WorldWideScience

Sample records for intrusion rock

  1. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  2. Zircon U-Pb geochronology and emplacement history of intrusive rocks in the Ardestan section, central Iran

    Energy Technology Data Exchange (ETDEWEB)

    Sarjoughian, F.; Kananian, A.

    2017-11-01

    The Urumieh-Dokhtar Magmatic Arc (UDMA) is part of the Alpine–Himalayan orogenic belt and interpreted to be a subduction-related Andean-type magmatic arc. Along this belt, Eocene volcanics and some gabbroic to granitic bodies crop out. The main rock types of the studied intrusion are granite, granodiorite, and diorite. They have geochemical features typical of magnesian, calc-alkaline, metaluminous to slightly peraluminous granites and I-type intrusive rock that have a strong enrichment in Large-Ion Lithophile (LIL) elements (e.g. Rb, Ba, Sr), and a depletion in High Field Strength (HFS) elements (e.g. Nb, Ti, P), typical of subduction-related magmas. Zircon U-Pb dating was applied to determine the emplacement ages of the different intrusions in the Ardestan area. Among them the Kuh-e Dom diorite is 53.9±0.4Ma old; the Kuh-e Dom granodiorite is 51.10±0.4Ma old; the Mehrabad granodiorite is 36.8±0.5Ma old, the Nasrand granodiorite is 36.5±0.5Ma old, the Zafarghand granodiorite is 24.6±1.0Ma old, and the Feshark granodiorite is 20.5±0.8Ma old. These results delineate more accurately the magmatic evolution related to the Neotethyan subduction from the Lower Eocene to Lower Miocene, and the subsequent Zagros orogeny that resulted from the Arabia-Eurasia collision. The emplacement of these intrusive rocks inside the UDMA, which has a close relationship with the collisional orogeny, is transitional from a subduction-related setting to post-collisional setting in the Ardestan area.

  3. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  4. Relationship between the Layered Series and the overlying evolved rocks in the Bjerkreim-Sokndal Intrusion, southern Norway

    DEFF Research Database (Denmark)

    Wilson, James Richard; Overgaard, Gitte

    2005-01-01

    The Bjerkreim-Sokndal layered intrusion (BKSK) consists of a >7000 m-thick Layered Series comprising anorthosites, leuconorites, troctolites, norites, gabbronorites and jotunites (hypersthene monzodiorites), overlain by an unknown thickness of massive, evolved rocks: mangerites (hypersthene...... are essentially constant in the upper part of the MG-unit and in the QMG (An21-13; Fo6-4; Mg#opx17-13; Mg#cpx25-20). The amount of interstitial quartz and the amount of normative orthoclase, however, both increase systematically upwards through the QMG-unit, implying that these rocks are cumulates....... There is no evidence of a compositional break in the MG-QMG sequence that could reflect influx of relatively primitive magma. Two types of QMG/CH are known in the uppermost part of BKSK. Olivine-bearing types are comagmatic with the underlying Layered Series; the studied stratigraphic sequence belongs to this suite...

  5. Mineralogy and geochemistry of Skarn Fe orebody and syenodioritic intrusive host rock in Zeber Kuh prospect area (SW Bardaskan, South Khorasan province

    Directory of Open Access Journals (Sweden)

    Hossein Narooie

    2017-11-01

    Full Text Available The Zeber Kuh prospect area is located southwest of Bardaskan, South Khorasan province, in the northeastern Iran. Lithologically, the area includes Rizu and Soltanieh Formations metamorphosed carbonate rocks, which were intruded by syenogranitic and syenodioritic intrusions. Field observations and laboratory studies such as structural controls of orebody, metasomatic replacement and formation of low temperature H2O-bearing minerals, and the occurrence of magnetite and pyrite associated with chlorite, epidote, calcite, and quartz indicate that  the iron mineralization is low temperature skarn-type. The source of Fe mineralization is probably a younger intrusive rock at depth. Hydrothermal ore fluid was ascended within fault zone and/or contact between the intrusive rock and the  carbonate unit and generated orebody. Iron grade ranges from 54 to 65 wt.% and sulfur value is > 3 wt.%. Magnetite chemistry and Ti, V, Al, Mn, Ni, and Cr contents are similar to skarn deposit. Biotite syenodiorite host rock has hypidiomorphic granular texture and it consists of plagioclase, K-feldspar, biotite, and apatite minerals. Chemically, this intrusive rock is K-series alkaline type, which was generated in within plate zone. This magma is characterized by strong enrichment in LREE, LILE (Rb, Cs, Ba, and K, HFSE (Nb, Zr, and Ti, and P elements. The primary magma is produced by low degree partial melting of garnet lherzolite from asthenospheric to boundary of asthenospheric-lithospheric mantle.

