distinct mineral assemblage and shows significant compositional gap with the other two lithofacies. In contrast, the monzogranite and porphyritic granite have similar geochemical features, and are thus inferred to be co-magmatic. Considering the high SiO2 contents, variable εHf(t) (- 4.4 to + 8.0) and εNd(t) values (- 8.4 to + 0.28) for the two suites, we infer that both episodes of granitoid magmatism resulted from partial melting of crustal materials with a mixed source containing varying proportions of juvenile and Precambrian crustal components. The Early Mesozoic porphyritic granite shows a highly evolved F-rich geochemical affinity, and experienced magma-fluid interaction. Cassiterite from the calcic skarn and the magnesian skarn that coexists with magnetite orebodies shows a mean U-Pb age of 195

  14. Heat flow map of the Bohemian massif

    Energy Technology Data Exchange (ETDEWEB)

    Cermak, V [Geophys. Inst., CS Acad. of Sci.

    1977-01-01

    Forty seven heat flow values for the Bohemian massif were used to determine the heat flow pattern of the area. By including data from neighboring countries it was possible to draw an isothermal map outlining the geothermal activity. As a result, it is possible to closely correlate the heat flow and the tectonic structure. It is obvious that the areas of high geothermal activity correspond to zones of crustal weakness associated with two major faults bordering the rigid central section of the massif. The highest heat flow values coincide with the axis of the sedimentary basin. The development of these heat flow patterns should assist in the recognition of probable areas of geothermal resources and several promising sites are readily discernible.

  15. An Andean type Palaeozoic convergence in the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Schulmann, K.; Konopásek, J.; Janoušek, V.; Lexa, O.; Lardeaux, J.-M.; Edel, J.-B.; Štípská, P.; Ulrich, Stanislav

    2009-01-01

    Roč. 341, č. 2-3 (2009), s. 266-286 ISSN 1631-0713 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * Saxothuringian oceanic subduction * building of Variscan orogenic root system * channel flow Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.931, year: 2009

  16. Possibilities of Using Transport Terminals in South Bohemian Region

    Science.gov (United States)

    Čejka, Jiří; Bartuška, Ladislav; Turinská, Libuše

    2017-03-01

    Currently, when there is a need for transport services adapted to the customer requirements and create a workable operational system, there is increasing talk about transport terminals. Since the South Bohemian region is one of those where this issue will be increasingly dealt with, this paper suggests ways to use transport terminals as important support systems for freight and passenger transport.

  17. "Life is short, art is long" : the persistent wage gap between Bohemian and non-Bohemian graduates

    NARCIS (Netherlands)

    Abreu, Maria; Faggian, Alessandra; Comunian, Roberta; McCann, Philip

    2012-01-01

    In recent years, there has been a widespread interest in the economic development role played by 'Bohemian' occupations and the 'creative class'. It is believed that creative people and occupations generate external effects which foster economic growth. However, the degree to which these

  18. Uranium mineralization in the Bohemian Massif and its exploration

    International Nuclear Information System (INIS)

    Matolin, M.; Pluskal, O.; Rene, M.

    1981-01-01

    Long-term systematic and planned uranium survey including airborne, carborne, ground, logging and laboratory radiometric measurements as well as geological and geochemical investigations have shown a difference in radioactivity of two regional geological units in Czechoslovakia. The higher regional radioactivity of the Variscan granitoid rocks of the Bohemian Massif differs from that of the West Carpathians and is associated with more frequent uranium mineralization. Endogenous vein-type uranium mineralization has a spatial association with high-radioactivity granitoids in the Bohemian Massif. Airborne prospection defined rock radioactivity features on a regional scale while surface and subsurface radiometric and geological investigations using various techniques localized important uranium deposits. Complex statistical evaluation of numerous geophysical and geological data was studied in order to delineate uranium-favourable areas. (author)

  19. Analysis of supply adventure tourism in the South Bohemian Region

    OpenAIRE

    Klečacká, Simona

    2009-01-01

    The thesis, entitled "Analysis of supply adventure tourism in the South Bohemian Region" is to describe and analyze the options and instruments of tourism in selected destination. Work processes typology adventure tourism and also defines key terms related to this topic. It then focuses on identifying different types of adventure tourism, cooperation in the design of an appropriate design and implementation of a new product in the field of adventure tourism.

  20. Intrusive Geometries and Cenoyoic Stress History of the Northern Part of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Adamovič, Jiří; Coubal, Miroslav

    1999-01-01

    Roč. 9, - (1999), s. 5-14 ISSN 1210-9606. [Magmatism and Rift Basin Evolution. Liblice, 07.09.1998-11.09.1998] Subject RIV: DB - Geology ; Mineralogy http://geolines.gli.cas.cz/fileadmin/volumes/volume09/G9-005.pdf

  1. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  2. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  3. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  4. Documentation and evaluation of slope instabilities and other geological phenomena in the Geopark Bohemian Paradise (Czech Republic)

    Science.gov (United States)

    Krejčí, Oldřich; Krejčí, Vladimíra; Švábenická, Lilian; Hartvich, Filip

    2016-04-01

    Geographically, the area is part of the Bohemian Cretaceous Basin, the unit Jičín Hilly land. Since October 2005, the area belongs to the European Geopark UNESCO Bohemian Paradise. The reason of the protection is a major complex of rocks, natural forest communities and geomorphological valuable territory. The territory has been newly geologically mapped in a scale of 1 : 25,000. Sediments of the Czech Cretaceous Basin covers an area of 181 km2 and were deposited transgressively on the Permian - Carboniferous and crystalline basement of the Bohemian Massif. Except for locally developed basal sediments of fluvial origin they are mostly shallow marine sediments. Middle Turonian to Lower Coniacian rocks of the Jizera lithofacies are dominant by calcareous sandstones deposited under extremely dynamic conditions. Scattered alkaline volcanics penetrate the older formations as small intrusions and form locally preserved bodies at the surface. Area is strongly predisposed to the development of various types of landforms by structural segmentation of the Cretaceous sandstones and claystones and by Plio-Pleistocene inverse erosion. Numerous archival manuscripts are available from this area together with published geological, engineering-geological, geomorphological and historical papers. This is due to the fact that in 1926 a large landslide destroyed a substantial part of the village Dneboh, situated on the slope below a rock castle Drabske Svetnicky. Drabske Svetnicky is a ruin of a 13th century castle. It is located on the ragged edge of a sandstone cliff high above surrounding landscape. The castle covers a group of seven sandstone rocks, connected with wooden bridges. In the 50ies of the 20th century, an increased attention was paid to Drabske Svetnicky by experts on medieval architecture and a restoration of the original state of the castle rock was accomplished. Remnants of pottery and other findings suggest that the plateau region of the castle was first inhabited

  5. Large plates and small blocks: The Variscan orogeny in the Bohemian Massif

    Science.gov (United States)

    Kroner, Uwe; Romer, Rolf L.

    2017-04-01

    The Bohemian Massif of the Central European Variscides consists of several late Proterozoic / early Paleozoic low-strain crustal units, namely the Bruno-Vistulian continental block of the Laurussian plate that is juxtaposed with the Tepla-Barrandian Unit and the Lausitz block of the Gondwana plate. These pre-Variscan low-strain units are separated by high-strain zones that contain the mid- and lower crustal record of the Variscan orogeny (400-300 Ma), with nappes reflecting successive subduction exhumation events, voluminous migmatites and a wide range of geochemically contrasting granites. Although the principal constraints are undisputed, there is no consensus regarding the general tectonics of this area. Here we present a plate tectonic model explaining the Bohemian Massif as an orogenic wedge with a Gondwana pro-wedge and a Laurussia retro-wedge area. The principal formation steps are as follows. Subduction of the oceanic crust of the Gondwana plate, i.e. the southern part of the Rheic Ocean eventually followed by continental subduction of the distal Peri-Gondwana shelf produced the early Devonian (U)HP complexes now exposed in the uppermost allochthonous units. The arrival of the Tepla-Barrandian Cadomian block initiates a flip of subduction polarity, leading to the complete closure of the Rheic Ocean in the late Devonian coeval with the exhumation of the early Variscan (U)HP units. Caused by the Lausitz block entering the plate boundary zone in the early Carboniferous, this early subduction accretion stage was followed by continent continent collision. The resulting orogenic wedge is characterized by an intra-continental subduction zone in the pro-wedge area superimposed by the crustal stack of early and mid-Variscan accreted units. Due to heating of the subducted slab in the mantle, the isothermal exhumation of this deeply buried continental crust caused HT-LP metamorphism during the final transpressional stage. Lateral extrusion tectonics coeval with the

  6. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  7. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  8. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  9. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  10. Genetic stratigraphy of Coniacian deltaic deposits of the northwestern part of the Bohemian Cretaceous Basin

    Czech Academy of Sciences Publication Activity Database

    Nádaskay, R.; Uličný, David

    2014-01-01

    Roč. 165, č. 4 (2014), s. 547-575 ISSN 1860-1804 Institutional support: RVO:67985530 Keywords : genetic stratigraphy * well log * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.569, year: 2014

  11. Physical activities of students in special primary schools in the central Bohemian region

    OpenAIRE

    Beznosova, Irina

    2011-01-01

    1 Abstract Title of the thesis: Physical activities of students in special primary schools in the central Bohemian region Aim of the study: The aim of the thesis is a comprehensive survey of physical activities provided by special primary schools in the Central Bohemian region. Method: We used a method of an empirical research. We studied a representative sample of special primary schools located in the Central Bohemia region in order to ascertain characteristics of the objects of observation...

  12. Geochemistry of the Drahotín and Mutěnín intrusions, West Bohemian shear zone, Bohemian massif: contrasting evolution of mantle-derived melts

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Krňanská, M.; Siebel, W.; Strnad, L.

    2010-01-01

    Roč. 99, 3/4 (2010), s. 185-199 ISSN 0930-0708 R&D Projects: GA AV ČR KJB300130612 Institutional research plan: CEZ:AV0Z30130516 Keywords : Teplá-Barrandian * fractional crystallization * assimilation * gabbro Subject RIV: DD - Geochemistry Impact factor: 1.287, year: 2010

  13. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  14. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  15. "Ne kreshtshenogo, ne otpetogo..." : [luuletused] / Marina Petrova

    Index Scriptorium Estoniae

    Petrova, Marina

    2001-01-01

    Sisu: "Ne kreshtshenogo, ne otpetogo..." ; "Inogo mesta vstretshi v mire net..." ; "Moi put lezhit tsherez Moskvu..." ; "Osvoboditelnaja ossen - ..." ; Pjuhtitskim aistam ; "Vesjolõje svetshi kanona..." ; Vjuga ; Materi Bozhijei Pjuhtitskoi ; "Pustõnja moja, pustõnja..." ; "Odinnadtsat let v mojo serdtse gljadjat kupola..."

  16. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  17. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  18. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  19. 5 years of measurement of electromagnetic emission in West Bohemian seismoactive region

    Czech Academy of Sciences Publication Activity Database

    Kolář, Petr

    2014-01-01

    Roč. 11, č. 2 (2014), s. 133-142 ISSN 1214-9705 R&D Projects: GA ČR GAP210/10/1728 Institutional support: RVO:67985530 Keywords : electromagnetic emission observation * West Bohemian earthquake swarm s Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.389, year: 2014

  20. Late Paleozoic volcanic rocks of the Intra-Sudetic Basin, Bohemian Massif: Petrological and geochemical characteristics

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Fediuk, F.; Lang, Miloš; Martinec, Petr

    2004-01-01

    Roč. 64, č. 2 (2004), s. 127-153 ISSN 0009-2819 R&D Projects: GA AV ČR(CZ) IAA3013903 Keywords : Late Paleozoic * volcanic rocks * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.643, year: 2004

  1. The Bazzanio-Piceetum in the Bohemian Forest (Šumava Mts.), Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Neuhäuslová, Zdenka; Eltsova, Viktoria

    2002-01-01

    Roč. 113, - (2002), s. 5-6, 367-379 ISSN 0014-8962 R&D Projects: GA AV ČR KSK6005114; GA ČR GA206/99/1416 Institutional research plan: CEZ:AV0Z6005908 Keywords : Bazzanio-Piceetum * Bohemian Forest Subject RIV: EF - Botanics

  2. Significance of geological units of the Bohemian Massif, Czech Republic, as seen by ambient noise interferometry

    Czech Academy of Sciences Publication Activity Database

    Růžek, Bohuslav; Valentová, L.; Gallovič, F.

    2016-01-01

    Roč. 173, č. 5 (2016), s. 1663-1682 ISSN 0033-4553 R&D Projects: GA ČR GAP210/12/2336; GA MŠk LM2010008 Institutional support: RVO:67985530 Keywords : ambient noise * geological units * Bohemian Massif * velocity model Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.591, year: 2016

  3. Testing floristic and environmental differentiation of rich fens on the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Peterka, T.; Plesková, Z.; Jiroušek, M.; Hájek, Michal

    2014-01-01

    Roč. 86, č. 4 (2014), s. 337-366 ISSN 0032-7786 R&D Projects: GA ČR GAP505/10/0638 Institutional support: RVO:67985939 Keywords : Bohemian-Moravian Highlands * mire * gradients Subject RIV: EF - Botanics Impact factor: 4.104, year: 2014

  4. Permian fauna of the Krkonoše Piedmont Basin (Bohemian Massif, Central Europe)

    Czech Academy of Sciences Publication Activity Database

    Zajíc, Jaroslav

    2014-01-01

    Roč. 70, 3/4 (2014), s. 131-142 ISSN 0036-5343 Institutional support: RVO:67985831 Keywords : faunal lists * palaeogeography * palaeoenvironment * stratigraphy * Early Permian * Krkonoše Piedmont Basin * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy

  5. Upper Cretaceous to Pleistocene melilitic volcanic rocks of the Bohemian Massif: Petrology and mineral chemistry

    Czech Academy of Sciences Publication Activity Database

    Skála, Roman; Ulrych, Jaromír; Krmíček, Lukáš; Fediuk, F.; Balogh, K.; Hegner, E.

    2015-01-01

    Roč. 66, č. 3 (2015), s. 197-216 ISSN 1335-0552 Institutional support: RVO:67985831 Keywords : Bohemian Massif * Cenozoic volcanism * isotope geochemistry * melilitic rock * mineralogy * petrology Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.523, year: 2015

  6. Re–Os geochemistry and geochronology of the Ransko gabbro–peridotite massif, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Pašava, J.; Erban, V.

    2013-01-01

    Roč. 48, č. 7 (2013), s. 799-804 ISSN 0026-4598 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : Re–Os * geochronology * gabbro * Bohemian Massif * Ni–Cu mineralization Subject RIV: DD - Geochemistry Impact factor: 2.667, year: 2013

  7. Cenozoic alkaline volcanic rocks with carbonatite affinity in the Bohemian Massif: Their sources and magma generation

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Štěpánková-Svobodová, Jana

    2014-01-01

    Roč. 46, 1/2 (2014), s. 45-58 ISSN 0369-2086 R&D Projects: GA AV ČR(CZ) IAA300130902 Institutional support: RVO:67985831 Keywords : alkaline volcanic rocks * melilitic rocks * carbonatites * magma generation * metasomatism * Cenozoic * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy

  8. Glaciation in the surroundings of Prášilské Lake (Bohemian Forest, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Mentlík, P.; Minár, J.; Břízová, E.; Lisá, Lenka; Tábořík, P.; Stacke, V.

    2010-01-01

    Roč. 117, 1/2 (2010), s. 181-194 ISSN 0169-555X Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Forest * Pleistocene glaciations * Prášilské Lake * Šumava * sedimentology * chronology Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.352, year: 2010

  9. Mineralogy of Bohemian green earth pigment and its microanalytical evidence in historical paintings

    Czech Academy of Sciences Publication Activity Database

    Hradil, David; Píšková, Anna; Hradilová, J.; Bezdička, Petr; Lehrberger, G.; Gerzer, S.

    2011-01-01

    Roč. 53, č. 3 (2011), s. 563-586 ISSN 0003-813X R&D Projects: GA ČR GA203/07/1324 Institutional research plan: CEZ:AV0Z40320502 Keywords : Bohemian green earth * celadonite * smectite * microanalysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.183, year: 2011

  10. Variscan potassic dyke magmatism of durbachitic affinity at the southern end of the Bohemian Massif (Lower Austria)

    Science.gov (United States)

    Zeitlhofer, Helga; Grasemann, Bernhard; Petrakakis, Konstantin

    2016-06-01

    Dykes in the Strudengau area (SW Moldanubian Zone, Austria) can be mineralogically divided into lamprophyres (spessartites and kersantites) and felsic dykes (granite porphyries, granitic dykes and pegmatoid dykes). Geochemical analyses of 11 lamprophyres and 7 felsic dykes show evidence of fractional crystallization. The lamprophyres are characterized by metaluminous compositions, intermediate SiO2 contents and high amounts of MgO and K2O; these rocks have high Ba (800-3000 ppm) and Sr (250-1000 ppm) contents as well as an enrichment of large-ion lithophile elements over high field strength elements, typical for enriched mantle sources with variable modifications due to fractionation and crustal contamination. This geochemical signature has been reported from durbachites (biotite- and K feldspar-rich mela-syenites particularly characteristic of the Variscan orogen in Central Europe). For most major elements, calculated fractionation trends from crystallization experiments of durbachites give an excellent match with the data from the Strudengau dykes. This suggests that the lamprophyres and felsic dykes were both products of fractional crystallization and subsequent magma mixing of durbachitic and leucogranitic melts. Rb-Sr geochronological data on biotite from five undeformed kersantites and a locally deformed granite porphyry gave cooling ages of c. 334-318 Ma, indicating synchronous intrusion of the dykes with the nearby outcropping Weinsberger granite (part of the South Bohemian Batholith, c. 330-310 Ma). Oriented matrix biotite separated from the locally deformed granite porphyry gave an Rb-Sr age of c. 318 Ma, interpreted as a deformation age during extensional tectonics. We propose a large-scale extensional regime at c. 320 Ma in the Strudengau area, accompanied by plutonism of fractionated magmas of syncollisional mantle-derived sources, mixed with crustal components. This geodynamic setting is comparable to other areas in the Variscan belt documenting an

  11. Stars and Flowers: Handel, Haydn and Mendelssohn in the music history of the Bohemian Lands - a brief account

    Czech Academy of Sciences Publication Activity Database

    Freemanová, Michaela

    2009-01-01

    Roč. 46, č. 4 (2009), s. 375-392 ISSN 0018-7003 Institutional research plan: CEZ:AV0Z90580513 Keywords : Handel * Bohemian Lands * music history * Haydn * Mendelssohn Subject RIV: AL - Art, Architecture, Cultural Heritage

  12. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  13. Physical activity and sport preferences of West Bohemian adolescents

    Directory of Open Access Journals (Sweden)

    Petr Valach

    2017-06-01

    Full Text Available Background: Regular physical activity is the crucial factor in treating lifestyle diseases. The age of adolescence is considered as the important period of person's life for creation and further maintaining healthy lifestyle habits. We assume that the level of physical activities of young people could be influenced by the possibilities to perform the preferred sporting activities. Objective: The aim of the presented study was to estimate the total amount of performed physical activity and the structure of sport preferences in West Bohemian adolescents. Further to find out the existence of relationships between preferred sport branches and composition of weekly physical activities of girls and boys. Methods: The research was conducted at five selected secondary schools of the Pilsen region, under the total participation of 382 boys and 529 girls. The level of physical activity (PA and sporting preferences was assessed by means of the IPAQ questionnaire and questionnaire of sports preferences, with the use of the internet system INDARES. For the statistical processing of the gained data, the Kruskal-Wallis ANOVA test, crosstabulation tables, and Spearman correlation analysis were used. Results: The results showed that the preference of fitness activities is associated with a higher level of PA in spare time of boys (p = .006, and with intensive PA of boys (p = .014 and girls (p = .044, compared to those, who do not prefer these activities. In addition, in case of boys, we have found statistically significant correlations (p = .022 between the preference of team sports and PA at school. 51.8% of boys and 37.7% of girls, who prefer fitness activities, comply with the recommendation of at least 3 × 20 minutes of intensive PA during one week (out of those, who do not prefer, only 30.5% of boys and 18.1% of girls. Individual sports (swimming, cycling, and downhill skiing are the main physical activities preferred by

  14. Multiphase formation of the Obří důl polymetallic skarn deposit, West Sudetes, Bohemian Massif: geochemistry and Re-Os dating of sulfide mineralization

    Science.gov (United States)

    Veselovský, František; Ackerman, Lukáš; Pašava, Jan; Žák, Karel; Haluzová, Eva; Creaser, Robert A.; Dobeš, Petr; Erban, Vojtěch; Tásler, Radko

    2018-06-01

    The Obří důl Fe-Cu-As polymetallic sulfide skarn deposit is developed in a metamorphic series in the West Sudetes, Bohemian Massif. It consists of lenses of marble, calc-silicate rocks, and skarns. We studied the Gustav orebody, which is located few hundred meters away from the contact with a large, late-orogenic Variscan Krkonoše-Jizera Plutonic Complex (KJPC) emplaced into shallow crust. Mineralogical and fluid inclusion study evidence indicates that the main sulfide stage, dominated by pyrrhotite, arsenopyrite, and chalcopyrite originated from aqueous hydrothermal fluids with salinity up to 8 wt% NaCl eq. with minimum homogenization temperatures ranging from 324 to 358 °C. These fluids mainly replaced carbonate-rich lithologies. Carbon, oxygen, and strontium isotope data in Ca-rich rocks imply total overprinting by channelized metasomatic fluid flow, which is most probably related to the intrusion of the KJPC, whereas δ34S values of sulfides argue for a magmatic source of sulfur. The Re-Os age of arsenopyrite overlaps published age data for the KJPC and suggests synchronous formation of the main sulfide mineralization and pluton emplacement.

  15. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  16. Multistage magma emplacement and progressive strain accumulation in the shallow-level Krkonoše-Jizera plutonic complex, Bohemian Massif

    Science.gov (United States)

    Žák, Jiří; Verner, Kryštof; Sláma, Jiří; Kachlík, Václav; Chlupáčová, Marta

    2013-09-01

    relationships combined with new U-Pb zircon geochronology suggest that the shallow-level Krkonoše-Jizera plutonic complex, northern Bohemian Massif, was assembled successively from bottom to top, starting with emplacement of the separately evolved S-type Tanvald granite (317.3 ± 2.1 Ma), followed by at least two voluminous batches of the I-type porphyritic Liberec (319.5 ± 2.3 Ma) and Jizera (320.1 ± 3.0 Ma and 319.3 ± 3.7 Ma) granites. The intrusive sequence was completed by uppermost, minor intrusions of the equigranular Harrachov (315.0 ± 2.7 Ma) and Krkonoše granites. The I-type granites exhibit an unusually complex pattern of superposed feldspar phenocryst and magnetic fabrics as revealed from the anisotropy of magnetic susceptibility (AMS). The outer Liberec granite preserves margin-parallel foliations and lineations, interpreted to record emplacement-related strain captured by cooling from the pluton floor and walls. In contrast, the inner Jizera, Harrachov, and Krkonoše granites were overprinted by synmagmatic strain resulting from dextral movements along regional strike-slip faults cutting the opposite ends of the plutonic complex. Late-stage felsic dikes in the Liberec and Jizera granites reorient from horizontal to vertical (lineation-perpendicular) attitude in response to changing the least principal stress direction, whereas mafic schlieren do not do so, representing only randomly oriented small-scale thermal-mechanical instabilities in the phenocryst framework. In general, this case example challenges the common approach of inferring pluton-wide magma flow from interpolated foliation, lineation, and schlieren patterns. More likely, magmatic fabrics in large plutons record complex temporal succession of superposed strains resulting from diverse processes at multiple scales.