  6. Compositional differences between roof and floor rocks of the Skaergaard Intrusion

    DEFF Research Database (Denmark)

    Salmonsen, Lars Peter; Tegner, Christian; Barfod, Gry

    2014-01-01

    by gravity. Here, we present new bulk rock (major and trace elements, Sr and Nd isotopes), mineralogical and petrographic data for the Upper Border Series. The Upper Border Series mainly diverge from equivalent Layered Series rocks by relatively higher concentrations of incompatible elements, lack of igneous...... incompatible elements and Sr-Nd isotopic ratios. Secondly, magma stratification as a consequence of compositional convection has been invoked. However, by combining petrography and whole rock compositions we show that the crystallization sequence in the Upper Border Series is identical to the Layered Series...... increase strongly in the roof relative to the floor rocks. We interpret this as a consequence of efficient segregation of immiscible silicate liquids at least during the late stages of differentiation....

  7. Whole-rock and mineral compositional constraints on the magmatic evolution of the Ni-Cu-(PGE) sulfide ore-bearing Kevitsa intrusion, northern Finland

    Science.gov (United States)

    Luolavirta, Kirsi; Hanski, Eero; Maier, Wolfgang; Santaguida, Frank

    2018-01-01

    The 2.06 Ga mafic-ultramafic Kevitsa intrusion is located in the Central Lapland greenstone belt. The lower ultramafic part of the intrusion hosts a large disseminated Ni-Cu-(PGE) sulfide deposit with Ni tenors ranging widely from architecture, variations in whole-rock and mineral compositions, and the presence of numerous inclusions and xenoliths. The OLPXs are mainly composed of cumulus olivine (Fo77-89) and clinopyroxene (Mg#81-92) with variable amounts of oikocrystic orthopyroxene (Mg#79-84). They comprise the bulk of the ultramafic cumulates and are the dominant host rocks to the sulfide ore. The host rocks to the regular and false ore type are mineralogically and compositionally similar (Fo 80-83, mostly) and show mildly LREE-enriched REE patterns (CeN/YbN 2), characteristic for the bulk of the Kevitsa ultramafic cumulates. The abundance of orthopyroxene and magnetite is lowest in the host rocks to the Ni-PGE ore type, being in line with the mineral compositions of the silicates, which are the most primitive in the intrusion. However, it contrasts with the LREE-enriched nature of the ore type (CeN/YbN 7), indicating significant involvement of crustal material in the magma. The contrasting intrusive stratigraphy in the different parts of the intrusion likely reflects different emplacement histories. It is proposed that the Kevitsa magma chamber was initially filled by stable continuous flow ("single" input) of basaltic magma followed by differentiation in an at least nearly closed system. In the following stage, new magma pulses were repeatedly emplaced into the interior of the intrusion in a dynamic (open) system forming the sulfide ore bodies. To gain the peculiar compositional and mineralogical characteristics of the Ni-PGE ore type, the related magma probably interacted with different country rocks en route to the Kevitsa magma chamber.

  8. Preliminary study of the uranium favorability of Mesozoic intrusive and Tertiary volcanic and sedimentary rocks of the Central Mojave Desert, Kern and San Bernardino counties, California

    International Nuclear Information System (INIS)

    Leedom, S.H.; Kiloh, K.D.

    1978-02-01

    Numerous, small, low-grade, supergene uranium deposits are found in Tertiary volcanic and sedimentary rocks in the central Mojave Desert of southern California. Large thorium-to-uranium ratios in samples of Mesozoic intrusive rocks exposed in the area indicate that these rocks have been extensively weathered, eroded, and subsequently leached by ground waters, and that they may have been the primary source of uranium for the deposits. The uranium content of samples of volcanic intrusive and extrusive rocks is average for intermediate to silicic rocks, but samples of basalt flows in the area contain six times the average uranium content of mafic igneous rocks. Devitrified tuffs and tuffaceous sedimentary rocks, interbedded with calcareous units, are additional sources of uranium for supergene uranium deposits found in calcareous units. Uranium is also found in accessory minerals in a few Mesozoic quartz-rich pegmatite dikes. Uranium deposits in the central Mojave Desert have been formed by enrichment during diagenetic replacement of Tertiary carbonate rocks; by supergene enrichment along fractures, joints, and bedding planes in Tertiary volcanic and sedimentary rocks; during formation of Holocene caliche; and by deposition within hydrothermally altered shear zones. Within the area, the diagenetic replacement type of deposit has the greatest potential for large, low-grade uranium occurrences. The other type of uranium deposits are small, erratically distributed, and extensively covered by alluvium

  9. Late Triassic Porphyritic Intrusions And Associated Volcanic Rocks From The Shangri-La Region, Yidun Terrane, Eastern Tibetan Plateau: Implications For Adakitic Magmatism And Porphyry Copper Mineralization

    Science.gov (United States)

    Wang, B.; Zhou, M.; Li, J.; Yan, D.

    2011-12-01

    The Yidun terrane, located on the eastern margin of the Tibetan plateau, has been commonly considered to be a Triassic volcanic arc produced by subduction of the Ganzi-Litang oceanic lithosphere. The Yidun terrane is characterized by numerous arc-affinity granitic intrusions located along a 500-km-long, north-south-trending belt. Among these granitic bodies, several small porphyritic intrusions in the southern segment of the terrane (Shangri-La region) are associated with large porphyry copper deposits. These porphyritc intrusions are composed of diorite and quartz diorite, and spatially associated with andesites and dacites. LA-ICP-MS zircon U-Pb ages of the intrusions range from 230 to 215 Ma. The andesites and dacites are intercalated with slates and sandstones and have ages of around 220 Ma. The intrusive and volcanic rocks have SiO2 contents from 56.6 to 67.1 wt.%, Al2O3 from 14.2 to 17.4 wt.% and MgO from 1.9 to 4.2 wt.%. They show significant negative Nb-Ta anomalies on primitive mantle-normalized spidergrams. They have high La/Yb (13-49) ratios with no prominent Eu anomalies. All the rocks have high Sr (258-1980 ppm), and low Y (13-21 ppm) with high Sr/Y ratios (29-102). The geochemical features indicate that both the volcanic rocks and porphyritic intrusions were derived from adakitic magmas. They have similar initial 87Sr/86Sr ratios (0.7058 to 0.7077) and ɛNd (-1.88 to -4.93) values, but can be further divided into two groups: high silica (HSA) and low silica adakitic rocks (LSA). The HSA, representing an early stage of magmatism (230 to 215 Ma), were derived from oceanic slab melts with limited interaction with the overlying mantle wedge. At 215 Ma, more extensive interaction resulted in the formation of LSA. We propose that HSA were produced by flat subduction leading to melting of oceanic slab, whereas subsequent slab break-off caused the significant interaction between slab melts and the mantle wedge and thus the generation of the LSA. Compared with

  10. Late Triassic porphyritic intrusions and associated volcanic rocks from the Shangri-La region, Yidun terrane, Eastern Tibetan Plateau: Adakitic magmatism and porphyry copper mineralization

    Science.gov (United States)