  17. Possible applications of power from Temelin nuclear power plant in agriculture of the South Bohemian Region

    International Nuclear Information System (INIS)

    Hosek, V.

    1989-01-01

    The agricultural organizations in the South Bohemian Region have suggested the use of low-potential waste heat from the Temelin nuclear power plant in processing feed potatoes, fodder drying, mushroom production, heating greenhouses and agricultural buildings, drying corn and processing vegetables. Greenhouses should be built on an area of 30 hectares. Hydroponics is expected to be used. The location of the greenhouse area relative to the power plant is described. (M.D.). 6 tabs

  18. Long-term limnological research of the Bohemian Forest lakes and their recent status

    Czech Academy of Sciences Publication Activity Database

    Vrba, Jaroslav (ed.); Kopáček, Jiří; Fott, J.

    2000-01-01

    Roč. 4, č. 4 (2000), s. 7-28 ISSN 1211-7420. [Acidified Lakes in the Bohemian/Bavarian Forest - History, Present and Future. Č. Budějovice, 21.03.2000-23.03.2000] R&D Projects: GA ČR GA206/97/0072; GA ČR GA206/98/0727; GA ČR GA206/00/0063; GA AV ČR KSK2005601 Subject RIV: DA - Hydrology ; Limnology

  19. Clustering of 2008 West Bohemian seismic swarm mechanisms and its possible interpretation

    Czech Academy of Sciences Publication Activity Database

    Kolář, Petr; Boušková, Alena

    2018-01-01

    Roč. 15, č. 1 (2018), s. 27-40 ISSN 1214-9705 R&D Projects: GA ČR(CZ) GA16-03950S Institutional support: RVO:67985530 Keywords : West Bohemian earthquake swarm region * source mechanism * slip distribution * finite seismic source model Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: 1.5. Earth and related environmental sciences Impact factor: 0.699, year: 2016

  20. Bibliography of publications and manuscripts relating to the Bohemian/Bavarian Forest lakes

    Czech Academy of Sciences Publication Activity Database

    Vrba, Jaroslav (ed.)

    2000-01-01

    Roč. 4, č. 4 (2000), s. 259-278 ISSN 1211-7420. [Acidified Lakes in the Bohemian/Bavarian Forest - History, Present and Future. Č. Budějovice, 21.03.2000-23.03.2000] R&D Projects: GA ČR GA206/97/0072; GA ČR GA206/98/0727 Subject RIV: DA - Hydrology ; Limnology

  1. Evaluation of Development of Cooperation in South Bohemian Municipalities in the Years 2007–2014

    Directory of Open Access Journals (Sweden)

    Dušek Jiří

    2017-06-01

    Full Text Available The article presents results of the research of cooperation of municipalities in the South Bohemian Region, focused on the analysis of forms and means of cooperation between 2007 and 2014. The published results are part of an internal research that lasted for many years, the goal of which was both to analyse the development of cooperation of municipalities in the studied region and to identify the prerequisites and barriers of all cooperative relations. The research was done on a sample of 623 South Bohemian municipalities in the period of 2007-2010 and 2013- 2016, the obtained data was processed using descriptive statistics and multidimensional statistical methods, and the results show an almost 20% increase in the means of municipal cooperation across the entire South Bohemian Region. Based on the respective means of cooperation, National Healthy Cities Network of the Czech Republic saw the biggest growth, amounting to +3.275% between 2007 and 2014. Participation in local action groups, where the total of 580 municipalities are already engaged, increased by 32.12%. Although less dynamic, this growth is much more important, as it significantly contributes to the development of rural areas and their absorption abilities, mainly as regards financial resources from the national and European sources. However, fragmented means of municipal cooperation is a current problem of cooperation of municipalities, leading to the disintegrated power of the respective municipalities.

  2. How are the emplacement of rare-element pegmatites, regional metamorphism and magmatism interrelated in the Moldanubian domain of the Variscan Bohemian Massif, Czech Republic?

    Czech Academy of Sciences Publication Activity Database

    Melleton, J.; Gloaguen, E.; Frei, D.; Novák, M.; Breiter, Karel

    2012-01-01

    Roč. 50, č. 6 (2012), s. 1751-1773 ISSN 0008-4476 Institutional support: RVO:67985831 Keywords : LCT pegmatite * rare-element-enriched magma * columbite-tantalite * LA-SF-ICP-MS dating * Variscan orogeny * Bohemian Massif * Moldanubian domain * Bohemian Massif (Czech Republic) Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.180, year: 2012

  3. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  4. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  5. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  6. Photoionization of Ne8+

    Science.gov (United States)

    Pindzola, M. S.; Abdel-Naby, Sh. A.; Robicheaux, F.; Colgan, J.

    2014-05-01

    Single and double photoionization cross sections for Ne8+ are calculated using a non-perturbative fully relativistic time-dependent close-coupling method. A Bessel function expansion is used to include both dipole and quadrupole effects in the radiation field interaction and the repulsive interaction between electrons includes both the Coulomb and Gaunt interactions. The fully correlated ground state of Ne8+ is obtained by solving a time-independent inhomogeneous set of close-coupled equations. Propagation of the time-dependent close-coupled equations yields single and double photoionization cross sections for Ne8+ at energies easily accessible at advanced free electron laser facilities. This work was supported in part by grants from NSF and US DoE. Computational work was carried out at NERSC in Oakland, California, NICS in Knoxville, Tennessee, and OLCF in Oak Ridge, Tennessee.

  7. Evidence for partial melting of eclogite from the Moldanubian Zone of the Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Miyazaki, T.; Nakamura, D.; Tamura, A.; Svojtka, Martin; Arai, S.; Hirajima, T.

    2016-01-01

    Roč. 111, č. 6 (2016), s. 405-419 ISSN 1345-6296 Grant - others:Rada Programu interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : partial melting * eclogite * leucocratic pockets * Bohemian Massif * Moldanubian Zone Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.409, year: 2016

  8. Cell specific primary production and phagotrophy of phytoplankton in acidified lakes of Bohemian Forest

    Czech Academy of Sciences Publication Activity Database

    Znachor, Petr; Hrubý, P.

    2000-01-01

    Roč. 4, č. 4 (2000), s. 223-232 ISSN 1211-7420. [Acidified Lakes in the Bohemian/Bavarian Forest - History, Present and Future. České Budějovice, 21.03.2000-23.03.2000] R&D Projects: GA ČR GA206/97/0072; GA ČR GA206/98/0727; GA MŠk FRV:140/1999; GA AV ČR KSK2005601 Subject RIV: DA - Hydrology ; Limnology

  9. Lateral displacement of crustal units relative to underlying mantle lithosphere: Example from the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Babuška, Vladislav; Plomerová, Jaroslava

    2017-01-01

    Roč. 48, December (2017), s. 125-138 ISSN 1342-937X R&D Projects: GA ČR GAP210/12/2381; GA MŠk(CZ) LD15029; GA MŠk LM2010008; GA MŠk(CZ) LM2015079 Institutional support: RVO:67985530 Keywords : Bohemian Massif * Teplá-Barrandian mantle lithosphere * Zone Erbendorf-Vohenstrauss * Jáchymov Fault Zone Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: Volcanology Impact factor: 6.959, year: 2016

  10. Anthropogenic soils on spoil rock banks in North Bohemian Coal Basin, Czech Republic

    International Nuclear Information System (INIS)

    Raclavska, H.; Raclavsky, K.; Matysek, D.; Stalmachova, B.

    1997-01-01

    The area of the North Bohemian Coal Basin is devastated by the extensive exploitation of brown coal by open pit mining. Knowledge of newly formed soils, their properties, development and contamination is important from the point of view of biological regeneration of the landscape. The mineralogy of anthropogenic soils from the mining area is presented together with the geochemistry of nutrients and trace elements. Attention is paid to the soil-forming processes in the non-reclaimed spoil rock banks with the development of spontaneous vegetation. 3 refs., 1 fig., 4 tabs

  11. Reactivity of North Bohemian coals in coprocessing of coal/oil mixtures

    Energy Technology Data Exchange (ETDEWEB)

    Sebor, G.; Cerny, J.; Maxa, D.; Blazek, J. [Inst. of Chemical Technology, Prague (Czechoslovakia); Sykorova, I. [Inst. of Rock Structure and Mechanics, Prague (Czechoslovakia)

    1995-12-01

    Autoclave experiments with North Bohemian coal were done in order to evaluate their reactivity in coprocessing with petroleum vacuum residue, Selected coals were comprehensively characterized by using a number of analytical methods. While the coals were of similar geological origin, some of their characteristics differed largely from one coal to another. Despite the differences in physical and chemical structure, the coals provided very similar yields of desired reaction products. The yields of a heavy non- distillable fraction and/or an insoluble solid residue were, under experimental conditions, largely affected by retrogressive reactions (coking). The insoluble solid fractions were examined microscopically under polarized light.

  12. Continuous gas monitoring in the West Bohemian earthquake area, Czech Republic: First results

    Czech Academy of Sciences Publication Activity Database

    Faber, E.; Horálek, Josef; Boušková, Alena; Teschner, M.; Koch, U.; Poggenburg, J.

    2009-01-01

    Roč. 53, č. 3 (2009), s. 315-328 ISSN 0039-3169 R&D Projects: GA ČR(CZ) GA205/06/1780 Grant - others:German Ministry of Economics and Labour(DE) BMWi VI A 2-27/01 Institutional research plan: CEZ:AV0Z30120515 Keywords : West Bohemian earthquake area * earthquake swarms * gas monitoring * soil gas * carbon dioxide * radon * mofette * time series Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.000, year: 2009

  13. Chemical composition and phosphorus fractionation of sediments in the Bohemian Forest lakes

    Czech Academy of Sciences Publication Activity Database

    Borovec, Jakub

    2000-01-01

    Roč. 4, č. 4 (2000), s. 179-184 ISSN 1211-7420. [Acidified Lakes in the Bohemian/Bavarian Forest - History, Present and Future. Č. Budějovice, 21.03.2000-23.03.2000] R&D Projects: GA ČR GA206/97/0072; GA ČR GA206/98/0727; GA ČR GA206/00/0063 Grant - others:EU(XE) MOLAR:ENV4-CT95-0007; EU(XE) EMERGE:EVK1-CT-1999-00032 Institutional research plan: CEZ:AV0Z6017912; CEZ:MSM123100004 Subject RIV: CB - Analytical Chemistry, Separation

  14. Bohemian Book Painting in the Early Modern Period in a New Context. An Illuminated Printed Book from the Property of the Bohemian Brethren Priest Vavřinec Orlík

    Czech Academy of Sciences Publication Activity Database

    Just, Jiří; Šárovcová, M.

    2016-01-01

    Roč. 64, č. 6 (2016), s. 462-479 ISSN 0049-5123 Institutional support: RVO:67985963 Keywords : The Bohemian Brethren * Vavřinec Orlík * Book Painting * Old Prints Subject RIV: AB - History OBOR OECD: History (history of science and technology to be 6.3, history of specific sciences to be under the respective headings)

  15. Uraninite, coffinite and brannerite from shear-zone hosted uranium deposits of the Bohemian Massif (Central European Variscan belt)

    Czech Academy of Sciences Publication Activity Database

    René, Miloš; Dolníček, Z.

    2017-01-01

    Roč. 7, č. 4 (2017), č. článku 50. ISSN 2075-163X Institutional support: RVO:67985891 Keywords : uranium deposits * mineralogy * uraninite * coffinite * brannerite * Moldanubian Zone * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 2.088, year: 2016 http://www.mdpi.com/2075-163X/7/4/50

  16. Modelling tidal current-induced bed shear stress and palaeocirculation in an epicontinental seaway: the Bohemian Cretaceous Basin, Central Europe

    Czech Academy of Sciences Publication Activity Database

    Mitchell, A. J.; Uličný, David; Hampson, G. J.; Allison, P. A.; Gorman, G. J.; Piggott, M. D.; Wells, M. R.; Pain, C. C.

    2010-01-01

    Roč. 57, č. 2 (2010), s. 359-388 ISSN 0037-0746 R&D Projects: GA AV ČR(CZ) IAA300120609 Institutional research plan: CEZ:AV0Z30120515 Keywords : bed shear stress * Bohemian Cretaceous Basin * epicontinental sea * tidal circulation * Turonian Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.229, year: 2010

  17. Temporal evolution of mineralization events in the Bohemian Massif inferred from the Re-Os geochronology of molybdenite

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Haluzová, Eva; Creaser, R. A.; Pašava, J.; Veselovský, F.; Breiter, Karel; Erban, V.; Drábek, M.

    2017-01-01

    Roč. 52, č. 5 (2017), s. 651-662 ISSN 0026-4598 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : Re-Os * geochronology * molybdenite * Bohemian Massif * granite Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 3.396, year: 2016

  18. Permo-Carboniferous volcanism in late Variscan continental basins of the Bohemian Massif (Czech Republic): geochemical characteristic

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Pešek, J.; Štěpánková-Svobodová, Jana; Bosák, Pavel; Lloyd, F. E.; Seckendorff, von, V.; Lang, Miloš; Novák, Jiří Karel

    2006-01-01

    Roč. 66, č. 1 (2006), s. 37-56 ISSN 0009-2819 R&D Projects: GA AV ČR(CZ) IAA3013903 Institutional research plan: CEZ:AV0Z30130516 Keywords : Permo-Carboniferous * volcanics * continental basin * Bohemian Massif * underplating * crustal anatexis * Sr-Nd isotopes Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.824, year: 2006

  19. Monazite and zircon as major carriers of Th, U, and Y in peraluminous granites: examples from the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Breiter, Karel

    2016-01-01

    Roč. 110, č. 6 (2016), s. 767-785 ISSN 0930-0708 R&D Projects: GA ČR GA14-13600S Institutional support: RVO:67985831 Keywords : zircon * monazite * granites * trace elements * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.236, year: 2016

  20. Granitic magma emplacement and deformation during early-orogenic syn-convergent transtension: The Stare Sedlo complex, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Tomek, Filip; Žák, J.; Chadima, Martin

    2015-01-01

    Roč. 87, JUL (2015), s. 50-66 ISSN 0264-3707 Institutional support: RVO:67985831 Keywords : anisotropy of magnetic susceptibility (AMS) * Bohemian Massif * pluton emplacement * granite * transtension * Variscan orogeny Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.926, year: 2015

  1. 'The tempting girl, I know so well': Representations of Gout and the Self-Fashioning of Bohemian Humanist Scholars

    Czech Academy of Sciences Publication Activity Database

    Storchová, Lucie

    2016-01-01

    Roč. 21, č. 6 (2016), s. 511-530 ISSN 1383-7427 R&D Projects: GA ČR GB14-37038G Institutional support: RVO:67985955 Keywords : Bohemian Lands * humanism * Neo-latin poetry * gout * representation Subject RIV: AB - History Impact factor: 0.317, year: 2016

  2. Palaeoenvironments and facies on a progressively flooded rocky island (Upper Cenomanian – Lower Turonian, Bohemian Cretaceous Basin)

    Czech Academy of Sciences Publication Activity Database

    Žítt, Jiří; Vodrážka, R.; Hradecká, L.; Svobodová, Marcela

    2010-01-01

    Roč. 179, - (2010), s. 223-234 ISSN 1802-6842 Institutional research plan: CEZ:AV0Z30130516 Keywords : Cretaceous island * weathering * geomorphology * sedimentary environments * biostratigraphy * Upper Cenomanian-Lower Turonian * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy http://www.nm.cz/publikace/archiv-en.php?id=1&rok=179&f_=Show

  3. Late Cretaceous and Cenozoic dynamics of the Bohemian Massif inferred from the paleostress history of the Lusatian Fault Belt

    Czech Academy of Sciences Publication Activity Database

    Coubal, Miroslav; Málek, Jiří; Adamovič, Jiří; Štěpančíková, Petra

    2015-01-01

    Roč. 87, July 1 (2015), s. 26-49 ISSN 0264-3707 R&D Projects: GA ČR GAP210/12/0573 Institutional support: RVO:67985831 ; RVO:67985891 Keywords : paleostress * fault kinematics * Lusatian Fault Belt * Elbe fault system * Bohemian Massif * Alpine foreland Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.926, year: 2015

  4. Terebella phosphatica Leriche (Polychaeta) associated with phosphatic crusts and particles (Lower Turonian, Bohemian Cretaceous Basin, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Žítt, Jiří; Vodrážka, R.

    2013-01-01

    Roč. 41, April (2013), s. 111-126 ISSN 0195-6671 Institutional support: RVO:67985831 Keywords : Terebella phosphatica tubes * Atreta-Bdelloidina encrusting community * Faecal pellet accumulations * phosphogenesis * Lower Turonian * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.390, year: 2013

  5. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  6. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  7. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  8. Geodynamic movements and deformations of the Sudetic structural unit of the Bohemian Massif

    Science.gov (United States)

    Schenk, V.; Jechumtálová, Z.; Schenková, Z.; Kottnauer, P.

    2003-04-01

    The African plate pushes to European orogenic Alpine structures that transfer the compression further to Variscan structural units, including the Bohemian Massif. Central parts of the Bohemian Massif are relatively deep-seated and, therefore, some of marginal parts of the Massif and its border geological structures should be affected intensively and moved distinctly with respect to the central parts. The geodynamical GPS network EAST SUDETEN is located just over the area mentioned above, i.e. it covers both kinetically quasi-effected and quasi-non-effected structural blocks. GPS data observed already for six annual campaigns (1997-2002) were processed and movement vectors of individual network sites were assessed. Applied data processing did not allow errors in the horizontal direction 2 mm and in the vertical direction 5-6 mm to be exceeded. Since time series of coordinate changes for several network sites gave rather pronounce movement trends, preliminary deformations among individual structural blocks were evaluated and compared to other geological, geophysical and geodetic materials. The investigation has been supported by the Grant Agency of the Czech Republic, projects 205/97/0679 and 205/01/0480, and by the research programme of the Ministry of Education, Youth and Sport of the Czech Republic, project LN00A005 "Dynamics of the Earth".

  9. Planning environmental restoration in the North Bohemian uranium district, Czech Republic: Progress report 1996

    International Nuclear Information System (INIS)

    Tomas, J.

    1997-01-01

    Uranium ores have been mined in Bohemian Massif in different mining districts i.e. in West Bohemia, Pribram region and Middle Bohemia, Rozna district and in Straz pod Ralskem district. The latter is represented by stratiform sandstone type of deposit where acid in-situ leaching has been applied as mining method since 1968. More than 4 million tons of leaching acids have been injected into the ore bearing sandstones. The district falls in an area of natural water protection in North Bohemian Cretaceous platform. A complex evaluation of negative impact of uranium mining and milling in this area has been clearly articulated in Government Decrees Nos.:366/92, 429/93, 244/95 and 170/96. A special declining regime of mining has been ordered for the implementation of which together with the Government Commission of Experts a remediation programme has been designed and put into operation in 1996. The uranium producer DIAMO a.s. prepared a Concept of Restoration of the area affected by in-situ leaching and MEGA a.s. has prepared the Environmental Impact Assessment (E.I.A.) according to the law No.244/1992. The Ministry of the Environment issued an Environmental Impact Statement which included evaluation of the condition of mining and restoration programme because both activities will influence the environment of the district. (author)

  10. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  11. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  12. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  13. Impact of Different Milk Yields on Milk Quality in Bohemian Spotted Cattle

    Directory of Open Access Journals (Sweden)

    O. Hanuš

    2007-01-01

    Full Text Available The milk yield (MY is a significant economic and health factor. MY influences the health state of dairy cows, their reproduction performance, longevity and milk indicators (MIs. Differences within MIs between 2 higher (1; 8 348 kg per lactation; 240 individual milk samples and 2 lower yielding herds (2; 7 344; 239 of Bohemian Spotted dairy cows (B were tested. Sampling was carried out during summer and winter feeding seasons. Lactation factors were well balanced. Group 1 was on a higher genetical level, had better nutrition and higher MY by 13.7% (P P P > 0.05. The U was higher (5.707 > 4.365 mmol l-1 in group 1, AC and URN as well (0.0362 > 0.0238 mmol l-1 and 51.94 > 41.97%. It corresponds with nitrogen and energy metabolism.

  14. Indoor radon related to uranium in granitoids of the Central Bohemian plutonic complex

    International Nuclear Information System (INIS)

    Barnet, I.; Fojtikova, I.

    2004-01-01

    The study is based on the indoor radon data (one year measurements, Kodak LR 115 track etch detectors), vectorized geological maps 1:50000, vectorized coordinates of dwellings and uranium data for granitoid types of the Central Bohemian Plutonic Complex (CBPC). Using ArcGis 8.2 programme, the position of 16145 dwellings was linked to a geological database covering the CBPC (approx. 3200 km 2 ), and the type of underlying rock type was specified for each house. The resulting databases enabled us to calculate the mean EEC indoor Rn data for particular granitoid types and to study the relationship between the indoor Rn and the U concentrations. The petrogenetically variable CBPC was emplaced during Variscan orogenesis (330-350 Ma) and is among the most radioactive rock types within the Bohemian Massif. A long-term process of CBPC genesis resulted in more than 20 granitoid types, differing by their petrogenetic characteristics as well as mineralogical and chemical composition, including uranium concentration. The relation between the mean indoor radon values and uranium concentrations in particular rock types was examined. A positive regression between indoor Rn and uranium as the source of Rn soil gas clearly demonstrates how regional geology influences the indoor radon activity concentration in dwellings. The highest indoor Rn concentrations were observed in the Sedlcany granodiorite and Certovo bremeno syenite, where also the highest gamma dose rates (150-210 nGy.h -1 ) within all granitoid types in the Czech Republic were observed. The two rock types differ from other granitoids by a relatively high zircon concentration, which is the main source of U and subsequently of soil gas Rn being released from the bedrock. The lower indoor Rn values of Certovo bremeno syenite which do not correspond with the high U concentrations can be explained by a relatively low permeability of its clayey weathering crust. This feature was also observed for soil gas radon concentration

  15. Impacts of hydrometeorological extremes in the Bohemian-Moravian Highlands in 1706–1889 as derived from taxation records

    Czech Academy of Sciences Publication Activity Database

    Dolák, Lukáš; Brázdil, Rudolf; Valášek, H.

    2015-01-01

    Roč. 120, č. 4 (2015), s. 465-488 ISSN 1212-0014 R&D Projects: GA ČR(CZ) GA13-19831S Institutional support: RVO:67179843 Keywords : historical climatology * ice-age * documentary * vulnerability * temperatures * europe * winter * hydrometeorological extremes * taxation records * damage * impacts * Bohemian-Moravian Highlands Subject RIV: EH - Ecology, Behaviour Impact factor: 0.415, year: 2015

  16. Boundaries of mantle–lithosphere domains in the Bohemian Massif as extinct exhumation channels for high-pressure rocks

    Czech Academy of Sciences Publication Activity Database

    Babuška, Vladislav; Plomerová, Jaroslava

    2013-01-01

    Roč. 23, č. 3 (2013), s. 973-987 ISSN 1342-937X R&D Projects: GA ČR GA205/07/1088; GA ČR GAP210/12/2381; GA AV ČR IAA300120709 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * mantle lithosphere domains * fossil olivine fabric * high pressure Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 8.122, year: 2013

  17. Cenomanian and Cenomanian-Turonian boundary deposits in the southern part of the Bohemian Cretaceous Basin, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Čech, S.; Hradecká, L.; Svobodová, Marcela; Švábenická, L.

    2005-01-01

    Roč. 80, č. 4 (2005), s. 321-354 ISSN 1210-3527 Grant - others:GA MŽP1(CZ) 1975/630/02 Institutional research plan: CEZ:AV0Z3013912 Keywords : Cenomanian * biostratigraphy * Bohemian Cretaceous Basin Subject RIV: DB - Geology ; Mineralogy http://www.geology.cz/bulletin/contents/2005/vol80no4/321_cech.pdf

  18. Constraints on the origin of gabbroic rocks from the Moldanubian-Moravian units boundary (Bohemian Massif, Czech Republic and Austria)

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Ackerman, Lukáš; Kachlík, V.; Hegner, E.; Balogh, K.; Langrová, Anna; Luna, J.; Fediuk, F.; Lang, M.; Filip, Jiří

    2010-01-01

    Roč. 61, č. 3 (2010), s. 175-191 ISSN 1335-0552 R&D Projects: GA AV ČR IAA3013403; GA AV ČR IAA300130902 Institutional research plan: CEZ:AV0Z30130516 Keywords : gabbroic rocks * geochemistry * Sr-Nd isotopes * K-Ar ages * Moravian Unit * Moldanubian Unit * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 0.909, year: 2010

  19. Joint inversion of teleseismic P waveforms and surface-wave group velocities from ambient seismic noise in the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Růžek, Bohuslav; Plomerová, Jaroslava; Babuška, Vladislav

    2012-01-01

    Roč. 56, č. 1 (2012), s. 107-140 ISSN 0039-3169 R&D Projects: GA ČR GA205/07/1088; GA AV ČR IAA300120709; GA MŠk LM2010008 Institutional research plan: CEZ:AV0Z30120515 Keywords : receiver function * seismic noise * joint inversion * Bohemian Massif * velocity structure Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.975, year: 2012

  20. Tectonic strain changes affecting the development of deep seated gravitational slope deformations in the Bohemian Massif and Outer Western Carpathians

    Czech Academy of Sciences Publication Activity Database

    Stemberk, Josef; Hartvich, Filip; Blahůt, Jan; Rybář, Jan; Krejčí, O.

    2017-01-01

    Roč. 289, SI (2017), s. 3-17 ISSN 0169-555X R&D Projects: GA MŠk(CZ) LG15007; GA MŠk(CZ) LM2015079 Institutional support: RVO:67985891 Keywords : Deep seated gravitational slope deformations * Displacement monitoring * Tectonic strain changes * Bohemian Massif * Outer Western Carpathians Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 2.958, year: 2016

  1. Structure, emplacement, and tectonic setting of Late Devonian granitoid plutons in the Teplá–Barrandian unit, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Žák, J.; Kratinová, Zuzana; Trubač, J.; Janoušek, V.; Sláma, Jiří; Mrlina, Jan

    2011-01-01

    Roč. 100, č. 7 (2011), s. 1477-1495 ISSN 1437-3254 R&D Projects: GA AV ČR KJB300120702 Institutional research plan: CEZ:AV0Z30120515; CEZ:AV0Z30130516 Keywords : Bohemian Massif * Teplá-Barrandian unit * Variscan orogeny * granite * pluton * subduction Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.342, year: 2011

  2. Silvibacterium bohemicum gen. nov sp nov., an acidobacterium isolated from coniferous soil in the Bohemian Forest National Park

    Czech Academy of Sciences Publication Activity Database

    Lladó, Salvador; Benada, Oldřich; Cajthaml, Tomáš; Baldrian, Petr; García-Fraile, Paula

    2016-01-01

    Roč. 39, FEB (2016), s. 14-19 ISSN 0723-2020 R&D Projects: GA ČR(CZ) GP14-09040P; GA MŠk(CZ) EE2.3.30.0003; GA MŠk(CZ) LO1509 Institutional support: RVO:61388971 Keywords : Acidobacteria * Taxonomy * Bohemian Forest National Park Subject RIV: EE - Microbiology, Virology Impact factor: 3.931, year: 2016

  3. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  4. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  5. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  6. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  8. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  9. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  10. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  11. Radioactivity in mushrooms from selected locations in the Bohemian Forest, Czech Republic.

    Science.gov (United States)

    Čadová, Michaela; Havránková, Renata; Havránek, Jiří; Zölzer, Friedo

    2017-05-01

    137 Cs is one of the most important radionuclides released in the course of atmospheric nuclear weapon tests and during accidents in nuclear power plants such as that in Chernobyl, Ukraine, or Fukushima, Japan. The aim of this study was to compare 137 Cs and 40 K concentrations in particular species of mushrooms from selected locations in the Bohemian Forest (Czech: Šumava), Czech Republic, where a considerable contamination from the Chernobyl accident had been measured in 1986. Samples were collected between June and October 2014. Activities of 137 Cs and 40 K per dry mass were measured by means of a semiconductor gamma spectrometer. The 137 Cs values measured range from below detection limit to 4300 ± 20 Bq kg -1 , in the case of 40 K from 910 ± 80 to 4300 ± 230 Bq kg -1 . Differences were found between individual locations, due to uneven precipitation in the course of the movement of the radioactive cloud after the Chernobyl accident. There are, however, also differences between individual species of mushrooms from identical locations, which inter alia result from different characteristics of the soil and depths of mycelia. The values measured are compared with established limits and exposures from other radiation sources present in the environment. In general, it can be stated that the values measured are relatively low and the effects on the health of the population are negligible compared to other sources of ionizing radiation.

  12. Radioactivity in mushrooms from selected locations in the Bohemian Forest, Czech Republic

    Energy Technology Data Exchange (ETDEWEB)

    Cadova, Michaela; Havrankova, Renata; Havranek, Jiri; Zoelzer, Friedo [University of South Bohemia in Ceske Budejovice, Institute of Radiology, Toxicology and Civil Protection, Faculty of Health and Social Sciences, Ceske Budejovice (Czech Republic)

    2017-05-15

    {sup 137}Cs is one of the most important radionuclides released in the course of atmospheric nuclear weapon tests and during accidents in nuclear power plants such as that in Chernobyl, Ukraine, or Fukushima, Japan. The aim of this study was to compare {sup 137}Cs and {sup 40}K concentrations in particular species of mushrooms from selected locations in the Bohemian Forest (Czech: Sumava), Czech Republic, where a considerable contamination from the Chernobyl accident had been measured in 1986. Samples were collected between June and October 2014. Activities of {sup 137}Cs and {sup 40}K per dry mass were measured by means of a semiconductor gamma spectrometer. The {sup 137}Cs values measured range from below detection limit to 4300 ± 20 Bq kg{sup -1}, in the case of {sup 40}K from 910 ± 80 to 4300 ± 230 Bq kg{sup -1}. Differences were found between individual locations, due to uneven precipitation in the course of the movement of the radioactive cloud after the Chernobyl accident. There are, however, also differences between individual species of mushrooms from identical locations, which inter alia result from different characteristics of the soil and depths of mycelia. The values measured are compared with established limits and exposures from other radiation sources present in the environment. In general, it can be stated that the values measured are relatively low and the effects on the health of the population are negligible compared to other sources of ionizing radiation. (orig.)

  13. KM3NeT

    CERN Multimedia

    KM3NeT is a large scale next-generation neutrino telescope located in the deep waters of the Mediterranean Sea, optimized for the discovery of galactic neutrino sources emitting in the TeV energy region.

  14. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  15. Temporal evolution of mineralization events in the Bohemian Massif inferred from the Re-Os geochronology of molybdenite

    Science.gov (United States)

    Ackerman, Lukáš; Haluzová, Eva; Creaser, Robert A.; Pašava, Jan; Veselovský, František; Breiter, Karel; Erban, Vojtěch; Drábek, Milan

    2017-06-01

    Molybdenite is a common mineral accompanying Sn-W, Au, and base metal mineralizations located in different geotectonic units of the Bohemian Massif, but it is also widespread in granitoids and/or related quartz veins/pegmatites forming disseminated Mo mineralization. Thirty Re-Os ages were obtained for molybdenite samples from the Bohemian Massif to provide constraints on the timing and duration of mineralization event(s) within the framework of previously published geochronological data for the host and/or associated rocks. The obtained data for Sn-W-(Li) deposits in the Erzgebirge metallogenetic province indicate the predominance of one and/or multiple short-time mineralization events taking place between ˜319 and 323 Ma, with the exception of the Krupka deposit associated with the Altenberg-Teplice caldera where the data may suggest prolonged activity until ˜315 Ma. The ages of the Pb-Zn-(Au-Mo) Hůrky u Rakovníka and Fe-Cu-As Obří důl mineralizations from the exocontacts of the Čistá pluton and Krkonoše-Jizera Plutonic Complex, respectively, provide evidence for synchronous emplacement of the ore and the associated granitic rocks. In contrast, the Padrť Fe-As-Mo mineralization postdates the age of the associated Padrť granite. Disseminated Mo mineralization in Cadomian and Variscan granitoids and/or related to quartz veins/pegmatites provides Re-Os ages that overlap with the previously published geochronological data for the host rocks, suggesting coeval evolution. Molybdenite samples from the Sázava suite granites of the Central Bohemian Plutonic Complex (CBPC) have resolvable younger ages than their host granites, but similar to the age of spatially related Au mineralization which is associated with the latest evolution of the CBPC.

  16. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  17. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  18. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  19. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  20. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  1. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  2. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  3. NE2561 and NE2611A - are they different?

    International Nuclear Information System (INIS)

    Huntley, R.; Boas, J.; Kotler, L.; Webb, D.; Stucki, G.

    2000-01-01

    Full text: Evidence is mounting that the nominally identical ionization chamber types NE2561 and NE2611A have significantly different energy dependences. This is revealed by comparing the radiation quality correction factors k q . The factor k q is the ratio of the absorbed dose to water calibration factors (for a particular type of ionization chamber) at radiation quality Q to that for 60 Co. k q values for NE2561 and NE2611A chambers have been compared for various kV and MV X-ray beams at several standards laboratories. Measurements at ARPANSA (Australia) on six NE2561 and five NE2611A show a consistent difference in k q of 1-2% for 16 and 19 MV X-rays. Work at OFMET (Switzerland) has shown similar differences at 6 and 18 MV. No such differences are seen at NPL (UK) - this inconsistency is currently ascribed to differences in the radiation beams. Consistent differences of up to 3% between these two chamber types have been observed at both ARPANSA and NRC (Canada) at the BIPM medium energy X-ray intercomparison qualities between 50 kV and 250 kV. We conclude that the two types of chamber should not be regarded as identical. ARPANSA and several other laboratories in Europe and North America will shortly participate in a Euromet project to be coordinated by OFMET, to investigate high energy X-ray beam quality specifiers. This project will provide additional data that may lead to a better understanding of this anomaly. Copyright (2000) Australasian College of Physical Scientists and Engineers in Medicine

  4. Physics at DAΦNE

    International Nuclear Information System (INIS)

    Franzini, P.J.

    1995-01-01

    In this talk, I will give a brief description of the φ factory DAΦNE at Frascati, explaining why a φ factory is an interesting place to do new physics, and then discuss the physics that can be done at DAΦNE. I will concentrate on CP violation as it can be studied at DAΦNE. This is, after all, the raison d'etre of DAΦNE. I start with a brief general introduction to CP violation in the KK system, and the distinction between mass-mixing CP violation (ε) and intrinsic CP violation (ε'/ε). After presenting a summary of ε'/ε measurements up to now, and briefly discussing the theory of ε'/ε (the so-called 'penguins'), I will cover the particularities of measuring ε'/ε at a φ factory, such as tagging and interferometry. Finally, I will say a few words about searching for CP violation in modes where it has never before been seen. I will end my talk with a list of other physics topics at DAΦNE, and rare decay branching ratio limits that can be achieved there, just to give a flavor of what else can be done. (author) 8 figs., 2 tabs., 22 refs

  5. Rhenium-osmium isotopes in pervasively metasomatized mantle xenoliths from the Bohemian Massif and implications for the reliability of Os model ages

    Czech Academy of Sciences Publication Activity Database

    Kochergina, Y. V.; Ackerman, Lukáš; Erban, V.; Matusiak-Malek, M.; Puziewicz, J.; Halodová, P.; Špaček, P.; Trubač, J.; Magna, T.

    2016-01-01

    Roč. 430, July 15 (2016), s. 90-107 ISSN 0009-2541 Institutional support: RVO:67985831 Keywords : Bohemian Massif * depletion age * Ohře/Eger rift * Os isotopes * peridotite xenolith * Re-Os * sub-continental lithospheric mantle Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.347, year: 2016

  6. Behavior of trace elements in quartz from plutons of different geochemical signature: A case study from the Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Breiter, Karel; Ackerman, Lukáš; Svojtka, Martin; Müller, A.

    175/176, 15 August (2013), s. 54-67 ISSN 0024-4937 R&D Projects: GA ČR GAP210/10/1105 Institutional support: RVO:67985831 Keywords : Quartz * trace elements * granites * fractionation * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 3.654, year: 2013

  7. Plio-Pleistocene basanitic and melilititic series of the Bohemian Massif: K-Ar ages, major/trace element and Sr–Nd isotopic data

    Czech Academy of Sciences Publication Activity Database

    Ulrych, Jaromír; Ackerman, Lukáš; Balogh, K.; Hegner, E.; Jelínek, E.; Pécskay, Z.; Přichystal, A.; Upton, B. G. J.; Zimák, J.; Foltýnová, R.

    2013-01-01

    Roč. 73, č. 4 (2013), s. 429-450 ISSN 0009-2819 Institutional support: RVO:67985831 Keywords : Bohemian Massif * Plio-Pleistocene * Basanite * Melilitite * K-Ar age * Magmatism * Sr–Nd isotopes Subject RIV: DD - Geochemistry Impact factor: 1.397, year: 2013

  8. Multiple fluid sources/pathways and severe thermal gradients during formation of the Jílové orogenic gold deposit, Bohemian Massif, Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Zachariáš, J.; Žák, Karel; Pudilová, M.; Snee, L. W.

    2013-01-01

    Roč. 54, October (2013), s. 81-109 ISSN 0169-1368 Institutional research plan: CEZ:AV0Z30130516 Institutional support: RVO:67985831 Keywords : Orogenic gold deposits * Carbon isotopes * Oxygen isotopes * Bismuth * Age * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.383, year: 2013

  9. Response of the Karst Phreatic Zone to Flood Events in a Major River (Bohemian Karst, Czech Republic) and its Implication for Cave Genesis

    Czech Academy of Sciences Publication Activity Database

    Vysoká, H.; Bruthans, J.; Žák, Karel; Mls, J.

    2012-01-01

    Roč. 74, č. 1 (2012), s. 65-81 ISSN 1090-6924 R&D Projects: GA ČR GAP210/10/1760 Institutional research plan: CEZ:AV0Z30130516 Keywords : karst * cave genesis * Bohemian Karst Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.474, year: 2012

  10. Deciphering the Variscan tectonothermal overprint and deformation partitioning in the Cadomian basement of the Teplá-Barrandian unit, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Hajná, J.; Žák, J.; Kachlík, V.; Chadima, Martin

    2012-01-01

    Roč. 101, č. 7 (2012), s. 1855-1873 ISSN 1437-3254 Institutional support: RVO:67985831 Keywords : Avalonian-Cadomian belt * Bohemian Massif * Shear zone * Teplá-Barrandian unit * transpression * Variscan orogeny Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.261, year: 2012

  11. Origin of eclogite and garnet pyroxenite from the Moldanubian Zone of the Bohemian Massif, Czech Republic and its implication to other mafic layers embedded in orogenic peridotites

    Czech Academy of Sciences Publication Activity Database

    Obata, M.; Hirajima, T.; Svojtka, Martin

    2006-01-01

    Roč. 88, 1-2 (2006), s. 321-340 ISSN 0930-0708 R&D Projects: GA AV ČR IAA3013006 Institutional research plan: CEZ:AV0Z30130516 Keywords : eclogite * pyroxenite * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.038, year: 2006

  12. Pleistocene speleothem fracturing in the foreland of the Western Carpathians: a case study from the seismically active eastern margin of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Bábek, O.; Briestenský, Miloš; Přecechtělová, G.; Štěpančíková, Petra; Hellstrom, J.C.; Drysdale, R.N.

    2015-01-01

    Roč. 59, č. 3 (2015), s. 491-506 ISSN 1641-7291 R&D Projects: GA ČR GAP210/12/0573 Institutional support: RVO:67985891 Keywords : speleothems * U/Th series dating * palaeoseismicity * Pleistocene * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.858, year: 2015

  13. Multiphase formation of the Obří důl polymetallic skarn deposit, West Sudetes, Bohemian Massif: geochemistry and Re–Os dating of sulfide mineralization

    Czech Academy of Sciences Publication Activity Database

    Veselovský, F.; Ackerman, Lukáš; Pašava, J.; Žák, Karel; Haluzová, Eva; Creaser, R. A.; Dobeš, P.; Erban, V.; Tásler, R.

    2018-01-01

    Roč. 53, č. 5 (2018), s. 665-682 ISSN 0026-4598 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : Bohemian Massif * polymetallic skarn deposit * West Sudetes * arsenopyrite * Re–Os geochronology Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 3.396, year: 2016

  14. Origin of the Okrouhlá Radouň episyenite-hosted uranium deposit, Bohemian Massif, Czech Republic: fluid inclusion and stable isotope constraints

    Czech Academy of Sciences Publication Activity Database

    Dolníček, Z.; René, Miloš; Hermannová, S.; Prochaska, W.

    2014-01-01

    Roč. 49, č. 4 (2014), s. 409-425 ISSN 0026-4598 R&D Projects: GA MŠk ME10083 Institutional support: RVO:67985891 Keywords : Bohemian Massif * Uranium mineralization * Episyenite * Fluid inclusions Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.561, year: 2014

  15. The Blaník Gneiss in the southern Bohemian Massif (Czech Republic): a rare rock composition among the early palaeozoic granite of Variscan Central Europe

    Czech Academy of Sciences Publication Activity Database

    René, Miloš; Finger, F.

    2016-01-01

    Roč. 110, č. 4 (2016), 503-514 ISSN 0930-0708 R&D Projects: GA MŠk ME 555 Institutional support: RVO:67985891 Keywords : leucogranite * turmaline * petrology * geochemistry * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.236, year: 2016

  16. The polycyclic Lausche Volcano (Lausitz Volcanic Field) and its message concerning landscape evolution in the Lausitz Mountains (northern Bohemian Massif, Central Europe)

    Czech Academy of Sciences Publication Activity Database

    Wenger, E.; Büchner, J.; Tietz, O.; Mrlina, Jan

    2017-01-01

    Roč. 292, September (2017), s. 193-210 ISSN 0169-555X Institutional support: RVO:67985530 Keywords : Lausche * polycyclic volcanism * Lausitz Overthrust (Lusatian Fault) * North Bohemian-Saxonian Cretaceous Basin Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: Volcanology Impact factor: 2.958, year: 2016

  17. New biostratigraphic evidence (texanitid ammonites, inoceramids and calcareous nannofossils) for the Upper and the uppermost Coniacian in the Bohemian Cretaceous Basin

    Czech Academy of Sciences Publication Activity Database

    Svobodová, Andrea; Košťák, M.; Čech, S.; Švábenická, L.

    2014-01-01

    Roč. 165, č. 4 (2014), s. 577-589 ISSN 1860-1804 Institutional support: RVO:67985831 Keywords : Bohemian Cretaceous Basin * Upper Coniacian * biostratigraphy * ammonites * inoceramids * calcareous nannofossils Subject RIV: DB - Geology ; Mineralogy Impact factor: 0.569, year: 2014

  18. Types of soft-sediment deformation structures in a lacustrine Ploužnice member (Stephanian, Gzhelian, Pennsylvanian, Bohemian Massif), their timing, and possible trigger mechanism

    Czech Academy of Sciences Publication Activity Database

    Stárková, M.; Martínek, K.; Mikuláš, Radek; Rosenau, N.

    2015-01-01

    Roč. 104, č. 5 (2015), s. 1277-1298 ISSN 1437-3254 Institutional support: RVO:67985831 Keywords : soft-sediment deformation structures * bioturbation * early diagenetic carbonate * lacustrine facies * Bohemian Massif * Stephanian C * Krkonoše Piedmont Basin Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.133, year: 2015

  19. Long-lasting Cadomian magmatic activity along an active northern Gondwana margin: U-Pb zircon and Sr-Nd isotopic evidence from the Brunovistulian Domain, eastern Bohemian Massif

    Science.gov (United States)

    Soejono, Igor; Janoušek, Vojtěch; Žáčková, Eliška; Sláma, Jiří; Konopásek, Jiří; Machek, Matěj; Hanžl, Pavel

    2017-09-01

    Cadomian magmatic complexes of the Brunovistulian Domain crop out at the eastern termination of the Bohemian Massif. However, the age, nature and geotectonic affinity of some of pre-Variscan (meta-)igneous rock complexes from this domain are still unknown. Geochronological and geochemical study of the granitic rocks across the Brunovistulian Domain reveals new information about the timing and nature of this magmatic activity originally situated along the northern margin of Gondwana. Zircon U-Pb data (601 ± 3 Ma, Brno Massif; 634 ± 6 Ma, paraautochtonous core of the Svratka Dome; 568 ± 3 Ma, Bíteš orthogneiss) from the allochtonous Moravicum indicate the prolonged magmatic activity within the Brunovistulian Domain during the Ediacaran. The major- and trace-element and Sr-Nd isotopic signatures show heterogeneous geochemical characteristics of the granitic rocks and suggest a magmatic-arc geotectonic setting. The two-stage Depleted Mantle Nd model ages ( c. 1.3-2.0 Ga) indicate derivation of the granitic rocks from a relatively primitive crustal source, as well as from an ancient and evolved continental crust of the Brunovistulian Domain. These results constrain the magmatic-arc activity to c. 635-570 Ma and provide a further evidence for a long-lived (at least c. 65 Myr) and likely episodic subduction-related magmatism at the northern margin of Gondwana. The presence of granitic intrusions derived from variously mature crustal sources at different times suggests heterogeneous crustal segments to having been involved in the magmatic-arc system during its multistage evolution.

  20. Complex Comparison of Bavarian and Bohemian Forest National Parks from Geographical Perspective: Is there More Similarity or Difference?

    Directory of Open Access Journals (Sweden)

    Janík Tomáš

    2017-01-01

    Full Text Available This article focuses on comparison of the landscape of two National Parks (Bavarian and Bohemian Forest, which together create the largest area of wilderness in Central Europe. The article shows how different they are in social-economic and physical-geographical perspective. Social and economic conditions were introduced from perspective of path dependency and recent situation and its perception. Furthermore, we integrated social-economic and environmental perspective in the ecosystem services concept. Despite the lesser number tourists arriving to the Bavarian part of the area, perception is better than among mayors of municipalities on the Czech side. Different history, management and top-down and bottom-up approaches usage can explain these differences. The typologies of environmental conditions help us to distinguish differences between both National Parks. In the Bavarian Forest we can find more equal share of forests (coniferous, broad-leaved, mixed and surprisingly, thanks to large unmanaged part bigger relative share of regenerating forest landscapes than in the Bohemian Forest. Physical-geographical typology distinguishes five classes. Relative distribution of the classes is similar, but we can determine area of high plateau mainly on Czech side and on the other hand class of steeper terrain is located mainly in Bavarian Forest. Ecosystem services was presented by integrating landscape capacity analysis showing small differences between both National Parks in this case and no relation between land cover and attractiveness for tourism.