    Wang, Bai-Qiu; Zhou, Mei-Fu; Li, Jian-Wei; Yan, Dan-Ping

    2011-11-01

    Early Mesozoic porphyritic intrusions in the Shangri-La region, southern Yidun terrane, SW China, are spatially associated with andesites and dacites. These intrusions are composed of diorite and quartz diorite, and are closely related to copper mineralization. LA-ICP-MS zircon U-Pb ages of the intrusions range from 230 to 215 Ma. The associated andesites and dacites are interlayered with slates and sandstones and have ages of around 220 Ma. All of the intrusive and extrusive rocks have similar, highly fractionated REE patterns and high La/Yb (13-49) ratios with no prominent Eu anomalies. They display pronounced negative Nb-Ta and Ti anomalies on primitive mantle-normalized spidergrams. Their SiO2 contents range from 56.6 to 67.1 wt.%, Al2O3 from 14.2 to 17.4 wt.% and MgO from1.9 to 4.2 wt.%. All the rocks have high Sr (258-1980 ppm), and low Y (13-21 ppm) with high Sr/Y ratios (29-102). These features suggest that both the volcanic rocks and porphyritic intrusions were derived from adakitic magmas. They have similar initial 87Sr/86Sr ratios (0.7058 to 0.7077) and εNd (- 1.88 to - 4.93) values, but belong to high silica (HSA) and low silica adakitic rocks (LSA). The HSA represent an early stage of magmatism (230 to 215 Ma) and were derived from oceanic slab melts with limited interaction with the overlying mantle wedge during ascent. At 215 Ma, more extensive interaction produced the LSA. We propose that the early adakitic magmas (HSA) formed by flat subduction leading to melting of oceanic slab, whereas subsequent slab break-off caused the significant interaction between slab melts and the mantle wedge and thus the generation of the later adakitic magmas (LSA).

  11. Uniaxial creep as a control on mercury intrusion capillary pressure in consolidating rock salt

    Energy Technology Data Exchange (ETDEWEB)

    Dewers, Thomas [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Heath, Jason E. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Leigh, Christi D. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    The nature of geologic disposal of nuclear waste in salt formations requires validated and verified two - phase flow models of transport of brine and gas through intact, damaged, and consolidating crushed salt. Such models exist in oth er realms of subsurface engineering for other lithologic classes (oil and gas, carbon sequestration etc. for clastics and carbonates) but have never been experimentally validated and parameterized for salt repository scenarios or performance assessment. Mo dels for waste release scenarios in salt back - fill require phenomenological expressions for capillary pressure and relative permeability that are expected to change with degree of consolidation, and require experimental measurement to parameterize and vali date. This report describes a preliminary assessment of the influence of consolidation (i.e. volume strain or porosity) on capillary entry pressure in two phase systems using mercury injection capillary pressure (MICP). This is to both determine the potent ial usefulness of the mercury intrusion porosimetry method, but also to enable a better experimental design for these tests. Salt consolidation experiments are performed using novel titanium oedometers, or uniaxial compression cells often used in soil mech anics, using sieved run - of - mine salt from the Waste Isolation Pilot Plant (WIPP) as starting material. Twelve tests are performed with various starting amounts of brine pore saturation, with axial stresses up to 6.2 MPa (%7E900 psi) and temperatures to 90 o C. This corresponds to UFD Work Package 15SN08180211 milestone "FY:15 Transport Properties of Run - of - Mine Salt Backfill - Unconsolidated to Consolidated". Samples exposed to uniaxial compression undergo time - dependent consolidation, or creep, to various deg rees. Creep volume strain - time relations obey simple log - time behavior through the range of porosities (%7E50 to 2% as measured); creep strain rate increases with temperature and applied stress as

  12. Natural Radioactivity of Intrusive-Metamorphic and Sedimentary Rocks of the Balkan Mountain Range (Serbia, Stara Planina

    Directory of Open Access Journals (Sweden)

    Sanna Masod Abdulqader

    2017-12-01

    Full Text Available Stara Planina (also known as the Balkan mountain range is known for numerous occurrences and deposits of uranium and associated radionuclides. It is also famous for its geodiversity. The geologic framework is highly complex. The mountain is situated between the latitudes of 43° and 44° N and the longitudes from 22°16′ to 23°00′ E. Uranium exploration and radioactivity testing on Stara Planina began back in 1948. Uranium has also been mined in the zone of Kalna, within the Janja granite intrusive. The naturally radioactive geologic units of Stara Planina are presented in detail in this paper. The main sources of radioactivity on Stara Planina can be classified as: 1. Granitic endogenous—syngenetic–epigenetic deposits and occurrences; 2. Metamorphogenic—syngenetic; and 3. Sedimentary, including occurrences of uranium deposition and fluctuation caused by water in different types of sedimentary rocks formed in a continental setting, which could be classified under epigenetic types. The area of Stara Planina with increased radioactivity (higher than 200 cps, measured by airborne gamma spectrometry, is about 380 square kilometers. The highest values of measured radioactivity and uranium grade were obtained from a sample taken from the Mezdreja uranium mine tailing dump, where 226Ra measures 2600 ± 100 Bq/kg and the uranium grade is from 76.54 to 77.65 ppm U. The highest uranium (and lead concentration, among all samples, is measured in graphitic schist with high concentrations of organic (graphitic material from the Inovska Series—99.47 ppm U and 107.69 ppm Pb. Thorium related radioactivity is the highest in granite samples from the Janja granite in the vicinity of the Mezdreja granite mine and the Gabrovnica granite mine tailing dump, and it is the same—250 ± 10 Bq/kg for 232Th, while the thorium grade varies from 30.82 to 60.27 ppm Th. In gray siltstones with a small amount of organic material, the highest radioactivity is