  1. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  2. ETIČNE DILEME PODJETNIKA

    OpenAIRE

    Cvek, Tadej

    2010-01-01

    Etika in morala se skozi čas nenehno spreminjata in nekatere stvari, ki so danes nedovoljene, so bile še pred kratkim dovoljene in obratno. Razlog za to so predvsem družbene in kulturne spremembe, ki vodijo do drugačnih pogledov na stvari in okolico. Skladno z razvojem etike in morale, se razvijajo tudi nove etične teorije, ki še ne dosegajo starejših teorij a vendarle pridobivajo na pomembnosti in kdo ve, mogoče jih bodo kdaj v prihodnosti tudi presegle. Za MNP je pomembno, da razlikuje...

  3. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  4. Precursory groundwater level changes in the period of activation of the weak intraplate seismic activity on the NE margin of the Bohemian Massif (central Europe) in 2005

    Czech Academy of Sciences Publication Activity Database

    Stejskal, Vladimír; Kašpárek, L.; Kopylova, Galina N.; Lyubushin, Alexei A.; Skalský, Lumír

    2009-01-01

    Roč. 53, č. 2 (2009), s. 215-238 ISSN 0039-3169 R&D Projects: GA ČR GA205/09/1244; GA ČR(CZ) GD205/05/H020 Institutional research plan: CEZ:AV0Z30460519; CEZ:AV0Z30120515 Keywords : seismic activity * earthquake precursors * groundwater Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.000, year: 2009

  5. Alkaline and Carbonate-rich Melt Metasomatism and Melting of Subcontinental Lithospheric Mantle: Evidence from Mantle Xenoliths, NE Bavaria, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Špaček, Petr; Magna, T.; Ulrych, Jaromír; Svojtka, Martin; Hegner, E.; Balogh, K.

    2013-01-01

    Roč. 54, č. 12 (2013), s. 2597-2633 ISSN 0022-3530 R&D Projects: GA ČR GA205/09/1170 Institutional research plan: CEZ:AV0Z30130516; CEZ:AV0Z30120515 Institutional support: RVO:67985831 ; RVO:67985530 Keywords : peridotite * metasomatism * subcontinental lithosphere * Sr-Nd-Li isotopes * microstructure Subject RIV: DB - Geology ; Mineralogy Impact factor: 4.485, year: 2013

  6. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  7. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  8. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  9. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  10. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  11. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  12. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  13. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  14. Remelting of nanogranitoids in UHP felsic granulites from Erzgebirge (Bohemian Massif, Germany)

    Science.gov (United States)

    Acosta-vigil, A.; Stöckhert, B.; Hermann, J.; Yaxley, G.; Cesare, B.; Bartoli, O.

    2017-12-01

    Crustal melting commonly takes place at pressures ≤ 1.5 GPa. Anatexis at UHP conditions, however, can occur during subduction of continental crust down to mantle depths. Understanding the timing, mechanisms and nature of this process is important as it has major mechanical and geochemical implications. One way to address this problem is through the novel studies of nanogranitoids in migmatites and granulites (Cesare et al. 2015). We have remelted crystallized former melt inclusions (nanogranitoids) trapped in garnets of diamond-bearing UHP felsic granulites from Erzgebirge, Bohemian Massif. These rocks are made of Qtz+Phe+Pl+Grt+Ky+Bt+Dia, and their peak conditions have been estimated at P≥4.5 GPa and T≥1000 ºC. Nanogranitoids appear homogeneously distributed throughout the entire garnet crystals, are 5-50 µm across and often isometric, with partially developed negative crystal shape, and were trapped during garnet growth in the presence of melt. The mineral assemblage within nanogranites consists of Qtz+Pl+Phe+Pg+Phl±Ky±Dia±Gr±Ap±Rt (Stöckhert et al. 2009). Fragments of nanogranitoids-bearing garnets were loaded inside gold capsules, enclosed in SiO2 or C powders that acted as cushion, either dry or with H2O in excess, and subjected to conditions between 975-1100 ºC and 2.5-4.5 GPa for 2-24 hrs. Re-homogenization has not been completely achieved. Nanogranitoids partially melt, melt often coexists with Als, diamond or Gr, and Grt grows into the melt to form a higher #Mg and Ti, ≈5 µm fringe. Preliminary EMP analyses indicate that melts are granitic sensu stricto, with low FeOt+MgO (≈2 wt%), moderate to high in ASI, and high in TiO2 (≈0.4-0.8 wt%), P2O5 (up to 1 wt%) and volatiles (100-EMP totals ≈ 10-15 wt%). These preliminary results suggest that (i) anatexis started in the presence of a H2O-rich fluid phase, (ii) melt was present and equilibrated at quite high T (>850-950 ºC, Hayden & Watson 2007) at or close to peak conditions, (iii) Als

  15. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  16. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  17. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  18. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  19. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  20. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  1. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  2. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  3. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  4. Consequences of coal mining and burning in the North Bohemian Brown Coal Basin (2). Territorial consequences of coal mining

    International Nuclear Information System (INIS)

    Stahlik, Z.

    1992-01-01

    Out of the 1450 km 2 of the North Bohemian Brown Coal Basin, the area of the coal-bearing territory is 850 km 2 . The area occupied by the open pits, spoil banks and mines is nearly 27O km 2 , out of which over 90 km 2 have already been recultivated. Predicted mining development scenarios for the region till 2035 are outlined. The extent of mining will decrease gradually, and land will be reclaimed. The abandoned pits will be filled with water and employed for recreation purposes. The specific features of the individual open pit mines are given. The ways to reduce the adverse environmental impacts of mining are outlined; these include, in particular, desulfurization of existing power plants on the one hand, and energy savings associated with a reduction in mining and power generation activities on the other hand. (J.B.)

  5. Production of the Ne Auger electrons by Ne/sup +/ bombardment of Mg and Al surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Ferrante, J; Pepper, S V [National Aeronautics and Space Administration, Cleveland, Ohio (USA). Lewis Research Center

    1976-07-01

    The authors have bombarded Mg and Al surfaces with Ne/sup +/ ions and in this letter present evidence for the production of an inner shell vacancy in the Ne by the asymmetric Ne-Mg and Ne-Al collision. In addition, autoionization states of neutral Ne have been observed. These states are to be distinguished from the more usual case in Auger electron spectroscopy of de-excitation of an ion with a core vacancy.

  6. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  7. Fault slip versus slope deformations: Experience from paleoseismic trenches in the region with low slip-rate faults and strong Pleistocene periglacial mass wasting (Bohemian Massif)

    Czech Academy of Sciences Publication Activity Database

    Špaček, P.; Valenta, Jan; Tábořík, Petr; Ambrož, V.; Urban, M.; Štěpančíková, Petra

    2017-01-01

    Roč. 451, 7 SEP (2017), s. 56-73 ISSN 1040-6182 R&D Projects: GA ČR GAP210/12/0573; GA MŠk(CZ) LM2015079; GA MŠk 7AMB13AT023 Institutional support: RVO:67985891 Keywords : Active faulting * Paleoseismology * Slope deformation * Solifluction * Colluvium * Quaternary * Bohemian massif Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 2.199, year: 2016

  8. Three-dimensional velocity model of the crust of the Bohemian Massif and its effects on seismic tomography of the upper mantle

    Czech Academy of Sciences Publication Activity Database

    Karousová, Hana; Plomerová, Jaroslava; Babuška, Vladislav

    2012-01-01

    Roč. 56, č. 1 (2012), s. 249-267 ISSN 0039-3169 R&D Projects: GA ČR GA205/07/1088; GA AV ČR IAA300120709 Institutional research plan: CEZ:AV0Z30120515 Keywords : crustal structure * seismic methods * Bohemian Massif * teleseismic tomography Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 0.975, year: 2012

  9. The crust-mantle transition and the Moho beneath the Vogtland/West Bohemian region in the light of different seismic methods

    Czech Academy of Sciences Publication Activity Database

    Hrubcová, Pavla; Geissler, W.H.

    2009-01-01

    Roč. 53, č. 3 (2009), s. 275-294 ISSN 0039-3169 R&D Projects: GA AV ČR IAA300120801 Institutional research plan: CEZ:AV0Z30120515 Keywords : Bohemian Massif * Vogtland/West Bohemia * crustal structure * Moho * refraction and wide-angle reflection * receiver function * seismic methods * Eger Rift Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.000, year: 2009

  10. Deformation mechanisms and grain size evolution in the Bohemian granulites - a computational study

    Science.gov (United States)

    Maierova, Petra; Lexa, Ondrej; Jeřábek, Petr; Franěk, Jan; Schulmann, Karel

    2015-04-01

    A dominant deformation mechanism in crustal rocks (e.g., dislocation and diffusion creep, grain boundary sliding, solution-precipitation) depends on many parameters such as temperature, major minerals, differential stress, strain rate and grain size. An exemplary sequence of deformation mechanisms was identified in the largest felsic granulite massifs in the southern Moldanubian domain (Bohemian Massif, central European Variscides). These massifs were interpreted to result from collision-related forced diapiric ascent of lower crust and its subsequent lateral spreading at mid-crustal levels. Three types of microstructures were distinguished. The oldest relict microstructure (S1) with large grains (>1000 μm) of feldspar deformed probably by dislocation creep at peak HT eclogite facies conditions. Subsequently at HP granulite-facies conditions, chemically- and deformation- induced recrystallization of feldspar porphyroclasts led to development of a fine-grained microstructure (S2, ~50 μm grain size) indicating deformation via diffusion creep, probably assisted by melt-enhanced grain-boundary sliding. This microstructure was associated with flow in the lower crust and/or its diapiric ascent. The latest microstructure (S3, ~100 μm grain size) is related to the final lateral spreading of retrograde granulites, and shows deformation by dislocation creep at amphibolite-facies conditions. The S2-S3 switch and coarsening was interpreted to be related with a significant decrease in strain rate. From this microstructural sequence it appears that it is the grain size that is critically linked with specific mechanical behavior of these rocks. Thus in this study, we focused on the interplay between grain size and deformation with the aim to numerically simulate and reinterpret the observed microstructural sequence. We tested several different mathematical descriptions of the grain size evolution, each of which gave qualitatively different results. We selected the two most

  11. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  12. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  13. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  14. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  15. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  16. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  17. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  18. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  19. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  20. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  1. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  2. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  3. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  4. Neutrino Interactions in MicroBooNE

    OpenAIRE

    Del Tutto, Marco

    2017-01-01

    MicroBooNE is a liquid-argon-based neutrino experiment, which began collecting data in Fermilab's Booster neutrino beam in October 2015. Physics goals of the experiment include probing the source of the anomalous excess of electron-like events in MiniBooNE. In addition to this, MicroBooNE is carrying out an extensive cross section physics program that will help to probe current theories on neutrino-nucleon interactions and nuclear effects. These proceedings summarise the status of MicroBooNE'...

  5. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  6. Shoshonitic intrusion magmatism in Pajeu-Paraiba belt: the Bom Jardim complex

    International Nuclear Information System (INIS)

    Guimaraes, I.P. de; Silva Filho, A.F. da

    1990-01-01

    The Bom Jardim complex is a multi phase intrusion emplaced within the basement of the Pajeu-Paraiba belt, in the Borborema province, N.E., Brazil, during the Pan African (Brasiliano) orogeny, 600 Ma ago. The Bom Jardim complex is primarily composed of monzonites and syenites with subordinated granites. The major and trace elements geochemistry has established a shoshonitic affinity for the monzonite-syenite assemblages, whereas the granites are clearly of a high-K calc-alkaline character. The main geochemical trends determined for the complex are the result of fractionation of mainly amphibole, biotite, alkali feldspar ±clinopyroxene within the developing magmas. The enrichment in transition metal elements, LILE and high LILE/HSFE ratios, coupled with an initial Sr sup(87)/Sr sup(86) ratio of 0.70709 is consistent with a subduction related magma source. (author)

  7. Non-intrusive, fast and sensitive ammonia detection by laser photothermal deflection

    International Nuclear Information System (INIS)

    Vries, H.S.M. de; Harren, F.J.M.; Wyers, G.P.; Otjes, R.P.; Slanina, J.; Reuss, J.

    1995-01-01

    A recently developed non-intrusive photothermal deflection (PTD) instrument allows sensitive, rapid and quantitative detection of local ammonia concentrations in the air. Ammonia is vibrationally excited by an infrared CO 2 laser in an intracavity configuration. A HeNe beam passing over the CO 2 laser beam (multipass arrangement) is deflected by the induced refractive index gradient. The detection limit for ammonia in ambient air is 0.5 ppbv with a spatial resolution of a few mm 3 . The time resolution is 0.1 s (single line) or 15 s (multi line). The system is fully automated and suited for non-stop measuring periods of at least one week. Results were compared to those obtained with a continuous-flow denuder (CFD). (author)

  8. August, 2002 - floods events, affected areas revitalisation and prevention for the future in the central Bohemian region, Czech Republic

    Science.gov (United States)

    Bina, L.; Vacha, F.; Vodova, J.

    2003-04-01

    Central Bohemian Region is located in a shape of a ring surrounding the capitol of Prague. Its total territorial area is 11.014 sq.km and population of 1 130.000 inhabitants. According to EU nomenclature of regional statistical units, the Central Bohemian Region is classified as an independent NUTS II. Bohemia's biggest rivers, Vltava and Labe form the region's backbone dividing it along a north-south line, besides that there are Sazava and Berounka, the two big headwaters of Vltava, which flow through the region and there also are some cascade man made lakes and 2 important big dams - Orlik and Slapy on the Vltava River in the area of the region. Overflowing of these rivers and their feeders including cracking of high-water dams during the floods in August 2002 caused total or partial destruction or damage of more than 200 towns and villages and total losses to the extend of 450 mil. EUR. The worst impact was on damaged or destroyed human dwellings, social infrastructure (schools, kindergartens, humanitarian facilities) and technical infrastructure (roads, waterworks, power distribution). Also businesses were considerably damaged including transport terminals in the area of river ports. Flowage of Spolana Neratovice chemical works caused critical environmental havoc. Regional crisis staff with regional Governor in the lead worked continuously during the floods and a regional integrated rescue system was subordinated to it. Due to the huge extent of the floods the crisis staff coordinated its work with central bodies of state including the Government and single "power" resorts (army, interior, transport). Immediately after floods a regional - controlled management was set up including an executive body for regional revitalisation which is connected to state coordinating resort - Ministry for Local Development, EU sources and humanitarian aid. In addition to a program of regional revitalisation additional preventive flood control programs are being developed

  9. Felsic granulite with layers of eclogite facies rocks in the Bohemian Massif; did they share a common metamorphic history?

    Science.gov (United States)

    Jedlicka, Radim; Faryad, Shah Wali

    2017-08-01

    High pressure granulite and granulite gneiss from the Rychleby Mountains in the East Sudetes form an approximately 7 km long and 0.8 km wide body, which is enclosed by amphibolite facies orthogneiss with a steep foliation. Well preserved felsic granulite is located in the central part of the body, where several small bodies of mafic granulite are also present. In comparison to other high pressure granulites in the Bohemian Massif, which show strong mineral and textural re-equilibration under granulite facies conditions, the mafic granulite samples preserve eclogite facies minerals (garnet, omphacite, kyanite, rutile and phengite) and their field and textural relations indicate that both mafic and felsic granulites shared common metamorphic history during prograde eclogite facies and subsequent granulite facies events. Garnet from both granulite varieties shows prograde compositional zoning and contains inclusions of phengite. Yttrium and REEs in garnet show typical bell-shaped distributions with no annular peaks near the grain rims. Investigation of major and trace elements zoning, including REEs distribution in garnet, was combined with thermodynamic modelling to constrain the early eclogite facies metamorphism and to estimate pressure-temperature conditions of the subsequent granulite facies overprint. The first (U)HP metamorphism occurred along a low geothermal gradient in a subduction-related environment from its initial stage at 0.8 GPa/460 °C and reached pressures up to 2.5 GPa at 550 °C. The subsequent granulite facies overprint (1.6-1.8 GPa/800-880 °C) affected the rocks only partially; by replacement of omphacite into diopside + plagioclase symplectite and by compositional modification of garnet rims. The mineral textures and the preservation of the eclogite facies prograde compositional zoning in garnet cores confirm that the granulite facies overprint was either too short or too faint to cause recrystallisation and homogenisation of the eclogite

  10. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  11. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  12. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  13. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  14. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  15. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  16. MiniBooNE Oscillation Results

    International Nuclear Information System (INIS)

    Djurcic, Zelimir

    2009-01-01

    These proceedings summarize the MiniBooNE ν μ → ν e results, describe the first (bar ν) μ → (bar ν) e result, and current analysis effort with the NuMI neutrinos detected in the miniBooNE detector

  17. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  18. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  19. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  20. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  1. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  2. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  3. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  4. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  5. Artists and Multiple Job Holding—Breadwinning Work as Mediating Between Bohemian and Entrepreneurial Identities and Behavior

    Directory of Open Access Journals (Sweden)

    Sofia Lindström

    2016-10-01

    Full Text Available Artists are known to manage low income and work insecurity by holding multiple jobs. Through an analysis of interview data, this study explores the narratives of 20 visual artists in Sweden regarding breadwinning work. Positive and negative experiences of such work are analyzed in relation to the artists’ work behavior and identity as either ‘bohemian’ or ‘entrepreneurial.’ Breadwinning work may be seen by artists as either enabling autonomy from the market or hindering the construction of a professional identity, depending on these behaviors/identities. However, conditions such as low wage, temporary contracts, and low control over work hours ultimately decides artist’s experiences of breadwinning work. This article adds to the existing knowledge on artistic labour markets by highlighting the role of multiple job holding in mediating between an understanding of the bohemian art for art’s sake artist role and the entrepreneurial role of the artist. NB: The endnotes 7 and 8 have switched places, where endnote 7 should belong to the text of endnote 8 and vice versa

  6. Evaluation of naturally occurring pigments of the North Bohemian lignite mining area; Bewertung von mineralischen Pigmentvorkommen des nordboehmischen Braunkohlenbeckens

    Energy Technology Data Exchange (ETDEWEB)

    Buntenbach, Stephan [TriMin Consulting - Mineral Processing, Ammerthal (Germany); Botula, Jiri [VSB-Technical Univ. of Ostrava (Czech Republic). Mineral Processing Dept.; Leonhardt, Hana

    2010-11-15

    The research project ''Mineral Processing Methods for the Preparation of Naturally Occurring Pigments from Overburden of the Lignite Mines and from Shallow Clay Deposits of the North Bohemian Lignite Basin'', funded by the Deutsche Bundesstiftung Umwelt DBU, was conducted as a collaboration between the AKW Apparate+Verfahren GmbH, Hirschau with the Technical University of Ostrava. Geological, mineralogical and mineral processing studies for the development of a suitable beneficiation method were carried out to investigate the possibilities of the industrial usage of beneficiated pigments of these deposits. It should be demonstrated, that the significant reserves of mineral pigments in the shallow deposits and also in the overburden of the lignite mines can be utilized ecologically and economically. Based on the results of geological prospecting work already carried out, the deposit Horenec was selected as the most important pigment deposits for the production of bolus and ochre earth. The newly carried out geological, mineralogical and chemical studies formed the basis for the following mineral processing test work and the test work for the usage of beneficiated products as colouring paint for plastic, fabric and other materials. (orig.)

  7. Rare-earth, yttrium and zirconium mobility associated with the uranium mineralisation at Okrouhla Radoun, Bohemian Massif, Czech Republic

    Energy Technology Data Exchange (ETDEWEB)

    Milos, Rene [Academy of Sciences of the Czech Republic, Prague (Czech Republic). Inst. of Rock Structure and Mechanics

    2015-01-15

    The mobility of rare-earth elements (REE), Y and Zr during the Late-Variscan and post-Variscan mineralisation event in the Okrouhla Radoun. uranium deposit has been investigated to elucidate their behaviour during the hydrothermal alteration of leucogranites and high-grade metamorphic rocks in the Moldanubian Zone (Bohemian Massif). The alteration of leucogranites has caused enrichment in Na, Ca, Fe{sup 3+}, Zr and the bulk of REE while depleting K, Fe{sup 2+}, Si, Th, Rb and Ba. The alteration of high-grade metasediments has also led to an enrichment in Na and Ca while depleting K, Si, Rb and Ba. However, this change is connected to the depletion of REE, as well as the enrichment of P and Th in the bulk. The high mobility of Y and Zr during formation of the uranium mineralisation is supported by the occurrence of Y- and Zr-rich coffinite (up to 3.4 wt.% Y{sub 2}O{sub 3} and 13.8 wt.% ZrO{sub 2}). The massive hydrothermal alteration of host rocks, as well as the high mobility of REE, Y and Zr indicate an influx of oxidised basinal fluids in the Permian to the crystalline rocks of the Moldanubian Zone.

  8. Preliminary Study of the Pozzolanic Activity of Dumped Mine Wastes Obtained from the North Bohemian Basin in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Konstantinos SOTIRIADIS

    2017-02-01

    Full Text Available Three dumped raw materials, a tuff and two bentonites, obtained from two mining sites at the North Bohemian basin in the Czech Republic, have been studied in order to evaluate them as pozzolanic admixtures in lime mortars for employment in restoration of cultural heritage objects. After thermal activation (800 °C; 5 h, their pozzolanic properties were compared with those of commercial metakaolin. Quantitative phase analysis with the Rietveld method from X-ray powder diffraction patterns, morphological observations, as well as the Frattini and the modified Chapelle tests were performed. In addition, lime mortars, incorporating the fired materials, were prepared and subjected to simultaneous thermal analysis after a 28-day initial curing (20 ± 1 °C; 60 ± 5 % RH. The results showed that all three materials possess pozzolanic activity. However, when employed in lime mortars they did not result in formation of pozzolanic reaction products. Two methods were proposed to improve their reactivity; grinding to obtain finer particle size and removal of quartz content where necessary.DOI: http://dx.doi.org/10.5755/j01.ms.23.1.14864

  9. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  10. The MiniBooNE detector

    International Nuclear Information System (INIS)

    Aguilar-Arevalo, A.A.; Anderson, C.E.; Bartoszek, L.M.; Bazarko, A.O.; Brice, S.J.; Brown, B.C.; Bugel, L.; Cao, J.; Coney, L.; Conrad, J.M.; Cox, D.C.; Curioni, A.; Djurcic, Z.; Finley, D.A.; Fleming, B.T.; Ford, R.; Garcia, F.G.; Garvey, G.T.; Green, C.; Green, J.A.

    2009-01-01

    The MiniBooNE neutrino detector was designed and built to look for ν μ →ν e oscillations in the (sin 2 2θ,Δm 2 ) parameter space region where the LSND experiment reported a signal. The MiniBooNE experiment used a beam energy and baseline that were an order of magnitude larger than those of LSND so that the backgrounds and systematic errors would be completely different. This paper provides a detailed description of the design, function, and performance of the MiniBooNE detector.

  11. The NeXus data format

    OpenAIRE

    Könnecke, Mark; Akeroyd, Frederick A.; Osborn, Raymond; Peterson, Peter F.; Richter, Tobias; Suzuki, Jiro; Watts, Benjamin; Wintersberger, Eugen; Wuttke, Joachim; Bernstein, Herbert J.; Brewster, Aaron S.; Campbell, Stuart I.; Clausen, Björn; Cottrell, Stephen; Hoffmann, Jens Uwe

    2015-01-01

    NeXus is an effort by an international group of scientists to define a common data exchange and archival format for neutron, X-ray and muon experiments. NeXus is built on top of the scientific data format HDF5 and adds domain-specific rules for organizing data within HDF5 files, in addition to a dictionary of well defined domain-specific field names. The NeXus data format has two purposes. First, it defines a format that can serve as a container for all relevant data associated with a beamlin...

  12. The MiniBooNE Detector

    OpenAIRE

    MiniBooNE Collaboration

    2008-01-01

    The MiniBooNE neutrino detector was designed and built to look for muon-neutrino to electron-neutrino oscillations in the mixing parameter space region where the LSND experiment reported a signal. The MiniBooNE experiment used a beam energy and baseline that were an order of magnitude larger than those of LSND so that the backgrounds and systematic errors would be completely different. This paper provides a detailed description of the design, function, and performance of the MiniBooNE detector.

  13. Petrological, Geochemical and Sr–Nd–O Isotopic Constraints on the Origin of Garnet and Spinel Pyroxenites from the Moldanubian Zone of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Svojtka, Martin; Ackerman, Lukáš; Medaris Jr., G.; Hegner, E.; Valley, J. W.; Hirajima, T.; Jelínek, E.; Hrstka, Tomáš

    2016-01-01

    Roč. 57, č. 5 (2016), s. 897-920 ISSN 0022-3530 Grant - others:Rada Programu interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : garnet and spinel pyroxenites * Bohemian Massif * Sr, Nd, and oxygen isotopes * trace elements * subduction Subject RIV: DD - Geochemistry Impact factor: 3.280, year: 2016

  14. Re-Os and Lu-Hf isotopic constraints on the formation and age of mantle pyroxenites from the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Bizimis, M.; Haluzová, Eva; Sláma, Jiří; Svojtka, Martin; Hirajima, T.; Erban, V.

    256/257, July (2016), s. 197-210 ISSN 0024-4937 Grant - others:Rada Programu interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : Bohemian Massif * Lu-Hf * mantle * pyroxenite * Re-Os Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.677, year: 2016

  15. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  16. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  17. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  18. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  19. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  20. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  1. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  2. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  3. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  4. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  5. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  6. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  7. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  8. The NeXus data format.

    Science.gov (United States)

    Könnecke, Mark; Akeroyd, Frederick A; Bernstein, Herbert J; Brewster, Aaron S; Campbell, Stuart I; Clausen, Björn; Cottrell, Stephen; Hoffmann, Jens Uwe; Jemian, Pete R; Männicke, David; Osborn, Raymond; Peterson, Peter F; Richter, Tobias; Suzuki, Jiro; Watts, Benjamin; Wintersberger, Eugen; Wuttke, Joachim

    2015-02-01

    NeXus is an effort by an international group of scientists to define a common data exchange and archival format for neutron, X-ray and muon experiments. NeXus is built on top of the scientific data format HDF5 and adds domain-specific rules for organizing data within HDF5 files, in addition to a dictionary of well defined domain-specific field names. The NeXus data format has two purposes. First, it defines a format that can serve as a container for all relevant data associated with a beamline. This is a very important use case. Second, it defines standards in the form of application definitions for the exchange of data between applications. NeXus provides structures for raw experimental data as well as for processed data.

  9. UCB-NE-107 user's manual

    International Nuclear Information System (INIS)

    Lee, W.W.L.

    1989-03-01

    The purpose of this manual is to provide users of UCB-NE-107 with the information necessary to use UCB-NE-107 effectively. UCB-NE-107 is a computer code for calculating the fractional rate of readily soluble radionuclides that are released from nuclear waste emplaced in water-saturated porous media. Waste placed in such environments will gradually dissolve. For many species such as actinides and rare earths, the process of dissolution is governed by the exterior flow field, and the chemical reaction rate or leaching rate. However, for readily soluble species such as 135 Cs, 137 Cs, and 129 I, it has been observed that their dissolution rates are rapid. UCB-NE-107 is a code for calculating the release rate at the waste/rock interface, to check compliance with the US Nuclear Regulatory Commission's (USNRC) subsystem performance objective. It is an implementation of the analytic solution given below. 5 refs., 2 figs

  10. Physics Motivations of SciBooNE

    International Nuclear Information System (INIS)

    Hiraide, K.

    2007-01-01

    SciBooNE is a new experiment for measuring neutrino-nucleus cross sections around one GeV region, which is important for the interpretaion of neutrino oscillation experiments. Physics motivations of the experiment are described here

  11. Metamorphic history of garnet-rich gneiss at Ktiš in the Lhenice shear zone, Moldanubian Zone of the southern Bohemian Massif, inferred from inclusions and compositional zoning of garnet

    Czech Academy of Sciences Publication Activity Database

    Kobayashi, T.; Hirajima, T.; Kawakami, T.; Svojtka, Martin

    2011-01-01

    Roč. 124, 1/2 (2011), s. 46-65 ISSN 0024-4937 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Massif * Lhenice shear zone * garnet * P-T path * partial melting Subject RIV: DB - Geology ; Mineralogy Impact factor: 3.246, year: 2011

  12. Geochemical characteristics and petrogenesis of phonolites and trachytic rocks from the České Středohoří Volcanic Complex, the Ohře Rift, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Ulrych, Jaromír; Řanda, Zdeněk; Erban, V.; Hegner, E.; Magna, T.; Balogh, K.; Frána, Jaroslav; Lang, Miloš; Novák, Jiří Karel

    224/225, May (2015), s. 256-271 ISSN 0024-4937 R&D Projects: GA AV ČR IAA3048201 Institutional support: RVO:67985831 ; RVO:61389005 Keywords : phonolite * trachyte * Sr–Nd–Li isotopes * Cenozoic alkaline volcanism * Ohře (Eger) Rift * Bohemian Massif Subject RIV: DD - Geochemistry Impact factor: 3.723, year: 2015

  13. Preliminary results of a study on the soil mesofauna in disturbed spruce forest stands near Čertovo and Plešné Lakes in the Bohemian Forest (Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Čuchta, Peter; Starý, Josef

    2015-01-01

    Roč. 79, č. 3 (2015), s. 161-167 ISSN 1211-376X R&D Projects: GA ČR GAP504/12/1218 Institutional support: RVO:60077344 Keywords : windthrow * bark beetle * soil arthropod s * Bohemian Forest Subject RIV: EH - Ecology, Behaviour

  14. Molybdenite-tungstenite association in the tungsten-bearing topaz greisen at Vítkov (Krkonoše-Jizera Crystalline Complex, Bohemian Massif): indication of changes in physico-chemical conditions in mineralizing system

    Czech Academy of Sciences Publication Activity Database

    Pašava, J.; Veselovský, F.; Drábek, M.; Svojtka, Martin; Pour, O.; Klomínský, J.; Škoda, R.; Ďurišová, Jana; Ackerman, Lukáš; Halodová, P.; Haluzová, Eva

    2015-01-01

    Roč. 60, č. 3 (2015), s. 149-161 ISSN 1802-6222 R&D Projects: GA ČR GA13-15390S Institutional support: RVO:67985831 Keywords : LA-ICP-MS * EMPA * molybdenite * tungstenite * transitional Mo–W and W–Mo disulfides * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.326, year: 2015

  15. Transition from island-arc to passive setting on the continental margin of Gondwana: U-Pb zircon dating of Neoproterozoic metaconglomerates from the SE margin of the Teplá-Barrandian Unit, Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Sláma, Jiří; Dunkley, D. J.; Kachlík, V.; Kusiak, M. A.

    2008-01-01

    Roč. 461, 1-4 (2008), s. 44-59 ISSN 0040-1951 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Massif * Teplá–Barrandian Unit * Neoproterozoic * Armorican Terrane Assemblage * Gondwana * zircon dating Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.677, year: 2008

  16. Petrogenesis of the Cenozoic alkaline volcanic rock series of the České Středohoří Complex (Bohemian Massif), Czech Republic: A case for two lineages

    Czech Academy of Sciences Publication Activity Database

    Dostal, J.; Schellnutt, J. G.; Ulrych, Jaromír

    2017-01-01

    Roč. 317, June (2017), s. 677-706 ISSN 0002-9599 Institutional support: RVO:67985831 Keywords : Bohemian Massif * Central European volcanic province * continental alcaline volcanism * fractional crystallization * magmatic fluids Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 4.099, year: 2016

  17. Long-lasting Cadomian magmatic activity along an active northern Gondwana margin: U-Pb zircon and Sr-Nd isotopic evidence from the Brunovistulian Domain, eastern Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Soejono, I.; Janoušek, V.; Žáčková, E.; Sláma, Jiří; Konopásek, J.; Machek, Matěj; Hanžl, P.

    2017-01-01

    Roč. 106, č. 6 (2017), s. 2109-2129 ISSN 1437-3254 Institutional support: RVO:67985530 ; RVO:67985831 Keywords : Cadomian magmatic arc * Brunovistulian Domain * Bohemian Massif * Gondwana margin * U–Pb geochronology * geochemistry Subject RIV: DB - Geology ; Mineralogy; DC - Siesmology, Volcanology, Earth Structure (GFU-E) OBOR OECD: Geology; Volcanology (GFU-E) Impact factor: 2.283, year: 2016

  18. Geochemical and petrological constraints on mantle composition of the Ohře(Eger) rift, Bohemian Massif: peridotite xenoliths from the České Středohoří Volcanic complex and northern Bohemia

    Czech Academy of Sciences Publication Activity Database

    Ackerman, Lukáš; Medaris Jr., G.; Špaček, P.; Ulrych, Jaromír

    2015-01-01

    Roč. 104, č. 8 (2015), s. 1957-1979 ISSN 1437-3254 R&D Projects: GA ČR GA205/09/1170 Institutional support: RVO:67985831 Keywords : Bohemian Massif * mantle * metasomatism * Ohře(Eger) rift * xenolith Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.133, year: 2015

  19. Uraninite, Coffinite and Brannerite from Shear-Zone Hosted Uranium Deposits of the Bohemian Massif (Central European Variscan Belt

    Directory of Open Access Journals (Sweden)

    Miloš René

    2017-03-01

    Full Text Available New mineralogical data are presented for shear-zone hosted uranium mineralisation from selected uranium deposits that occur in the Bohemian Massif. The uranium mineralisation is in high-grade metamorphic rocks of the Moldanubian Zone and/or in granitic rocks of the Moldanubian batholith and Bor pluton as complex uraninite–coffinite and uraninite–coffinite–brannerite assemblages. For analysed coffinites and brannerites, anomalous enrichment of Y (up to 3.4 wt % Y2O3 and Zr (up to 13.8 wt % ZrO2 is significant. The microprobe data indicate that coffinites from the Rožná and Okrouhlá Radouň uranium deposits contain variable PbO (0–4.3 wt %, FeO (0–2.5 wt %, Al2O3 (0–3.5 wt %, P2O5 (0–1.8 wt %, and CaO (0.7–3.5 wt %. Brannerite is present in unaltered and altered grains with variable concentrations of U4+ (0–0.5 apfu, U6+ (0.06–0.49 apfu, Ti (0.90–2.63 apfu, Ca (0.09–0.41 apfu, and low concentrations of Al (0–0.19 apfu, Th (0–0.04 apfu, Y (0–0.08 apfu, Zr (0–0.13 apfu and REE (0–0.14 apfu.

  20. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  1. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  2. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  3. Granite intrusion in a metamorphic core complex: the example of the Mykonos laccolith (Cyclades, Greece)

    Science.gov (United States)

    Denèle, Yoann; Lecomte, Emmanuel; Jolivet, Laurent; Huet, Benjamin; Labrousse, Loïc.; Le Pourhiet, Laetitia; Lacombe, Olivier

    2010-05-01

    Numerical and analogical modelling underlined the importance of a pre-existing anomaly of viscosity-density such as a granite or migmatitic body below the brittle-ductile transition as a primary cause of metamorphic core complex (MCC) developpement. While field studies of MCC show a spatial and temporal link between MCC formation and plutonic activity, thermochronological studies show that there is no link between the intrusion of granites and the velocity of slip on the detachement plane. The Aegean domain is a good natural laboratory for studying the formation of MCC and syn-tectonic granites. In the northern Cyclades, the Mykonos-Delos-Rhenia MCC is characterised by the intrusion of a plurikilometric Late Miocene pluton of I-type granite within a migmatitic gneiss dome. AMS (Anisotropy of magnetic susceptibility) and microstructural studies in the Mykonos granites combined with recent cooling rate data allow us to use the granites as strain marker. The Mykonos granitoïds form a plurikilometric laccolith slightly deeping to the east and presenting an elliptical shape with a N170°E long axis. The laccolith is strongly asymmetrical with an outlying root zone in the SW cropping out on Delos and Rhenia islands and a major body mainly developed to the NE and cropping out on Mykonos Island. The laccolith consists of various petrographic facies presenting straight contacts that demonstrate emplacement by successive pulses of more or less differentiated magmas. The laccolith was developed at the interface between the Cycladic Basement and the Blueschists Unit and within the Blueschist Unit. Two events of deformation have been recorded in the granites. The first event is characterized by submagmatic and high to middle temperature protomylonite microstructures developped during or just after the intrusion. The second event of deformation characterized by low temperature mylonites and cataclasites close to the major detachment fault corresponds to the localization of

  4. Cross section analyses in MiniBooNE and SciBooNE experiments

    OpenAIRE

    Katori, Teppei

    2013-01-01

    The MiniBooNE experiment (2002-2012) and the SciBooNE experiment (2007-2008) are modern high statistics neutrino experiments, and they developed many new ideas in neutrino cross section analyses. In this note, I discuss selected topics of these analyses.

  5. MicroBooNE: The Search For The MiniBooNE Low Energy Excess

    Energy Technology Data Exchange (ETDEWEB)

    Kaleko, David [Columbia Univ., New York, NY (United States)

    2017-01-01

    This thesis describes work towards the search for a low energy excess in MicroBooNE. What MicroBooNE is, what the low energy excess is, and how one searches for the latter in the former will be described in detail.

  6. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  7. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  8. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  9. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  10. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  11. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  12. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  13. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  14. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  15. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  16. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  17. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  18. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  19. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  20. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  1. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  2. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  3. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  4. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  5. Reaction cross section for Ne isotopes

    International Nuclear Information System (INIS)

    Panda, R.N.; Sahu, B.K.; Patra, S.K.

    2012-01-01

    In the present contribution, first the bulk properties are calculated, such as binding energy (BE), root mean square charge radius r ch , matter radius r m and quadrupole deformation parameter β 2 for 18-32 Ne isotopes in the Relativistic mean field (RMF) and effective field theory motivated RMF (E-RMF) formalisms . Then the total nuclear reaction cross section σR is analyzes for the scattering of 20 Ne and 28-32 Ne from a 12 C target at 240 MeV/nucleon by using the RMF model. Thus the objective of the present study is to calculate the bulk properties as well as a systematic analysis of σR over a range of neutron rich nuclei in the frame work of Glauber model

  6. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  7. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  8. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  9. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  10. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  11. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  12. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  13. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  14. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  15. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  16. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  17. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  18. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  19. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  20. Neutron spectrometer using NE218 liquid scintillator

    International Nuclear Information System (INIS)

    Dance, J.B.; Francois, P.E.

    1976-01-01

    A neutron spectrometer has been constructed using NE218 liquid scintillator. Discrimination against electron-gamma events was obtained usng a charge-comparison pulse shape discrimination system. The resolution obtained was about 0.25 MeV F.W.H.M. at 2.0 MeV

  1. Ne beam-Kr target interaction

    Energy Technology Data Exchange (ETDEWEB)

    Fortov, V E; Kostin, V V; Vorob` ev, V S [Russian Academy of Sciences, Moscow (Russian Federation). High Energy Density Research Center; Kulish, M I; Mintsev, V B [Russian Academy of Sciences, Chernogolovka (Russian Federation). Inst. of Chemical Physics; Hoffman, [Gesellschaft fuer Schwerionenforschung, Darmstadt (Germany)

    1997-12-31

    Energetic heavy ions of Ne - crystal Kr target interaction is investigated both experimentally and with the help of a 2-D computer code. The dynamics of the target matter heating, expansion, and destruction are described. A new equation of state for Kr was obtained and tested within a wide range of parameters. (author). 2 figs., 10 refs.

  2. The DAΦNE cryogenic system

    International Nuclear Information System (INIS)

    Modena, M.

    1997-12-01

    The DAΦNE Project utilises superconductivity technology for a total of six superconducting magnets: the two Experiment magnets (KLOE and FINUDA) and the four Compensator Solenoid magnets needed to compensate the magnetic effect of the Experiment magnets on the electron and positron beams. This effect, on beams of 510 MeV (nominal DAΦNE Energy), is expected to be relevant, especially with the aim of achieving a very high luminosity, which is the main target of the Project. The KLOE superconducting magnet has two possible working positions: the first in the DAΦNE Hall, when the Experiment will be in operation, and the second one in the KLOE Assembly Hall. This second position is the first to be utilised for the KLOE magnet Acceptance Test and magnetic field mapping, prior to the mounting of all the experimental apparatus inside the magnet. This note intends to present the DAΦNE Cryogenic System and how the authors have converged to the definition of a common Cryogenic System compatible with all the six superconducting magnets

  3. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  4. Nivation forms and processes in unconsolidated sediments, NE Greenland

    DEFF Research Database (Denmark)

    Christiansen, Hanne Hvidtfeldt

    1998-01-01

    Nivation, Nivation Hollow, Nival Backwall Faliure, Active layer Interflow, Pronival alluvial fans, NE Greenland......Nivation, Nivation Hollow, Nival Backwall Faliure, Active layer Interflow, Pronival alluvial fans, NE Greenland...

  5. Study of the magmatism related to the rifting of the central and southern Atlantic: 40Ar/39Ar geochronology and geochemistry of Jurassic intrusives of Guinea and French Guyana/Surinam, and Cretaceous intrusives of Brazil

    International Nuclear Information System (INIS)

    Deckart, K.

    1996-01-01

    The initial stage of continental rifting in the Central and South Atlantic has been accompanied by tholeiitic magmatism, which is mainly represented by sills, dykes, layered intrusions and lava flows. During the rifting progression, the syn-rift stage in the South Atlantic has been accompanied by abundant alkaline magmatism. A geochronological and geochemical study has been performed on these formations with the aim to contribute to the understanding of the early continental rifting processes and their evolution. 40 Ar/ 39 Ar analyses have been done on tholeiitic intrusives of Guinea and French Guyana/Surinam, tholeiitic dykes, associated with the Parana volcanism (Brazil), and alkaline dykes in the region of Rio de Janeiro (Brazil). The geochemical and isotopic study has been focused on the tholeiitic intrusions from Guinea and French Guyana/Surinam. These three arms may represent the three branches of a triple junction which was active between 134 to 129 Ma, and which was at the origin of at least the northern Parana traps. Even if the principal magmatic activity can be related to the thermal anomaly due to the Tristan da Cunha hotspot, which favours an active rifting, the tectonic system of the triple junction is not compatible in time and space with this hotspot and therefore with this geodynamic model. It is possible that the Parana traps (133-130 Ma) are only partly contemporaneous and therefore, they might be not related to the same mode of geodynamic initiation. Biotites from the alkaline magmatics of the dyke swarm (NE-SW) near Rio de Janeiro display plateau ages between 82 and 70 Ma; this intense alkaline magmatism was related to vertical movements characterising the syn-rift stage not only in SE-Brazil but also in equatorial Africa. (author)

  6. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  7. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  8. Lääne-Virumaa TOP 100 aastal 2000

    Index Scriptorium Estoniae

    2001-01-01

    Lääne-Virumaa edukamad ettevõtted; Lääne-Virumaa käibe TOP 100; Käibe kasvu TOP 20; Käibe languse TOP 10; Kasumi TOP 20; Kasumi kasvu TOP 20; Rentabluse TOP 20; ROA TOP 20; Kasumi languse TOP 10; Kahjumi TOP 10; Lääne-Virumaa käibelt suuremate ettevõtete finantsandmed. Lääne-Virumaa ettevõtete üldandmed

  9. Current Status of the MiniBooNE Experiment

    OpenAIRE

    Ray, H.; collaboration, for the MiniBooNE

    2004-01-01

    MiniBooNE is an experiment designed to refute or confirm the LSND anti-nu_mu -> anti-nu_e oscillation result. MiniBooNE will look for oscillations of nu_mu -> nu_e in a closed-box appearance analysis. MiniBooNE began collecting data in 2002, and is expected to continue data taking through 2005. Current MiniBooNE results are presented.

  10. Yrast and high spin states in 22Ne

    International Nuclear Information System (INIS)

    Szanto, E.M.; Toledo, A.S. de

    1982-08-01

    High spin states in 22 Ne have been investigated by the reactions 11 B( 13 C,d) 22 Ne and 13 C( 11 B,d) 22 Ne up to E* approximately=19 MeV. Yrast states were observed at 11.02 MeV (8 + ) and 15.46 MeV (10 + ) excitation energy. A backbending in 22 Ne is observed around spin 8 + . The location of high spin states I [pt

  11. The Chaîne des Puys: how complicated can monogentic get?

    Science.gov (United States)

    Van Wyk de Vries, B.; Grosse, P.; Marquez, A.; Petronis, M. S.; Kervyn, M.; Delcamp, A.; Mossoux, S.; Troll, V. R.

    2012-12-01

    The Chaîne des Puys (Massif Centrale of France) is part of a prospective volcano-tectonic UNESCO World Heritage site including the Limagne Rift fault (http://www.chainedespuys-failledelimagne.com/). The strategy is to present the monogentic field that is as representative of other such fields, but which itself is uniquely special. Effectively, the Chaîne des Puys would become a sort of ambassador for monogentic volcanism, raising the profile of all other sites. Here, I want to go through some recent work on the chain, looking at morphology, morphometry, structure, lithology and petrology and show some of the intriguing complexities of this classic highly variable monogentic alignment. Also, I want to build on the historical development of ideas that can be traced back to characters such as Montlosier, Humphrey Davey, Faraday, Lyell, and Von Humbolt... and many more. I focus, first, on the central the Puy de Dôme. This classic trachyte dome has been known for some time to be the product of two eruptions, and recently we have found that it is related to a number of cryptodome intrusions that have created flanking bulges, fed at least two major explosive eruptions, and extensively modified the topography of the field. Strangely, Von Humbolt's concept of 'craters of elevation' rises up in a reanalysis of these structures. Secondly, I visit Lemptégy (www.auvergne-volcan.com/), that in 1857, Scrope called 'an insignificant cone grazed by sheep', but now quarried out and showing the internal structure expected for the Puy de Dôme bulges, as well as illustrating that a seemingly simple scoria cone plumbing can be infernally complicated. Thirdly, I consider the Beaunit, a bucolic village in a maar, where the process of crustal ingestion suggests an intimate relationship between eruptive dynamics and assimilation. With these three examples I show some of the complications and interactions of monogentic basaltic to trachytic volcanism typified by the Chaîne des Puys.

  12. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  13. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  14. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  16. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  17. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  18. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Domain structure and texture in fine grained symplectite from garnet breakdown in peridotite xenoliths (Zinst, Bavaria, Bohemian Massif)

    Science.gov (United States)

    Habler, G.; Špaček, P.; Abart, R.