  13. The dissolution of high-FeO olivine rock from the Lovasjaervi intrusion (SE-Finland) at 25 deg. C as a function of pH

    International Nuclear Information System (INIS)

    Duro, Lara; El Aamrani, Fatima; Rovira, Miquel; Gimenez, Javier; Casas, Ignasi; Pablo, Joan de; Bruno, Jordi

    2005-01-01

    The high-FeO olivine-rich rock from the Lovasjaervi intrusion (65% olivine, 20% plagioclase, 8% magnetite, 4% pyroxene and 3% serpentine) has been proposed as a potential redox-active backfill-additive in deep high level nuclear waste repositories. In this work, the authors report on kinetic dissolution studies of this solid under different pH and redox conditions performed by using a flow-through methodology. Assuming that silicon is mainly released to solution from the olivine contained in the solid, the experimental results have been adjusted to an empirical rate law as a function of proton concentration. The proton concentration reaction orders agree with results found in the literature for both acidic and alkaline pH ranges. The calculations conducted with the reactive transport code RETRASO show that at alkaline pH, the olivine rock might have a lower redox buffer capacity than expected

  14. Effect of ultramafic intrusions and associated mineralized rocks on the aqueous geochemistry of the Tangle Lakes Area, Alaska: Chapter C in Studies by the U.S. Geological Survey in Alaska, 2011

    Science.gov (United States)

    Wang, Bronwen; Gough, Larry P.; Wanty, Richard B.; Lee, Gregory K.; Vohden, James; O’Neill, J. Michael; Kerin, L. Jack

    2013-01-01

    Stream water was collected at 30 sites within the Tangle Lakes area of the Delta mineral belt in Alaska. Sampling focused on streams near the ultramafic rocks of the Fish Lake intrusive complex south of Eureka Creek and the Tangle Complex area east of Fourteen Mile Lake, as well as on those within the deformed metasedimentary, metavolcanic, and intrusive rocks of the Specimen Creek drainage and drainages east of Eureka Glacier. Major, minor, and trace elements were analyzed in aqueous samples for this reconnaissance aqueous geochemistry effort. The lithologic differences within the study area are reflected in the major-ion chemistry of the water. The dominant major cation in streams draining mafic and ultramafic rocks is Mg2+; abundant Mg and low Ca in these streams reflect the abundance of Mg-rich minerals in these intrusions. Nickel and Cu are detected in 84 percent and 87 percent of the filtered samples, respectively. Nickel and Cu concentrations ranged from Ni colloidal, phase.

  15. Implications of Late Cretaceous U-Pb zircon ages of granitic intrusions cutting ophiolitic and volcanogenic rocks for the assembly of the Tauride allochthon in SE Anatolia (Helete area, Kahramanmaraş Region, SE Turkey)

    Science.gov (United States)

    Nurlu, Nusret; Parlak, Osman; Robertson, Alastair; von Quadt, Albrecht

    2016-01-01

    An assemblage of NE-SW-trending, imbricate thrust slices (c. 26 km E-W long × 6.3 km N-S) of granitic rocks, basic-felsic volcanogenic rocks (Helete volcanics), ophiolitic rocks (Meydan ophiolite) and melange (Meydan melange) is exposed near the Tauride thrust front in SE Anatolia. The volcanogenic rocks were previously assumed to be Eocene because of associated Nummulitic limestones. However, ion probe U-Pb dating of zircons extracted from the intrusive granitic rocks yielded ages of 92.9 ± 2.2-83.1 ± 1.5 Ma (Cenomanian-Campanian). The Helete volcanic unit and the overlying Meydan ophiolitic rocks both are intruded by granitic rocks of similar age and composition. Structurally underlying ophiolite-related melange includes similar-aged, but fragmented granitic intrusions. Major, trace element and rare earth element analyses coupled with electron microprobe analysis of the granitic rocks show that they are metaluminus to peraluminus and calc-alkaline in composition. A magmatic arc setting is inferred from a combination of tectonomagmatic discrimination, ocean ridge granite-normalized multi-element patterns and biotite geochemistry. Sr-Nd-Pb isotope data further suggest that the granitoid rocks were derived from variably mixed mantle and crustal sources. Granitic rocks cutting the intrusive rocks are inferred to have crystallized at ~5-16 km depth. The volcanogenic rocks and granitic rocks originated in a supra-subduction zone setting that was widely developed throughout SE Anatolia. Initial tectonic assembly took place during the Late Cretaceous probably related to northward subduction and accretion beneath the Tauride continent (Keban and Malatya platforms). Initial tectonic assembly was followed by exhumation and then transgression by shelf-depth Nummulitic limestones during Mid-Eocene, as documented in several key outcrops. Final emplacement onto the Arabian continental margin took place during the Early Miocene.

  16. Petrology and geochemistry of intrusive rocks in Some-Ahani and Ferezneh prospect areas, east of Sangan mine, Khaf (Southeast of Mashhad

    Directory of Open Access Journals (Sweden)

    Nazi Mazhari

    2017-03-01

    Full Text Available The Some-Ahani and Ferezneh prospect areas are two of the eastern anomalies ofKhaf’s Sangan iron mine in Khorasan Razavi province. Biotite monzonite porphyry andbiotite syenogranite Tertiary plutons occurred in the area of study. Due to the severe alteration of biotite monzonite porphyry intrusion, geochemical studies have beenfocused on the biotite syenogranite. It is chemically peraluminous, moderate to highpotassic and magnesian and its tectonic setting is of post orogenic. In both A-typegranites and in differentiated peralkaline I-type granitic rocks: negative Eu anomaly,mild enrichment of LREE, positive, relatively flat HREE pattern, negative anomalies ofBa, Sr, La, Ce, Ti, and large amount of Ga (16- 24 ppm are the same. On the basis ofmajor oxide values and SiO2 vs. FeOt/MgO ratio, the prospect area samples fall in therange of I-type granites. Variations in the minor and trace elements in all samplesindicate fractional crystallization in separation of plagioclase, alkali feldspar and biotite,generated by fractional crystallization from an I-type granitic magma poor in P. Increasein HFS elements such as Ga and Nb is associated with the differentiation of thesegranites. Comparison of the intrusions studied with Bermani and Sarkhar rocks insoutheast Sangan shows that variations in the major, minor and rare earth elements aresimilar to each other and to those of I-type granites, which can be differentiated by various degrees of partial melting of andesite and dacite protolith or are produced by atwo-stage process of remelting intermediate rocks.

  17. Silicate geothermometry as an indicator of water-rock interaction processes in the serpentinized mafic-ultramafic intrusion of Ylivieska

    International Nuclear Information System (INIS)

    Ruskeeniemi, T.; Blomqvist, R.; Vuorela, P.; Frape, S.K.; Blyth, A.

    1996-01-01

    The aim of the study was to use oxygen and hydrogen isotopes to examine the origin of different generations of serpentine. Of special interest was the study of low-temperature generations that may be correlated with the present meteoric waters. The research was commenced with drill core logging in order to obtain insight into the fracture minerals and their distribution in a mafic-ultramafic intrusion. (39 refs., 17 figs., 5 tabs.)

  18. Potassium-argon ages of mainly intrusive rocks in the Saint Elias Mountains, Yukon and British Columbia

    National Research Council Canada - National Science Library

    Dodds, C. J; Campbell, R. B

    1988-01-01

    One hundred and two new K-Ar age determinations, largely from granitoid rocks, are reported from the Saint Elias Mountains of southwest Yukon, northwest British Columbia, and closely adjacent parts of Alaska...