    2012-04-01

    Lherzolite xenoliths entrained in Oligocene basanite at the locality of Zinst (Bavaria, western Bohemian Massif) contain rare fine-grained symplectites forming about 5 millimeter sized patches comprising several microstructurally and chemically distinct concentric zones. The symplectites reflect a complex reaction history of lherzolite during decompression and interaction with melt. Here we focus on ultra-fine grained symplectite with an integrated bulk composition expressed in terms of garnet end-member component percentages as Prp(69-71)Alm(11-13)Grs(2.5-5)And(7.5-10)Uvr(4). According to the composition and the microstructural occurrence in lherzolite the ultra-fine grained symplectite is interpreted as a product of isochemical garnet breakdown, although the precursor phase is not preserved. Under cross polarized light patches with similar extinction show a domain microstructure in symplectite. BSE images reveal an intimate intergrowth of orthopyroxene, spinel and plagioclase. All phases have a shape preferred orientation within distinct domains, whereas discontinuous SPO changes occur at microstructural domain boundaries. Three types of symplectite were microstructurally discerned: The most pristine type A occurs in a 10-30 micrometers wide zone along the symplectite margin. Spinel forms several tens of nanometers wide rods or lamellae within Opx, whereas Pl and Opx represent the symplectite matrix. All phases show a strong SPO with the maximum elongation perpendicular to the symplectite boundary. At edges of this interface, the SPO of the symplectite phases changes accordingly. Discontinuities in SPO may coincide with changes in crystallographic orientation. EBSD data showed that symplectite phases have strict crystallographic orientation relations with Opx(100)//Spl(111) and Opx(010)//Spl(110). Whereas the initial lattice orientation is controlled by adjacent phases at the symplectite boundary, the crystallographic orientation within symplectite domains

  20. Collision-induced intramultiplet mixing for the Ne**[(2p)5(3p)] + He or Ne system

    International Nuclear Information System (INIS)

    Manders, M.P.I.

    1988-01-01

    For the Ne**-He case, experimental data are confronted with quantum mechanical calculations. Quantum mechanical coupled-channel calculations using model potentials as input are presented, followed by a semiclassical approach which provides more physical insight. Experimental results are presented for the Ne**-Ne system with a discussion of the general principles involved in symmetrization. 184 refs.; 93 figs.; 19 tabs

  1. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  2. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  3. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  4. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  5. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  6. UCB-NE-101 user's manual

    International Nuclear Information System (INIS)

    Lee, W.W.L.

    1989-02-01

    The purpose of this manual is to provide users of UCB-NE-101 with the information necessary to use UCB-NE-101 effectively. UCB-NE-101 calculates the concentration of solubility-limited species as a function of space and time and its mass flux rates from a waste sphere buried in a nuclear waste repository in water-saturated rock. The waste is surrounded by one type of rock, and some distance away, there is another type of rock. The inner layer of rock can be a backfill around a nuclear waste package and the outer layer the natural rock. The mass flux calculated is at the interface of the two layers. The species concentration calculated is in the inner layer. A constant concentration of the species, usually the solubility, is specified at the waste sphere/inner layer interface. Dissolution and transport is governed by the solubility of the species, and diffusion in the porous media. 1 ref., 1 fig

  7. Performance Analysis of Different NeQuick Ionospheric Model Parameters

    Directory of Open Access Journals (Sweden)

    WANG Ningbo

    2017-04-01

    Full Text Available Galileo adopts NeQuick model for single-frequency ionospheric delay corrections. For the standard operation of Galileo, NeQuick model is driven by the effective ionization level parameter Az instead of the solar activity level index, and the three broadcast ionospheric coefficients are determined by a second-polynomial through fitting the Az values estimated from globally distributed Galileo Sensor Stations (GSS. In this study, the processing strategies for the estimation of NeQuick ionospheric coefficients are discussed and the characteristics of the NeQuick coefficients are also analyzed. The accuracy of Global Position System (GPS broadcast Klobuchar, original NeQuick2 and fitted NeQuickC as well as Galileo broadcast NeQuickG models is evaluated over the continental and oceanic regions, respectively, in comparison with the ionospheric total electron content (TEC provided by global ionospheric maps (GIM, GPS test stations and JASON-2 altimeter. The results show that NeQuickG can mitigate ionospheric delay by 54.2%~65.8% on a global scale, and NeQuickC can correct for 71.1%~74.2% of the ionospheric delay. NeQuick2 performs at the same level with NeQuickG, which is a bit better than that of GPS broadcast Klobuchar model.

  8. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  9. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  10. Sterile Neutrino Searches in MiniBooNE and MicroBooNE

    Energy Technology Data Exchange (ETDEWEB)

    Ignarra, Christina M. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    2014-09-01

    Tension among recent short baseline neutrino experiments has pointed toward the possible need for the addition of one or more sterile (non-interacting) neutrino states into the existing neutrino oscillation framework. This thesis first presents the motivation for sterile neutrino models by describing the short-baseline anomalies that can be addressed with them. This is followed by a discussion of the phenomenology of these models. The MiniBooNE experiment and results are then described in detail, particularly the most recent antineutrino analysis. This will be followed by a discussion of global fits to world data, including the anomalous data sets. Lastly, future experiments will be addressed, especially focusing on the MicroBooNE experiment and light collection studies. In particular, understanding the degradation source of TPB, designing the TPB-coated plates for MicroBooNE and developing lightguide collection systems will be discussed. We find an excess of events in the MiniBooNE antineutrino mode results consistent with the LSND anomaly, but one that has a different energy dependence than the low-energy excess reported in neutrino mode. This disagreement creates tension within global fits which include up to three sterile neutrinos. The low-energy excess will be addressed by the MicroBooNE experiment, which is expected to start taking data in early 2015. Tension among existing experiments calls for additional, more decisive future experiments.

  11. Sterile Neutrino Searches in MiniBooNE and MicroBooNE

    Energy Technology Data Exchange (ETDEWEB)

    Ignarra, Christina M. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    2014-09-01

    Tension among recent short baseline neutrino experiments has pointed toward the possible need for the addition of one or more sterile (non-interacting) neutrino states into the existing neutrino oscillation framework. This thesis fi rst presents the motivation for sterile neutrino models by describing the short-baseline anomalies that can be addressed with them. This is followed by a discussion of the phenomenology of these models. The MiniBooNE experiment and results are then described in detail, particularly the most recent antineutrino analysis. This will be followed by a discussion of global fits to world data, including the anomalous data sets. Lastly, future experiments will be addressed, especially focusing on the MicroBooNE experiment and light collection studies. In particular, understanding the degradation source of TPB, designing the TPB-coated plates for MicroBooNE and developing lightguide collection systems will be discussed. We find an excess of events in the MiniBooNE antineutrino mode results consistent with the LSND anomaly, but one that has a di fferent energy dependence than the low-energy excess reported in neutrino mode. This disagreement creates tension within global fi ts which include up to three sterile neutrinos. The low-energy excess will be addressed by the MicroBooNE experiment, which is expected to start taking data in early 2015. Tension among existing experiments calls for additional, more decisive future experiments.

  12. Comments to the article by Verner et al.: Magmatic history and geophysical signature of a post-collisional intrusive center

    Czech Academy of Sciences Publication Activity Database

    Breiter, Karel

    2011-01-01

    Roč. 100, č. 4 (2011), s. 889-891 ISSN 1437-3254 Institutional research plan: CEZ:AV0Z30130516 Keywords : Bohemian Massif * Boehmerwald * Ploeckenstein pluton * granite Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.342, year: 2011

  13. Sr-Nd-Pb isotope compositions of felsic intrusions in the El Teniente and Laguna La Huifa areas, Central Chile

    International Nuclear Information System (INIS)

    Rabbia, O.M.; Hernandez, L.B.; King, R.W.; Lopez Escobar, L

    2001-01-01

    The giant El Teniente porphyry Cu-Mo deposit is located in the Andes foothills of Central Chile (34 o S). In simplistic terms, the igneous rocks at the mine can be grouped in two major units: a felsic suite of silicic intrusives (the porphyries; SiO 2 ≥56wt%) with subvertical stock-like to dyke shapes, and a mafic volcanic to subvolcanic sequence (the Farellones formation; SiO 2 <≤56wt%) with a sub-horizontal nature. The felsic rocks intrude the volcanogenic Farellones formation, which is known at the mine site as 'Andesitas de la mina'. The major felsic intrusives are locally known as the 'Diorita Sewell' and 'Porfido Teniente' bodies, plus a series of minor plugs, apophyses and dikes. According to Cuadra (1986), the age of the main intrusive units spans from Late Miocene ('Diorita Sewell'; 7-8Ma) to Early Pliocene ('Porfido Teniente'; ∼4-5Ma). These felsic intrusives are closely related to copper mineralization ( ∼4-5Ma; Cuadra, 1986), particularly the younger 'Porfido Teniente' (Camus, 1975). Additionally, Skewes and Stern (1996) have suggested the existence of an even slightly younger porphyry pluton, not exposed at surface, but still linked to the ore genesis. Similar felsic intrusive bodies are also present in the Laguna La Huifa area (Reich, 2001), located less than 3 km to the NE from the main El Teniente body. The copper mineralization here, is interpreted to be almost contemporaneous with the El Teniente mineralization (Cuadra, 1986). Based on petrographic and geochemical information on the silicic intrusive suite, Rabbia et al. (2000) suggested that this magmatism could be considered as a Phanerozoic equivalent of an Archean high-Al TTG. Furthermore it may be classified as a modified (Na-rich) 'I' type granitoid, in the sense of Atherton and Petford (1993) and Petford and Atherton (1996). According to these authors, the younger (and hotter) lower Andean crust would be a better candidate than the older (and colder) subducted Nazca plate basalts

  14. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  15. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  16. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  17. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  18. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  19. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  20. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  1. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  2. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  3. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  4. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  5. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  6. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  7. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  8. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  9. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  10. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  11. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  12. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  13. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  14. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  15. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  16. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  17. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  18. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  19. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  20. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  1. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  2. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  3. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  4. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  5. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  6. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  7. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  8. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  9. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  10. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  11. Splitter magnets for DAΦNE project

    International Nuclear Information System (INIS)

    Sanelli, C.; Hsieh, H.

    1992-01-01

    A 510 MeV electron positron colliding beam facility is under design and construction. The project consists of two storage rings, accumulator, electron/positron linac and transfer lines. The design of the splitter magnets which separate the circulating beams immediately after passing through the DAΦNE interaction point is presented. The results of 2-D and 3-D magnetic calculations is presented, and the electrical and mechanical design of the magnet are described. A 1/3 length prototype of this magnet is under construction. (R.P.) 2 refs.; 8 figs.; 2 tabs

  12. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  13. Apatite formation behaviour during metasomatism in the Bathtub Intrusion (Babbitt deposit, Duluth Complex, USA)

    Science.gov (United States)

    Raič, Sara; Mogessie, Aberra; Krenn, Kurt; Hauzenberger, Christoph A.; Tropper, Peter

    2016-04-01

    The mineralized troctolitic Bathtub intrusion (Duluth Complex, NE-Minnesota) is known for its famous Cu-Ni-Sulfide±PGM Babbitt deposit, where platinum group minerals (PGMs) are either hosted by primary magmatic sulfides (base metal sulfides) or associated with hydrothermally altered portions. This secondary generation of PGMs is present in alteration patches and suggests the involvement of hydrothermal fluids in the mobilization of platinum-group elements (PGEs). Accessory fluorapatite in these samples reveals besides H2O- and CO2-rich primary fluid inclusions, textural and compositional variations that also record magmatic and metasomatic events. Based on detailed back-scattered electron imaging (BSE) and laser ablation-inductively coupled plasma-mass spectrometry (LA-ICPMS), a primary magmatic origin is reflected by homogeneous or zoned grains, where zoning patterns are either concentric or oscillatory, with respect to LREE. Late magmatic to hydrothermal processes are indicated by grains with bright LREE-enriched rims or conversion textures with REE-enriched patches in the interior of the apatite. A metasomatic formation of monazite from apatite is documented by the presence of monazite inclusions in apatite and newly grown monazite at altered apatite rims. They formed by the release of REEs from the apatite during a fluid-induced alteration, based on the coupled substitution Ca2+ + P5+ = REE3+ + Si4+ (Rønsbo 1989; Rønsbo 2008). Samples with monazite inclusions in apatite further display occurrences of PGMs associated with hydrothermal alteration patches (chlorite + amphibole). The presence of H2O- and CO2-rich fluid inclusions in apatite, the metasomatically induced monazite growth, as well as the occurrence of PGMs in hydrothermally alteration zones, also suggest the involvement of aqueous chloride complexes in a H2O dominated fluid in the transportation of LREE and redistribution of the second generation of PGEs. Rønsbo, J.G. (1989): Coupled substitutions

  14. Metastable He (n=2) - Ne potential interaction calculation

    International Nuclear Information System (INIS)

    Rahal, H.

    1983-10-01

    Diabatic potential terms corresponding to He (2 1 S)-Ne and He (2 3 S)-Ne interactions are calculated. These potentials reproduce the experimental results thermal metastable atom elastic scattering on Ne target. A model which reduces the interaction to a one-electron problem is proposed: the He excited electron. Its interaction with the He + center is reproduced by a ''l'' dependent potential model with a 1/2 behaviour at short range. The electron interaction facing the Ne is described by a l-dependent pseudopotential reproducing with accuracy the electron elastic scattering on a Ne atom. The importance of the corrective term related to the Ne polarizations by the electron and the He + ion is showed in this work. In the modelling problems, the accuracy cannot be better than 0.1 MeV [fr

  15. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  16. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  17. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  18. L'hydrogène Hydrogen

    Directory of Open Access Journals (Sweden)

    Balaceanu J. C.

    2006-11-01

    Full Text Available La crise pétrolière et le bouleversement du classement économique des énergies primaires qu'elle entraîne conjuguent leurs effets avec ceux d'une sensibilisation de l'opinion au respect de l'environnement pour favoriser l'avènement industriel d'innovations scientifiques et techniques dont l'intervention n'était prévisible que dans un avenir de plusieurs décennies. Le développement de l'énergie électrique nucléaire, qui actuellement s'impose économiquement, implique, pour élargir la pénétration de cette forme d'énergie à toutes les utilisations, une énergie chimique relais permettant un stockage et une régulation de la production; l'hydro- gène obtenu par électrolyse de l'eau semble pouvoir constituer ce combustible relais dans un délai raisonnable en tenant compte des contraintes de pollution. La chaleur nucléaire soulève a fortiori des problèmes identiques, elle peut théoriquement par dissociation thermique étagée de l'eau liquide fournir de l'hydrogène avec des rendements très satisfaisants, mais les problèmes de principe et de technologie posés par la mise en opération d'une suite de transformations chimiques et de séparations impliquant des composés particulièrement réactifs sont ardus et leur inventaire même n'est pas achevé. L'hydrogène, nouveau combustible polyvalent d'une industrie gazière perpétuelle, semble pouvoir bénéficier également, au niveau de son utilisation disséminée, de techniques nouvelles : stockages solides, turbines à hauts rendements, piles à combustible, qui ouvrent le marché de la traction et le marché électrique des installations isolées. Agent de réduction réactif et puissant, l'hydrogène peut également se substituer aux réducteurs conventionnels en métallurgie et donner une dimension nouvelle à l'hydrogénométallurgie par voie sèche ou par voie humide. Mais plus encore la mise en valeur économique des combustibles fossiles abondants . charbon, schistes

  19. Irène Jacob visits CERN

    CERN Document Server

    CERN Bulletin

    2010-01-01

    French actress Irène Jacob, the daughter of physicist Maurice Jacob, visited the ATLAS and CMS control rooms on Monday 17 May together with Italian theatre actor-director Pippo Delbono, in search of inspiration for a short film. The film will be screened at the “nuit des particules” event accompanying this year’s ICHEP.   Pippo Delbono et Irène Jacob discussing their project. “La nuit des particules” (night of the particles) is an event open to the general public that is being organised for the evening of Tuesday, 27 July, to accompany the 35th International Conference on High Energy Physics (ICHEP). ICHEP is a major highlight in every physicist’s calendar, and this year’s edition is being held in Paris from 22 to 28 July. The short film will be screened during the evening, which will include a lecture and a show at the legendary Parisian cinema Le Grand Rex, with a colossal seating capacity of 2 700 spe...

  20. Prospects for Antineutrino Running at MiniBooNE

    OpenAIRE

    Wascko, M. O.

    2006-01-01

    MiniBooNE began running in antineutrino mode on 19 January, 2006. We describe the sensitivity of MiniBooNE to LSND-like nuebar oscillations and outline a program of antineutrino cross-section measurements necessary for the next generation of neutrino oscillation experiments. We describe three independent methods of constraining wrong-sign (neutrino) backgrounds in an antineutrino beam, and their application to the MiniBooNE antineutrino analyses.

  1. "Ne opravilsja jeshtsho posle grippa..." : [luuletused] / Aleksei Koroljov

    Index Scriptorium Estoniae

    Koroljov, Aleksei

    2001-01-01

    Autor endast lk. 44. Sisu: "Ne opravilsja jeshtsho posle grippa..." ; "Tak plohho mne, kak ne bõlo davno..." ; "Vokrug tebja, kak satellit..." ; "Hotja i ne ossobenno ona..." ; Iz dnevnika ; Zdravõi smõsl ; "V ushko igolnoje prodenu..." ; "Zhenshtshine prostitelnõ nedostatki..." ; "Balagurja, taratorja..." "Kogda bõ sprava - rai..." ; 23-i skorõi ; "Velmozhi v rogozhe iz blazhi i drozhi..."

  2. Study of 19F and 19Ne mirror nuclei

    International Nuclear Information System (INIS)

    Lebrun, Claude.

    1976-01-01

    The electromagnetic properties of the mirror nuclei 19 F and 19 Ne were studied using the 18 O(d,nγ) 19 F, 17 O( 3 He,nγ) 19 Ne and 19 F(p,nγ) 19 Ne reactions. Lifetimes of 8 levels in 19 F and 11 levels in 19 Ne have been measured using the Doppler shift attenuation method. Weak and strong components of M 1 , E 1 and E 2 transition strengths are compared with shell model predictions. M 1 and E 2 transition strengths of conjugated nuclei (A=18 to A=34) are compiled and compared with wide configuration space shell models [fr

  3. The state of the NeXus data format

    International Nuclear Information System (INIS)

    Koennecke, Mark

    2006-01-01

    NeXus is an effort by an international group of scientists to define a common data exchange format for neutron, muon and X-ray scattering. NeXus has six levels: a physical file format, a file structure, rules for storing individual data items in a file, a dictionary of names, instrument definitions and an application programming interface (API) to NeXus files. The authors will present the large steps forward which have been made both with instrument definitions and the NeXus-API

  4. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  5. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  6. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  7. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  8. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  9. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  10. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  11. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  12. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  13. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  14. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  15. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  16. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  17. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  18. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  19. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  20. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  1. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  2. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  3. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  4. Depleted subcontinental lithospheric mantle and its tholeiitic melt metasomatism beneath NE termination of the Eger Rift (Europe): the case study of the Steinberg (Upper Lusatia, SE Germany) xenoliths

    Science.gov (United States)

    Kukuła, Anna; Puziewicz, Jacek; Matusiak-Małek, Magdalena; Ntaflos, Theodoros; Büchner, Jörg; Tietz, Olaf

    2015-12-01

    The ca. 30 Ma Steinberg basanite occurs at the NE termination of the Eger (Ohře) Rift in the NW Bohemian Massif, Central Europe, and belongs to the Cenozoic alkaline Central European Volcanic Province. The basanite hosts a suite of mantle xenoliths, most of which are harzburgites containing relatively magnesian olivine (Fo 90.5-91.6) and Al-poor (0.04-0.13 a pfu) orthopyroxene (mg# 0.90-0.92). Some of these harzburgites also contain volumetrically minor clinopyroxene (mg# 0.92-0.95, Al 0.03-0.13 a pfu) and have U-shaped LREE-enriched REE patterns. The Steinberg harzburgites are typical for the Lower Silesian - Upper Lusatian domain of the European subcontinental lithospheric mantle. They represent residual mantle that has undergone extensive partial melting and was subsequently affected by mantle metasomatism by mixed carbonatite-silicate melts. The Steinberg xenolith suite comprises also dunitic xenoliths affected by metasomatism by melt similar to the host basanite, which lowered the Fo content in olivine to 87.6 %. This metasomatism happened shortly before xenolith entrainment in the erupting lava. One of the xenoliths is a wehrlite (olivine Fo 73 %, clinopyroxene mg# 0.83-0.85, subordinate orthopyroxene mg# 0.76-0.77). Its clinopyroxene REE pattern is flat and slightly LREE-depleted. This wehrlite is considered to be a tholeiitic cumulate. One of the studied harzburgites contains clinopyroxene with similar trace element contents to those in wehrlite. This type of clinopyroxene records percolation of tholeiitic melt through harzburgite. The tholeiitic melt might be similar to Cenozoic continental tholeiites occurring in the Central European Volcanic Province (e.g., Vogelsberg, Germany).

  5. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  6. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  7. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  8. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  9. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  10. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  11. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  12. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  13. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  14. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  15. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  16. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  17. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  18. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    stone of Tertiary age to the east and south. At places, chilled marginal contact and ..... Soc. Am. Spec. Paper. 430 815–830. Srivastava R K and Sinha A K 2007b Petrogenesis of early Cretaceous ultramafic–mafic–alkaline–carbonatite igneous complexes from the Shillong plateau, NE India;. In: Igneous petrology: 21st ...

  19. Phase transition and angular momentum dependence of correlations in the rotational spectra of Ne20 and Ne22

    International Nuclear Information System (INIS)

    Satpathy, L.; Schmid, K.W.; Krewald, S.; Faessler, A.

    1974-01-01

    Multi-Configuration-Hartree-Fock (MCHF) calculations with angular momentum projection before the variation of the internal degree of freedom have been performed for the nuclei Ne 20 and Ne 22 . This procedure yields different correlated intrinsic states for the different members of a rotational band. Thus, the angular momentum dependence of correlations has been studied. Experimentally, the ground state spectra of Ne 20 and Ne 22 show properties similar to the phase transitions observed in some rare earth nuclei which have been well reproduced through the present calculations. The calculated spectra show a significant improvement compared to the ones obtained by variation before the angular momentum projection is effected. (author)

  20. DAΦNE magnet power supply system

    International Nuclear Information System (INIS)

    Ricci, R.; Sanelli, C.; Stecchi, A.

    1998-01-01

    The e + -e - , 1020 MeV at center of mass, Particle Accelerator Complex DAΦNE, consists of a linear accelerator (Linac), a damping ring (D.A.), nearly 180 m of transfer lines (T.L.) and two storage rings (S.R.), that intersect each other in two points (I.P.), for Φ particle production. The D.A., T.L. and S.R. magnets are powered by means of 462 power supplies, rating from 100 W to 1 MW. The very different output currents, from 10 A to 2300 A, and output voltages, from 8 V to 1300 V, imposed many different technical solution realized by the world industry. This paper describes the Power Supply System giving also a description of the different typologies, their characteristics and control systems. The paper reports also the power supply performances and gives information on their installation and first year operation period

  1. KN scattering at DA{Phi}NE?

    Energy Technology Data Exchange (ETDEWEB)

    Olin, A

    1995-06-01

    Existing measurements of the KN and K-bar N scattering lengths suffer from large uncertainties, particularly in the I=0 channel. The low energy kaons from {phi} decay available at DA{Phi}NE can be used to improve this situation. Three experimental approaches are discussed: a solid hydrogen target and silicon colorimeter surrounding the collision point. This would also use the magnet and tracking detectors of the FINUDA experiment; a hydrogen TPC is proposed as an active target in the magnetic field of the FINUDA magnet; the FINUDA detector with a CH{sub 2} target could be used to measure an important cross-section. (author). 14 refs., 1 tab., 5 figs.

  2. Martin Szekely : ne plus dessiner

    OpenAIRE

    Mokhtari, Sylvie

    2012-01-01

    Ce livret, publié à l’issue d’une exposition éponyme au Centre Pompidou en 2011-12, présente, sous la conduite de Françoise Guichon les « recherches » et les « projets industriels » du designer qui en 1996 avait déclaré « ne plus dessiner ». Un texte de Philippe-Alain Michaud explicite en deuxième partie de l’opuscule la rencontre de Martin Szekely avec l’artiste Mark Lewis qui réalisa un film à partir du miroir Soleil noir (2007) installé dans les salles de peinture hollandaise de la Nationa...

  3. Active Eruptions in the NE Lau Basin

    Science.gov (United States)

    Resing, J. A.; Embley, R. W.

    2009-12-01

    NE Lau Response Team: K Rubin, E Baker, J Lupton, M Lilley, T Shank, S Merle, R Dziak, T Collasius (Jason 2 Expedition Leader), N Buck, T Baumberger, D Butterfield, D Clague, D Conlin, J Cowen, R Davis, L Evans, J Huber, M Keith, N Keller, P Michael, E Podowski, A-L Reysenbach, K Roe, H Thomas, S Walker. During a May 2009 cruise to W Mata volcano in the NE Lau Basin, we made the first observations of an active eruption on the deep-sea floor. The cruise was organized after volcanic activity was detected at two sites (W Mata volcano and NE Lau Spreading Center, NELSC) during a Nov. 2008 NOAA-PMEL expedition. At that time, both sites had elevated H2 concentrations and volcaniclastic shards in the hydrothermal plumes. Moored hydrophone data since Jan 2009 indicate that the activity at W Mata has been continuous between these expeditions. Results of our cruise and other work suggest that the NE Lau Basin hosts an unusually high level of magmatic activity, making it an ideal location to study the effects of magmatic processes on hydrothermal activity and associated ecosystems. W Mata was visited with 5 ROV Jason 2 dives and 2 dives with the MBARI autonomous mapping vehicle in May 2009. It was actively erupting at the 1200 m deep summit during each, so a hydrophone was deployed locally to collect acoustic data. Ship and shore-based analysis of HD video, molten lava, rocks, sediments, hot spring waters, and micro- and macro biological specimens collected by Jason 2 have provided a wealth of data. The eruption itself was characterized by extrusion of red, molten lava, extensive degassing, formation of large magma bubbles, explosive pyroclast ejection, and the active extrusion of pillow lavas. The erupting magmas are boninite, a relatively rare magma type found only at convergent margins. The hydrothermal fluids are generally acidic and all diffuse fluids collected were microbially active, even those at pH 20 yrs the PMEL-Vents and NSF RIDGE programs have sought to observe

  4. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  5. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  6. Stellar origin of the 22Ne excess in cosmic rays

    International Nuclear Information System (INIS)

    Casse, M.; Paul, J.A.

    1982-01-01

    The 22 Ne excess at the cosmic-ray source is discussed in terms of a 22 Ne-rich component injected and accelerated by carbon-rich Wolf-Rayet stars. The overabundance of 22 Ne relative to 20 Ne predicted at the surface of these stars is estimated to a factor approx.120 with respect to solar system abundances. In order to give rise to a 22 Ne excess of about 3 at the cosmic-ray sources as inferred from observations, the carbon-rich Wolf-Rayet contribution to the primary cosmic-ray flux is to be at maximum 1/60. This component would be energized by strong stellar winds producing quasi-standing shocks around the Wolf-Rayet stars

  7. One-neutron knockout from Ne24-28 isotopes

    CERN Document Server

    Rodriguez-Tajes, C; Caamano, M; Faestermann, T; Cortina-Gil, D; Zhukov, M; Simon, H; Nilsson, T; Borge, M J G; Alvarez-Pol, H; Winkler, M; Prochazka, A; Nociforo, C; Weick, H; Kanungo, R; Perez-Loureiro, D; Kurtukian, T; Suemmerer, K; Eppinger, K; Perea, A; Chatillon, A; Maierbeck, P; Benlliure, J; Pascual-Izarra, C; Gernhaeuser, R; Geissel, H; Aumann, T; Kruecken, R; Larsson, K; Tengblad, O; Benjamim, E; Jonson, B; Casarejos, E

    2010-01-01

    One-neutron knockout reactions of Ne24-28 in a beryllium target have been studied in the Fragment Separator (FRS), at GSI. The results include inclusive one-neutron knockout cross-sections as well as longitudinal-momentum distributions of the knockout fragments. The ground-state structure of the neutron-rich neon isotopes was obtained from an analysis of the measured momentum distributions. The results indicate that the two heaviest isotopes, Ne-27 and Ne-28, are dominated by a configuration in which a s(1/2) neutron is coupled to an excited state of the Ne-26 and Ne-27 core, respectively. (C) 2010 Elsevier B.V. All rights reserved.

  8. Status of the KM3NeT project

    International Nuclear Information System (INIS)

    Katz, U.F.

    2009-01-01

    KM3NeT is a future research infrastructure in the Mediterranean Sea, hosting a cubic-kilometre scale neutrino telescope and nodes for associated sciences such as marine biology, oceanology and geophysics. The status of the KM3NeT project and the progress made in the EU-funded Design Study is reviewed. Some physics studies indicating the sensitivity of the KM3NeT neutrino telescope are highlighted and selected major technical design options to be further pursued are described. Finally, the remaining steps towards construction of KM3NeT will be discussed. This document reflects the status of the KM3NeT Conceptual Design Report (CDR), which has been presented to the public for the first time at the VLVnT08 Workshop.

  9. Significance of Zr-in-Rutile Thermometry for Deducing the Decompression P–T Path of a Garnet–Clinopyroxene Granulite in the Moldanubian Zone of the Bohemian Massif

    Czech Academy of Sciences Publication Activity Database

    Usuki, T.; Iizuka, Y.; Hirajima, T.; Svojtka, Martin; Lee, H.-Y.

    2017-01-01

    Roč. 58, č. 6 (2017), s. 1173-1198 ISSN 0022-3530 Grant - others:Program interní podpory projektů mezinárodní spolupráce AV ČR(CZ) M100131203 Program:Program interní podpory projektů mezinárodní spolupráce AV ČR Institutional support: RVO:67985831 Keywords : Bohemian Massif * P–T path * Zr-in-rutile thermometry * high-pressure granulite * continental collision * garnet–clinopyroxene barometry Subject RIV: DB - Geology ; Mineralogy OBOR OECD: Geology Impact factor: 3.280, year: 2016

  10. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  11. Oscillatory behaviour of Rydberg state total cross sections in the collisions Ne+-He and He+-Ne

    International Nuclear Information System (INIS)

    Andresen, B.; Jensen, K.; Veje, E.

    1976-01-01

    The Ne + -He and He + -Ne collisions have been studied by means of optical spectrometry in the projectile energy range 10-150 keV. Very similar and regular oscillations in the Rydberg state total cross sections are found for HeI in both collisions and for singlet as well as triplet excitation. These oscillations are well described by the Rosenthal model. The HeI 4d sup(1,3)D states display two superimposed oscillations for center-of-mass collision energies above 6.4 keV. This is interpreted as the opening of a third exit channel, believed to be the HeI 4f sup(1,3)F. No, or very little structure is found in the Rydberg state total cross sections for HeII, NeI, NeII and NeIII levels. (Auth.)

  12. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  13. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  14. Advanced Non-Intrusive Instrumentation for Propulsion Engines

    Science.gov (United States)

    1998-05-01

    of the particle trajectory and the desired flux direction e flux ■ A Del -» A’ -» -> e’eflux (4) This approach has the advantage that the...Dullenkopf, K., Willmann, M., Wittig, S., Schö- ne, F., Stieglmeier, M., Tropea, C, Mundo , C, „Comparative mass flux measurements in spray using...9. REFERENCES 1 .Herget,W.F.,Lowry,S.R.’ Auto exhaust gas analysis by FTIR spectroscopy’ in proc. conference on Measurement of

  15. A Proposal for Non-Intrusive Namespaces in OCaml

    OpenAIRE

    Couderc , Pierrick; Canou , Benjamin; Chambart , Pierre; Le Fessant , Fabrice

    2014-01-01

    International audience; We present a work-in-progress about adding namespaces to OCaml. Inspired by other lan-guages such as Scala or C++, our aim is to de-sign and formalize a simple and non-intrusive namespace mechanism without complexifying the core language. Namespaces in our ap-proach are a simple way to define libraries while avoiding name clashes. They are also meant to simplify the build process, clarify-ing and reducing (to zero whenever possible) the responsibility of external tools.

  16. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  17. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  18. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  19. Non-intrusive load characterization of an airfoil using PIV

    Energy Technology Data Exchange (ETDEWEB)

    Oudheusden, B.W. van; Scarano, F.; Casimiri, E.W.F. [Dept. of Aerospace Engineering, Delft Univ. of Tech., Delft (Netherlands)

    2006-06-15

    An assessment is made of the feasibility of using PIV velocity data for the non-intrusive aerodynamic force characterization (lift, drag and pitching moment) of an airfoil. The method relies upon the application of control-volume approaches in combination with the deduction of the pressure from the PIV experimental data, by making use of the momentum equation. First, the consistency of the method is verified by means of synthetic data obtained from CFD. Subsequently, the procedure was applied in an experimental investigation, in which the PIV approach is validated against standard pressure-based methods (surface pressure distribution and wake rake). (orig.)

  20. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  1. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  2. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  3. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  4. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  5. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  6. Scattering study of the Ne + NeH{sup +}(v{sub 0} = 0, j{sub 0} = 0) → NeH{sup +} + Ne reaction on an ab initio based analytical potential energy surface

    Energy Technology Data Exchange (ETDEWEB)

    Koner, Debasish; Panda, Aditya N., E-mail: adi07@iitg.ernet.in [Department of Chemistry, Indian Institute of Technology Guwahati, Guwahati 781039 (India); Barrios, Lizandra; González-Lezana, Tomás, E-mail: t.gonzalez.lezana@csic.es [IFF-CSIC, Instituto de Física Fundamental, CSIC, Serrano 123, Madrid 28006 (Spain)

    2016-01-21

    Initial state selected dynamics of the Ne + NeH{sup +}(v{sub 0} = 0, j{sub 0} = 0) → NeH{sup +} + Ne reaction is investigated by quantum and statistical quantum mechanical (SQM) methods on the ground electronic state. The three-body ab initio energies on a set of suitably chosen grid points have been computed at CCSD(T)/aug-cc-PVQZ level and analytically fitted. The fitting of the diatomic potentials, computed at the same level of theory, is performed by spline interpolation. A collinear [NeHNe]{sup +} structure lying 0.72 eV below the Ne + NeH{sup +} asymptote is found to be the most stable geometry for this system. Energies of low lying vibrational states have been computed for this stable complex. Reaction probabilities obtained from quantum calculations exhibit dense oscillatory structures, particularly in the low energy region and these get partially washed out in the integral cross section results. SQM predictions are devoid of oscillatory structures and remain close to 0.5 after the rise at the threshold thus giving a crude average description of the quantum probabilities. Statistical cross sections and rate constants are nevertheless in sufficiently good agreement with the quantum results to suggest an important role of a complex-forming dynamics for the title reaction.

  7. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  8. Origin of the Okrouhlá Radouň episyenite-hosted uranium deposit, Bohemian Massif, Czech Republic: fluid inclusion and stable isotope constraints

    Science.gov (United States)

    Dolníček, Zdeněk; René, Miloš; Hermannová, Sylvie; Prochaska, Walter

    2014-04-01

    The Okrouhlá Radouň shear zone hosted uranium deposit is developed along the contact of Variscan granites and high-grade metasedimentary rocks of the Moldanubian Zone of the Bohemian Massif. The pre-ore pervasive alteration of wall rocks is characterized by chloritization of mafic minerals, followed by albitization of feldspars and dissolution of quartz giving rise to episyenites. The subsequent fluid circulation led to precipitation of disseminated uraninite and coffinite, and later on, post-ore quartz and carbonate mineralization containing base metal sulfides. The fluid inclusion and stable isotope data suggest low homogenization temperatures (˜50-140 °C during pre-ore albitization and post-ore carbonatization, up to 230 °C during pre-ore chloritization), variable fluid salinities (0-25 wt.% NaCl eq.), low fluid δ18O values (-10 to +2 ‰ V-SMOW), low fluid δ13C values (-9 to -15 ‰ V-PDB), and highly variable ionic composition of the aqueous fluids (especially Na/Ca, Br/Cl, I/Cl, SO4/Cl, NO3/Cl ratios). The available data suggest participation of three fluid endmembers of primarily surficial origin during alteration and mineralization at the deposit: (1) local meteoric water, (2) Na-Ca-Cl basinal brines or shield brines, (3) SO4-NO3-Cl-(H)CO3 playa-like fluids. Pre-ore albitization was caused by circulation of alkaline, oxidized, and Na-rich playa fluids, whereas basinal/shield brines and meteoric water were more important during the post-ore stage of alteration.

  9. Exclusive measurements of nuclear breakup reactions of 17Ne

    International Nuclear Information System (INIS)

    Wamers, F.; Marganiec, J.; Aksouh, F.; Aksyutina, Y.; Boretzky, K.; Chatillon, A.; Emling, H.; Geissel, H.; Heil, M.; Hoffmann, J.; Karagiannis, C.; Kiselev, O.A.; Kurz, N.; Larsson, K.; Litvinov, Y.A.; Nociforo, C.; Ott, W.; Simon, H.; Suemmerer, K.; Weick, H.; Alvarez-Pol, H.; Beceiro-Novo, S.; Cortina-Gil, D.; Rodriguez-Tajes, C.; Aumann, T.; Panin, V.; Bertulani, C.A.; Borge, M.J.G.; Galaviz, D.; Perea, A.; Tengblad, O.; Chartier, M.; Taylor, J.; Chulkov, L.V.; Egorova, I.A.; Ershova, O.; Langer, C.; Plag, R.; Reifarth, R.; Wimmer, C.; Forssen, C.; Johansson, H.; Jonson, B.; Nilsson, T.; Nyman, G.; Tengborn, E.; Zhukov, M.V.; Fraile, L.M.; Fynbo, H.; Riisager, K.; Grigorenko, L.V.; Hoffmann, D.H.; Richter, A.; Schrieder, G.; Karakoc, M.; Kratz, J.V.; Kulessa, R.; Lantz, M.; Le Bleis, T.; Lemmon, R.; Mahata, K.; Muentz, C.; Stroth, J.; Parfenova, Y.L.; Paschalis, S.; Rossi, D.; Savran, D.; Shul'gina, N.B.

    2014-01-01

    We have studied one-proton-removal reactions of about 500 MeV/u 17 Ne beams on a carbon target at the R 3 B/LAND setup at GSI by detecting beam-like 15 O-p and determining their relative-energy distribution. We exclusively selected the removal of a 17 Ne halo proton, and the Glauber-model analysis of the 16 F momentum distribution resulted in an s 2 contribution in the 17 Ne ground state of about 40 %. (authors)

  10. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  11. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  12. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  13. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  14. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  15. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  16. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  17. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  18. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  19. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  20. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  1. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  2. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  3. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  4. Oxygen intrusion into anoxic fjords leads to increased methylmercury availability

    Science.gov (United States)

    Veiteberg Braaten, Hans Fredrik; Pakhomova, Svetlana; Yakushev, Evgeniy

    2013-04-01

    Mercury (Hg) appears in the oxic surface waters of the oceans at low levels (sub ng/L). Because inorganic Hg can be methylated into the toxic and bioaccumulative specie methylmercury (MeHg) levels can be high at the top of the marine food chain. Even though marine sea food is considered the main risk driver for MeHg exposure to people most research up to date has focused on Hg methylation processes in freshwater systems. This study identifies the mechanisms driving formation of MeHg during oxygen depletion in fjords, and shows how MeHg is made available in the surface water during oxygen intrusion. Studies of the biogeochemical structure in the water column of the Norwegian fjord Hunnbunn were performed in 2009, 2011 and 2012. In autumn of 2011 mixing flushing events were observed and lead to both positive and negative effects on the ecosystem state in the fjord. The oxygenated water intrusions lead to a decrease of the deep layer concentrations of hydrogen sulfide (H2S), ammonia and phosphate. On the other hand the intrusion also raised the H2S boundary from 8 m to a shallower depth of just 4 m. Following the intrusion was also observed an increase at shallower depths of nutrients combined with a decrease of pH. Before flushing events were observed concentrations of total Hg (TotHg) increased from 1.3 - 1.7 ng/L in the surface layer of the fjord to concentrations ranging from 5.2 ng/L to 6.4 ng/L in the anoxic zone. MeHg increased regularly from 0.04 ng/L in the surface water to a maximum concentration of 5.2 ng/L in the deeper layers. This corresponds to an amount of TotHg present as MeHg ranging from 2.1 % to 99 %. The higher concentrations of MeHg in the deeper layer corresponds to an area where no oxygen is present and concentrations of H2S exceeds 500 µM, suggesting a production of MeHg in the anoxic area as a result of sulphate reducing bacteria activity. After flushing the concentrations of TotHg showed a similar pattern ranging from 0.6 ng/L in the

  5. Electron-impact cross sections of Ne

    International Nuclear Information System (INIS)

    Tsurubuchi, S.; Arakawa, K.; Kinokuni, S.; Motohashi, K.

    2000-01-01

    Electron-impact absolute emission cross sections were measured for the 3p→3s transitions of Ne. Excitation functions of the 3s→2p first resonance lines were measured in the energy range from the threshold to 1000 eV by a polarization-free optical method and relative cross sections were normalized to the absolute values, (41.0±5.4)x10 -19 cm 2 for the 73.6 nm line and (7.1±1.0)x10 -19 cm 2 for the 74.4 nm line, which were determined at 500 eV. The integrated level-excitation cross sections of Suzuki et al for the 1s 2 and 1s 4 levels were combined with the corresponding 3p→3s cascade cross sections obtained in this paper to give absolute emission cross sections for the resonance lines. The level-excitation cross sections of the 1s 2 and 1s 4 states in Paschen notation were determined from the threshold to 1000 eV by subtracting 3p→3s cascade cross sections from the corresponding 3s→2p emission cross sections of the resonance lines. A large cascade contribution is found in the emission cross section of the resonance lines. It is 28.5% for the 73.6 nm line and 49.6% for the 74.4 nm line at 40 eV, and 17.0 and 61.8%, respectively, at 300 eV. (author)

  6. WE FRIENDS, Lääne-Eesti arengupartnerlus / Ingrit Kera

    Index Scriptorium Estoniae

    Kera, Ingrit

    2006-01-01

    Naised saavad osa hiidlaste kirjutatud europrojektist "We Friends", mille eesmärk on Lääne-Eesti madala konkurentsivõimega naiste ja lapsi üksi kasvatavate noorte emade tööhõivele kaasaaitamine

  7. Coulomb and nuclear excitations of narrow resonances in 17Ne

    Directory of Open Access Journals (Sweden)

    J. Marganiec

    2016-08-01

    Full Text Available New experimental data for dissociation of relativistic 17Ne projectiles incident on targets of lead, carbon, and polyethylene targets at GSI are presented. Special attention is paid to the excitation and decay of narrow resonant states in 17Ne. Distributions of internal energy in the O15+p+p three-body system have been determined together with angular and partial-energy correlations between the decay products in different energy regions. The analysis was done using existing experimental data on 17Ne and its mirror nucleus 17N. The isobaric multiplet mass equation is used for assignment of observed resonances and their spins and parities. A combination of data from the heavy and light targets yielded cross sections and transition probabilities for the Coulomb excitations of the narrow resonant states. The resulting transition probabilities provide information relevant for a better understanding of the 17Ne structure.

  8. Complementarity and completed trials: reforming the Ne bis in idem ...

    African Journals Online (AJOL)

    Nnamdi Azikiwe University Journal of International Law and Jurisprudence ... This paper is concerned with the question whether article 20(3) of the Rome Statute is ... Rome Statute, Ne bis in idem, double jeopardy, International Criminal Court ...

  9. 77 FR 6481 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2012-02-08

    ...] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Final rule... power television rulemaking petitions requesting channel substitutions in May 2011, it subsequently... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  10. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  11. Effects of confinement on the Rydberg molecule NeH

    International Nuclear Information System (INIS)

    Lo, J M H; Klobukowski, M; Bielinska-Waz, D; Diercksen, G H F; Schreiner, E W S

    2005-01-01

    Ab initio potential energy curves of the Rydberg NeH molecule in the presence of cylindrical spatial confinement were computed by the method of multi-reference configuration interaction with extended basis sets. The influence of the applied potential to the structures and spectra of the ground and excited states of NeH was analysed in terms of perturbation theory. In addition, the phenomenon of field-induced ionization was discussed

  12. Investigation of 35S NE-78241 mobility in plants

    International Nuclear Information System (INIS)

    Enisz, J.; Orsos, S.

    1982-01-01

    The mobility of 35 S NE-78241 (N-iso-thiocyanato-methyl-2,6-dimethyl-chloracetanilide) in plants has been studied. The compound is not absorbed via the leaves from aqueous solutions. It shows active transport through the root-system. It is strongly bound to soil. In bean plant (Phaseolus vulgaris) inoculated with Uromyces appendiculatus 35 S NE-78241 is selectively enriched at the place of infection. (author)

  13. The MicroBooNE Technical Design Report

    Energy Technology Data Exchange (ETDEWEB)

    Fleming, Bonnie [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2012-02-24

    MicroBooNE will build, operate, and extract physics from the first large liquid argon time projection chamber (LArTPC) that will be exposed to a high-intensity neutrino beam. With its unparalleled capabilities in tracking, vertexing, calorimetry, and particle identification, all with full electronic readout, MicroBooNE represents a major advance in detector technology for neutrino physics in the energy regime of most importance for elucidating oscillation phenomena.