  19. Consideration of the ultramafic intrusive rocks in Arroyo Las Palmas (ex Cerro Chato - Las Canias) Durazno. R. O. del Uruguay

    International Nuclear Information System (INIS)

    Coronel, N.

    1987-01-01

    This work is about the ultramafic rocks which its chemistry composition fluctuate since the basic to the ultra basic field and appear in the nascent of the Las Palmas stream near Las Canias and Cerro Chato district.

  20. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock -revision 1

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-04-01

    Canada has conducted an extensive research program on a concept of safe disposal of nuclear fuel wastes deep In plutonic rock of the Canadian Shield. An essential goal of this program has been to develop and demonstrate a methodology to evaluate the performance of the facility against safety criteria established by Canada's regulatory agency, the Atomic Energy Control Board. These criteria are expressed in terms of risk, where risk is defined as the sum, over all significant scenarios, of the product of the probability of the scenario, the magnitude of the resultant dose, and the probability of a health effect per unit dose. This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicity displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information. (author). 53 refs., 8 tabs., 2 figs

  1. Acid-neutralizing potential of minerals in intrusive rocks of the Boulder batholith in northern Jefferson County, Montana

    Science.gov (United States)

    Desborough, George A.; Briggs, Paul H.; Mazza, Nilah; Driscoll, Rhonda

    1998-01-01

    Experimental studies show that fresh granitic rocks of the Boulder batholith in the Boulder River headwaters near Basin, Montana have significant acid-neutralizing potential and are capable of neutralizing acidic water derived from metal-mining related wastes or mine workings. Laboratory studies show that in addition to the acidneutralizing potential (ANP) of minor amounts of calcite in these rocks, biotite, tremolite, and feldspars will contribute significantly to long-term ANP. We produced 0.45 micrometer-filtered acidic (pH = 2.95) leachate for use in these ANP experiments by exposing metal-mining related wastes to deionized water in a waste:leachate ratio of 1:20. We then exposed these leachates to finely-ground and sized fractions of batholith rocks, and some of their mineral fractions for extended and repeated periods, for which results are reported here. The intent was to understand what reactions of metal-rich acidic water and fresh igneous rocks would produce. The reactions between the acidic leachates and the bulk rocks and mineral fractions are complex. Factors such as precipitation of phases like Fe-hydroxides and Alhydroxides and the balance between dissolved cations and anions that are sulfate dominated complicate analysis of the results. Research by others of acid neutralization by biotite and tremolite attributed a rise in pH to proton (H+) adsorption in sites vacated by K, Mg, and Ca. Destruction of the silicate framework and liberation of associated structural hydroxyl ions may contribute to ANP. Studies by others have indicated that the conversion of biotite to a vermiculite-type structure by removal of K at a pH of 4 consumes about six protons for every mole of biotite, but at a pH of 3 there is pronounced dissolution of the tetrahedral lattice. The ANP of fresh granitic rocks is much higher than anticipated. The three bulk Boulder igneous rock samples studied have minimum ANP equivalent to about 10-14 weight percent calcite. This ANP is in

  2. Ages and petrogenesis of Jurassic and Cretaceous intrusive rocks in the Matsu Islands: Implications for lower crust modification beneath southeastern China

    Science.gov (United States)