  14. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Status of the KM3NeT project

    International Nuclear Information System (INIS)

    Margiotta, A

    2014-01-01

    KM3NeT is a deep-sea research infrastructure being constructed in the Mediterranean Sea. It will be installed at three sites: KM3NeT-Fr, offshore Toulon, France, KM3NeT-It, offshore Portopalo di Capo Passero, Sicily (Italy) and KM3NeT-Gr, offshore Pylos, Peloponnese, Greece. It will host the next generation Cherenkov neutrino telescope and nodes for a deep sea multidisciplinary observatory, providing oceanographers, marine biologists, and geophysicists with real time measurements. The neutrino telescope will search for Galactic and extra-Galactic sources of neutrinos, complementing IceCube in its field of view. The detector will have a modular structure and consists of six building blocks, each including about one hundred Detection Units (DUs). Each DU will be equipped with 18 multi-PMT digital optical modules. The first phase of construction has started and shore and deep-sea infrastructures hosting the future KM3NeT detector are being prepared in France near Toulon and in Italy, near Capo Passero in Sicily. The technological solutions for KM3NeT and the expected performance of the detector are presented and discussed

  16. Comparison of electromagnetic and nuclear dissociation of 17Ne

    Science.gov (United States)

    Wamers, F.; Marganiec, J.; Aksouh, F.; Aksyutina, Yu.; Alvarez-Pol, H.; Aumann, T.; Beceiro-Novo, S.; Bertulani, C. A.; Boretzky, K.; Borge, M. J. G.; Chartier, M.; Chatillon, A.; Chulkov, L. V.; Cortina-Gil, D.; Emling, H.; Ershova, O.; Fraile, L. M.; Fynbo, H. O. U.; Galaviz, D.; Geissel, H.; Heil, M.; Hoffmann, D. H. H.; Hoffman, J.; Johansson, H. T.; Jonson, B.; Karagiannis, C.; Kiselev, O. A.; Kratz, J. V.; Kulessa, R.; Kurz, N.; Langer, C.; Lantz, M.; Le Bleis, T.; Lehr, C.; Lemmon, R.; Litvinov, Yu. A.; Mahata, K.; Müntz, C.; Nilsson, T.; Nociforo, C.; Ott, W.; Panin, V.; Paschalis, S.; Perea, A.; Plag, R.; Reifarth, R.; Richter, A.; Riisager, K.; Rodriguez-Tajes, C.; Rossi, D.; Savran, D.; Schrieder, G.; Simon, H.; Stroth, J.; Sümmerer, K.; Tengblad, O.; Typel, S.; Weick, H.; Wiescher, M.; Wimmer, C.

    2018-03-01

    The Borromean drip-line nucleus 17Ne has been suggested to possess a two-proton halo structure in its ground state. In the astrophysical r p -process, where the two-proton capture reaction 15O(2 p ,γ )17Ne plays an important role, the calculated reaction rate differs by several orders of magnitude between different theoretical approaches. To add to the understanding of the 17Ne structure we have studied nuclear and electromagnetic dissociation. A 500 MeV/u 17Ne beam was directed toward lead, carbon, and polyethylene targets. Oxygen isotopes in the final state were measured in coincidence with one or two protons. Different reaction branches in the dissociation of 17Ne were disentangled. The relative populations of s and d states in 16F were determined for light and heavy targets. The differential cross section for electromagnetic dissociation (EMD) shows a continuous internal energy spectrum in the three-body system 15O+2 p . The 17Ne EMD data were compared to current theoretical models. None of them, however, yields satisfactory agreement with the experimental data presented here. These new data may facilitate future development of adequate models for description of the fragmentation process.

  17. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  18. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    Science.gov (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  19. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  20. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  1. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  2. Individual differences in experiencing intrusive memories : The role of the ability to resist proactive interference

    NARCIS (Netherlands)

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J.

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N = 91) completed a self-report measure of intrusive memories, and carried

  3. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  4. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  5. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  6. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  7. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  8. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  9. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  10. Advanced inspection technology for non intrusive inspection (NII) program

    International Nuclear Information System (INIS)

    Zamir Mohamed Daud

    2003-01-01

    In the current economic environment, plants and facilities are under pressure to introduced cost saving as well as profit maximising measures. Among the many changes in the way things are run is a move towards Risk Based Inspection (RBI), with an emphasis on longer operating periods between shutdowns as well as to utilise components to their maximum capability. Underpinning and RBI program requires good data from an effective online inspections program, which would not require the shutdown of critical components. One methodology of online inspection is known as Non Intrusive Inspection (NII), an inspection philosophy with the objective of replacing internal inspection of a vessel by doing Non Destructive Testing (NDT) and inspections externally. To this end, a variety of advanced NDT techniques are needed to provide accurate online measurements. (Author)

  11. Non-intrusive Quality Analysis of Monitoring Data

    CERN Document Server

    Brightwell, M; Suwalska, Anna

    2010-01-01

    Any large-scale operational system running over a variety of devices requires a monitoring mechanism to assess the health of the overall system. The Technical Infrastructure Monitoring System (TIM) at CERN is one such system, and monitors a wide variety of devices and their properties, such as electricity supplies, device temperatures, liquid flows etc. Without adequate quality assurance, the data collected from such devices leads to false-positives and false-negatives, reducing the effectiveness of the monitoring system. The quality must, however, be measured in a non-intrusive way, so that the critical path of the data flow is not affected by the quality computation. The quality computation should also scale to large volumes of incoming data. To address these challenges, we develop a new statistical module, which monitors the data collected by TIM and reports its quality to the operators. The statistical module uses Oracle RDBMS as the underlying store, and builds hierarchical summaries on the basic events ...

  12. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  13. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  14. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  15. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  16. Non-Intrusive Optical Diagnostic Methods for Flowfield Characterization

    Science.gov (United States)

    Tabibi, Bagher M.; Terrell, Charles A.; Spraggins, Darrell; Lee, Ja. H.; Weinstein, Leonard M.

    1997-01-01

    Non-intrusive optical diagnostic techniques such as Electron Beam Fluorescence (EBF), Laser-Induced Fluorescence (LIF), and Focusing Schlieren (FS) have been setup for high-speed flow characterization and large flowfield visualization, respectively. Fluorescence emission from the First Negative band of N2(+) with the (0,0) vibration transition (at lambda =391.44 nm) was obtained using the EBF technique and a quenching rate of N2(+)* molecules by argon gas was reported. A very high sensitivity FS system was built and applied in the High-Speed Flow Generator (HFG) at NASA LaRC. A LIF system is available at the Advanced Propulsion Laboratory (APL) on campus and a plume exhaust velocity measurement, measuring the Doppler shift from lambda = 728.7 nm of argon gas, is under way.

  17. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  18. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  19. Forecasting deflation, intrusion and eruption at inflating volcanoes

    Science.gov (United States)

    Blake, Stephen; Cortés, Joaquín A.

    2018-01-01

    A principal goal of volcanology is to successfully forecast the start of volcanic eruptions. This paper introduces a general forecasting method, which relies on a stream of monitoring data and a statistical description of a given threshold criterion for an eruption to start. Specifically we investigate the timing of intrusive and eruptive events at inflating volcanoes. The gradual inflation of the ground surface is a well-known phenomenon at many volcanoes and is attributable to pressurised magma accumulating within a shallow chamber. Inflation usually culminates in a rapid deflation event caused by magma escaping from the chamber to produce a shallow intrusion and, in some cases, a volcanic eruption. We show that the ground elevation during 15 inflation periods at Krafla volcano, Iceland, increased with time towards a limiting value by following a decaying exponential with characteristic timescale τ. The available data for Krafla, Kilauea and Mauna Loa volcanoes show that the duration of inflation (t*) is approximately equal to τ. The distribution of t* / τ values follows a log-logistic distribution in which the central 60% of the data lie between 0.99 deflation event starting during a specified time interval to be estimated. The time window in which there is a specified probability of deflation starting can also be forecast, and forecasts can be updated after each new deformation measurement. The method provides stronger forecasts than one based on the distribution of repose times alone and is transferable to other types of monitoring data and/or other patterns of pre-eruptive unrest.

  20. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  1. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  2. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  4. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  5. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  6. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  7. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.

  8. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Directory of Open Access Journals (Sweden)

    Agata Błachnio

    2016-12-01

    Full Text Available The increase in the number of users of social networking sites has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2,628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Measure, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively and low context (positively; of the personality variables, conscientiousness and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of social networking sites (SNS.

  9. Comments on Auger electron production by Ne/sup +/ bombardment of surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Pepper, S V; Ferrante, J [National Aeronautics and Space Administration, Cleveland, OH (USA). Lewis Research Center

    1979-09-01

    In this letter, the authors first report rather conclusive experimental evidence showing that the Ne Auger signal is due to asymmetric Ne-metal collisions and not symmetric Ne-Ne collisions. Next it is shown that the Ne Auger signal is in fact observable by Ne/sup +/ bombardment of Si and with signal strength comparable to that of the Si Auger signal for 3 keV incident ion energy. Finally, they comment on some trends in the relative amplitudes of the 21.9 and 25.1 eV Ne Auger signals as a function of incident ion energy and target species.

  10. Petrogenesis of Early Cretaceous granitoids from southwest Zhejiang, NE South China Block and its geodynamic implication

    Science.gov (United States)

    Pan, Fa-Bin; Liu, Rong; Jin, Chong; Jia, Bao-Jian; He, Xiaobo; Gao, Zhong; Tao, Lu; Zhou, Xiao-Chun; Zhang, Li-Qi

    2018-05-01

    In situ zircon U-Pb ages, whole-rock major and trace elements, and Sr-Nd isotopic compositions of the Sucun, Yunfeng, and Jingning intrusions from southwest Zhejiang, NE South China Block, are presented to trace their petrogenesis and shed light on its lithosphere evolution. LA-ICP-MS U-Pb zircon dating shows that the Sucun quartz monzonite and Jingning monzogranite were emplaced at 135 Ma, and the Yunfeng quartz monzonite and Jingning granite were emplaced at 104 and 112 Ma, respectively. All these intrusions are metaluminous to weakly peraluminous and lie within high-K calc-alkaline to shoshonite series field (SiO2 = 66-76 wt%, A/CNK = 0.95-1.09, K2O/Na2O = 0.78-1.77). The Yunfeng quartz monzonite clearly have lower K2O and total REE contents, and higher CaO, Na2O, Al2O3, P2O5, MgO, and TiO2 contents, and relatively less enriched Sr-Nd isotopic compositions than those of the Sucun quartz monzonite, indicating that the Yunfeng quartz monzonite were derived from partial melting of a more juvenile lower crust sources compared with the magma source of the Sucun quartz monzonite. The Jingning monzogranite exhibit similar major elements covariations and Nd isotopic compositions, but higher Ba, Sr, and Eu contents and lower Rb, Th, and U contents than those of the Jingning granite. The geochemical features imply that the Jingning monzogranite and granite were fluid-present and fluid-absent anatexis products of the same Paleoproterozoic crustal source, respectively. Whole-rock Sr-Nd isotopic data imply that the estimated amounts of juvenile mantle-derived melts input into the mature crust show southeastward decreasing trend away from the Jiangshan-Shaoxing fault. We propose that roll-back and retreat of the Paleo-Pacific subducting plate might cause extensive asthenosphere mantle upwelling in East China, and the mantle-derived melts tend to rise through the regional main fault zones and preferentially modify the lithosphere nearby these faults.

  11. The appraisal of intrusive thoughts in relation to obsessional-compulsive symptoms.

    Science.gov (United States)

    Barrera, Terri L; Norton, Peter J

    2011-01-01

    Research has shown that although intrusive thoughts occur universally, the majority of individuals do not view intrusive thoughts as being problematic (Freeston, Ladouceur, Thibodeau, & Gagnon, 1991; Rachman & de Silva, 1978; Salkovskis & Harrison, 1984). Thus, it is not the presence of intrusive thoughts that leads to obsessional problems but rather some other factor that plays a role in the development of abnormal obsessions. According to the cognitive model of obsessive-compulsive disorder (OCD) put forth by Salkovskis (1985), the crucial factor that differentiates between individuals with OCD and those without is the individual's appraisal of the naturally occurring intrusive thoughts. This study aimed to test Salkovskis's model by examining the role of cognitive biases (responsibility, thought-action fusion, and thought control) as well as distress in the relationship between intrusive thoughts and obsessive-compulsive symptoms in an undergraduate sample of 326 students. An existing measure of intrusive thoughts (the Revised Obsessional Intrusions Inventory) was modified for this study to include a scale of distress associated with each intrusive thought in addition to the current frequency scale. When the Yale-Brown Obsessive-Compulsive Scale was used as the measure of OCD symptoms, a significant interaction effect of frequency and distress of intrusive thoughts resulted. Additionally, a significant three-way interaction of Frequency × Distress × Responsibility was found when the Obsessive Compulsive Inventory-Revised was used as the measure of OCD symptoms. These results indicate that the appraisal of intrusive thoughts is important in predicting OCD symptoms, thus providing support for Salkovskis's model of OCD.

  12. Human impacts of hydrometeorological extremes in the Bohemian-Moravian Highlands derived from documentary sources in the 18th-19th centuries

    Science.gov (United States)

    Dolák, Lukáš; Brázdil, Rudolf; Valášek, Hubert

    2014-05-01

    The extent of damage caused by hydrometeorological events or extremes (HME) has risen up in the entire world in the last few years. Especially the floods, flash floods, torrential rains and hailstorms are the most typical and one of the most frequent kind of natural disasters in the central Europe. Catastrophes are a part of human history and people were forced to cope with their consequences (e. g. material damage, economical losses, impacts on agriculture and society or losses of human lives). This paper analyses the human impacts of HME in the Bohemian-Moravian Highlands (central part of the Czech Republic) on the basis of documentary sources from the 18th-19th centuries. The paper presents various negative impacts of natural disasters on lives and property and subsequent inconveniences of Czech peasants. The preserved archival documents of estates or domains became the primary sources of data (e. g. taxation reliefs, damaged records, reports of afflicted farmers, administrative correspondence etc.). Particularly taxation reliefs relate to taxation system in the Czech lands during the 17th-19th centuries allowing to farmers to ask for tax alleviation when their crops were significantly damaged by any HME. These archival documents are a highly valuable source for the study of human impacts of natural disasters. Devastating consequences of these extremes affected individual farmers much more than the aristocracy. Floods caused inundations of farmer's fields, meadows, houses and farm buildings, washed away the arable land with crops, caused losses of cattle, clogged the land with gravel and mud and destroyed roads, bridges or agricultural equipment. Afflicted fields became worthless and it took them many years to become became fertile again. Crop was also damaged by hailstorms, droughts or late/early frosts. All these events led to lack of food and seeds in the following year and it meant the decrease of living standard, misery and poverty of farmers. Acquired

  13. Hazard Models From Periodic Dike Intrusions at Kı¯lauea Volcano, Hawai`i

    Science.gov (United States)

    Montgomery-Brown, E. K.; Miklius, A.

    2016-12-01

    The persistence and regular recurrence intervals of dike intrusions in the East Rift Zone (ERZ) of Kı¯lauea Volcano lead to the possibility of constructing a time-dependent intrusion hazard model. Dike intrusions are commonly observed in Kı¯lauea Volcano's ERZ and can occur repeatedly in regions that correlate with seismic segments (sections of rift seismicity with persistent definitive lateral boundaries) proposed by Wright and Klein (USGS PP1806, 2014). Five such ERZ intrusions have occurred since 1983 with inferred locations downrift of the bend in Kı¯lauea's ERZ, with the first (1983) being the start of the ongoing ERZ eruption. The ERZ intrusions occur on one of two segments that are spatially coincident with seismic segments: Makaopuhi (1993 and 2007) and Nāpau (1983, 1997, and 2011). During each intrusion, the amount of inferred dike opening was between 2 and 3 meters. The times between ERZ intrusions for same-segment pairs are all close to 14 years: 14.07 (1983-1997), 14.09 (1997-2011), and 13.95 (1993-2007) years, with the Nāpau segment becoming active about 3.5 years after the Makaopuhi segment in each case. Four additional upper ERZ intrusions are also considered here. Dikes in the upper ERZ have much smaller opening ( 10 cm), and have shorter recurrence intervals of 8 years with more variability. The amount of modeled dike opening during each of these events roughly corresponds to the amount of seaward south flank motion and deep rift opening accumulated in the time between events. Additionally, the recurrence interval of 14 years appears to be unaffected by the magma surge of 2003-2007, suggesting that flank motion, rather than magma supply, could be a controlling factor in the timing and periodicity of intrusions. Flank control over the timing of magma intrusions runs counter to the historical research suggesting that dike intrusions at Kı¯lauea are driven by magma overpressure. This relatively free sliding may have resulted from decreased

  14. Flaking and blistering on He and Ne bombardments

    International Nuclear Information System (INIS)

    Kamada, K.; Naramoto, H.

    1979-01-01

    Large scale exfoliation formed by 300 keV He + bombardment of niobium without any preceding blistering is investigated, in comparison with the blistering due to 450 and 850 keV Ne + bombardments. In-situ observations of the erosion processes were performed in a scanning electron microscope connected to the Van de Graaff. Critical doses of 7.2 x 10 17 He + /cm 2 , 2.4 x 10 17 Ne + /cm 2 and 4.0 x 10 17 Ne + /cm 2 were obtained for the 300 keV He flaking, 450 keV Ne blistering and 850 keV Ne blistering, respectively. The He flaking was presumed to be due to brittle fashion peeling-off of the surface layer by the bending moment driven by the internal gas pressure. The blistering, on the other hand, was presumed to be the result of the ductile fashion spreading of the lenticular bubble in the sub-surface layer. The necessary pressure for the peeling-off of the cover was calculated, and was speculated to be able to work as the driving force for the flaking from its unexpectedly low values. Fractographies under the exfoliations were discussed for both flaking and blistering. (author)

  15. High precision ages from the Torres del Paine Intrusion, Chile

    Science.gov (United States)

    Michel, J.; Baumgartner, L.; Cosca, M.; Ovtcharova, M.; Putlitz, B.; Schaltegger, U.

    2006-12-01

    The upper crustal bimodal Torres del Paine Intrusion, southern Chile, consists of the lower Paine-Mafic- Complex and the upper Paine-Granite. Geochronologically this bimodal complex is not well studied except for a few existing data from Halpern (1973) and Sanchez (2006). The aim of this study is to supplement the existing data and to constrain the age relations between the major magmatic pulses by applying high precision U-Pb dating on accessory zircons and 40Ar/39Ar-laser-step-heating-ages on biotites from the Torres del Paine Intrusion. The magmatic rocks from mafic complex are fine to medium-grained and vary in composition from quartz- monzonites to granodiorites and gabbros. Coarse-grained olivine gabbros have intruded these rocks in the west. The granitic body is represented by a peraluminous, biotite-orthoclase-granite and a more evolved leucocratic granite in the outer parts towards the host-rock. Field observations suggest a feeder-zone for the granite in the west and that the granite postdates the mafic complex. Two granite samples of the outermost margins in the Northeast and South were analyzed. The zircons were dated by precise isotope-dilution U-Pb techniques of chemically abraded single grains. The data are concordant within the analytical error and define weighted mean 206/238U ages of 12.59 ± 0.03 Ma and 12.58 ± 0.01 Ma for the two samples respectively. A 40Ar/39Ar-age for the second sample yield a date of 12.37 ± 0.11 Ma. Three 40Ar/39Ar -ages of biotites were obtained for rocks belonging to the mafic complex. A hbl-bio- granodiorite from the central part, approximately 150 m below the subhorizontal contact with the granite, gives an age of 12.81 ± 0.11 Ma. A hbl-bio-granodiorite and an olivine-gabbro west of the feeder-zone date at 12.42 ± 0.14 Ma and 12.49 ± 0.11 Ma, respectively. The obtained older age of 12.81 Ma for the granodiorite in the central part is consistent with structural relationships of brittle fracturing of the mafic

  16. The emergence of volcanic oceanic islands on a slow-moving plate: The example of Madeira Island, NE Atlantic

    Science.gov (United States)

    Ramalho, Ricardo S.; Brum da Silveira, António; Fonseca, Paulo E.; Madeira, José; Cosca, Michael; Cachão, Mário; Fonseca, Maria M.; Prada, Susana N.

    2015-02-01

    The transition from seamount to oceanic island typically involves surtseyan volcanism. However, the geological record at many islands in the NE Atlantic—all located within the slow-moving Nubian plate—does not exhibit evidence for an emergent surtseyan phase but rather an erosive unconformity between the submarine basement and the overlying subaerial shield sequences. This suggests that the transition between seamount and island may frequently occur by a relative fall of sea level through uplift, eustatic changes, or a combination of both, and may not involve summit volcanism. In this study, we explore the consequences for island evolutionary models using Madeira Island (Portugal) as a case study. We have examined the geologic record at Madeira using a combination of detailed fieldwork, biostratigraphy, and 40Ar/39Ar geochronology in order to document the mode, timing, and duration of edifice emergence above sea level. Our study confirms that Madeira's subaerial shield volcano was built upon the eroded remains of an uplifted seamount, with shallow marine sediments found between the two eruptive sequences and presently located at 320-430 m above sea level. This study reveals that Madeira emerged around 7.0-5.6 Ma essentially through an uplift process and before volcanic activity resumed to form the subaerial shield volcano. Basal intrusions are a likely uplift mechanism, and their emplacement is possibly enhanced by the slow motion of the Nubian plate relative to the source of partial melting. Alternating uplift and subsidence episodes suggest that island edifice growth may be governed by competing dominantly volcanic and dominantly intrusive processes.

  17. Magmatic sill intrusions beneath El Hierro Island following the 2011-2012 submarine eruption

    Science.gov (United States)

    Benito-Saz, María Á.; Sigmundsson, Freysteinn; Parks, Michelle M.; García-Cañada, Laura; Domínguez Cerdeña, Itahiza

    2016-04-01

    El Hierro, the most southwestern island of Canary Islands, Spain, is a volcano rising from around 3600 m above the ocean floor and up to of 1500 m above sea level. A submarine eruption occurred off the coast of El Hierro in 2011-2012, which was the only confirmed eruption in the last ~ 600 years. Activity continued after the end of the eruption with six magmatic intrusions occurring between 2012-2014. Each of these intrusions was characterized by hundreds of earthquakes and 3-19 centimeters of observed ground deformation. Ground displacements at ten continuous GPS sites were initially inverted to determine the optimal source parameters (location, geometry, volume/pressure change) that best define these intrusions from a geodetic point of view. Each intrusive period appears to be associated with the formation of a separate sill, with inferred volumes between 0.02 - 0.3 km3. SAR images from the Canadian RADARSAT-2 satellite and the Italian Space Agency COSMO-SkyMed constellation have been used to produce high-resolution detailed maps of line-of-sight displacements for each of these intrusions. These data have been combined with the continuous GPS observations and a joint inversion undertaken to gain further constraints on the optimal source parameters for each of these separate intrusive events. The recorded activity helps to understand how an oceanic intraplate volcanic island grows through repeated sill intrusions; well documented by seismic, GPS and InSAR observations in the case of the El Hierro activity.

  18. Influence of crystallised igneous intrusions on fault nucleation and reactivation during continental extension

    Science.gov (United States)

    Magee, Craig; McDermott, Kenneth G.; Stevenson, Carl T. E.; Jackson, Christopher A.-L.

    2014-05-01

    Continental rifting is commonly accommodated by the nucleation of normal faults, slip on pre-existing fault surfaces and/or magmatic intrusion. Because crystallised igneous intrusions are pervasive in many rift basins and are commonly more competent (i.e. higher shear strengths and Young's moduli) than the host rock, it is theoretically plausible that they locally intersect and modify the mechanical properties of pre-existing normal faults. We illustrate the influence that crystallised igneous intrusions may have on fault reactivation using a conceptual model and observations from field and subsurface datasets. Our results show that igneous rocks may initially resist failure, and promote the preferential reactivation of favourably-oriented, pre-existing faults that are not spatially-associated with solidified intrusions. Fault segments situated along strike from laterally restricted fault-intrusion intersections may similarly be reactivated. This spatial and temporal control on strain distribution may generate: (1) supra-intrusion folds in the hanging wall; (2) new dip-slip faults adjacent to the igneous body; or (3) sub-vertical, oblique-slip faults oriented parallel to the extension direction. Importantly, stress accumulation within igneous intrusions may eventually initiate failure and further localise strain. The results of our study have important implications for the structural of sedimentary basins and the subsurface migration of hydrocarbons and mineral-bearing fluids.

  19. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  20. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.