    Chen, Jing-Yuan; Yang, Jin-Hui; Ji, Wei-Qiang

    2017-12-01

    Major and trace element, whole-rock Sr-, Nd- and Hf-isotope, zircon U-Pb age and Hf-O isotope data are reported for the intrusive rocks from the Matsu Islands in the coastal area of southeastern (SE) China, in order to study the ages, sources and petrogenesis of these rocks and evolution of the lower crust. The rocks include gneissic granite, massive granite, brecciated granite and diabase. Secondary ion mass spectrometer (SIMS) zircon U-Pb dating reveals that the rocks in the Matsu Islands were emplaced at ∼160 Ma, ∼130 Ma and ∼94 Ma. The Jurassic granites (∼160 Ma) have high SiO2 (74.1-74.5 wt%) and K2O + Na2O (8.32-8.33 wt%) contents and high Rb/Sr ratios of 0.6-1.2 and (La/Yb)CN ratios of 12.6-19.4. Their relatively high initial 87Sr/86Sr ratios (0.7074-0.7101), variable and negative εNd(t) values (-9.2 to -5.4), and variable zircon εHf(t) (-17.0 to +5.2) and δ18O (4.7-8.1‰) values indicate they were mainly derived from an ancient lower crustal source, but with involvement of high εHf(t) and low δ18O materials. The Early Cretaceous diabase (∼130 Ma) has SiO2 content of 56.5 wt%, relatively high MgO concentration, low initial 87Sr/86Sr ratio and negative εNd(t) value, similar to geochemical features of other Cretaceous mafic rocks in the coastal area of SE China. Zircons from the diabase have high εHf(t) values (-5.5 to +0.2) and relatively low δ18O values of 4.2-5.0‰. These characteristics indicate that the parental magma of the diabase was generated by partial melting of enriched lithospheric mantle, which have been metasomatised by altered oceanic crust-derived low-δ18O fluids. For the Cretaceous granitoids (∼130 Ma and 94 Ma), they have relatively low SiO2 (68.0-71.3 wt%) and K2O + Na2O (5.30-7.55 wt%) contents and low Rb/Sr ratios and (La/Yb)CN ratios of 5.8-7.1. They have low initial 87Sr/86Sr ratios (0.7071-0.7082), homogeneous εNd(t) (-4.3 to -4.5) and relatively high zircon εHf(t) values (-3.7 to +1.2) and low δ18O values (4

  3. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  4. Geochronology and geochemistry of early Paleozoic intrusive rocks from the Khanka Massif in the Russian Far East: Petrogenesis and tectonic implications

    Science.gov (United States)

    Xu, Ting; Xu, Wen-Liang; Wang, Feng; Ge, Wen-Chun; Sorokin, A. A.

    2018-02-01

    This paper presents new geochronological and geochemical data for early Paleozoic intrusive rocks from the Khanka Massif in the Russian Far East, with the aim of elucidating the Paleozoic evolution and tectonic attributes of the Khanka Massif. New U-Pb zircon data indicate that early Paleozoic magmatism within the Khanka Massif can be subdivided into at least four stages: 502, 492, 462-445, and 430 Ma. The 502 Ma pyroxene diorites contain 58.28-59.64 wt% SiO2, 2.84-3.69 wt% MgO, and relatively high Cr and Ni contents. Negative εHf(t) values (- 1.8 to - 0.4), along with other geochemical data, indicate that the primary magma was derived from partial melting of mafic lower crust with the addition of mantle material. The 492 Ma syenogranites have high SiO2 and K2O contents, and show positive Eu anomalies, indicating the primary magma was generated by partial melting of lower crust at relatively low pressure. The 445 Ma Na-rich trondhjemites display high Sr/Y ratios and positive εHf(t) values (+ 1.8 to + 3.9), indicating the primary magma was generated by partial melting of thickened hydrous mafic crust. The 430 Ma granitoids have high SiO2 and K2O contents, zircon εHf(t) values of - 5.4 to + 5.8, and two-stage model ages of 1757-1045 Ma, suggesting the primary magma was produced by partial melting of heterogeneous Proterozoic lower crustal material. The geochemistry of these early Paleozoic intrusive assemblages indicates their formation in an active continental margin setting associated with the subduction of a paleo-oceanic plate beneath the Khanka Massif. The εHf(t) values show an increasingly negative trend with increasing latitude, revealing a lateral heterogeneity of the lower crust beneath the Khanka Massif. Regional comparisons of the magmatic events indicate that the Khanka Massif in the Russian Far East has a tectonic affinity to the Songnen-Zhangguangcai Range Massif rather than the adjacent Jiamusi Massif.

  5. Assessment of the long-term risks of inadvertent human intrusion into a disposal vault in deep plutonic rock: reassessment using ICRP recommendations

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1996-06-01

    Canada has conducted an extensive research program on the safe disposal of nuclear fuel waste. The program has focussed on the concept of disposal in durable containers in an engineered facility or 'vault' located 500 to 1000 m deep in plutonic rock on the Canadian Shield. As part of this task, a methodology was developed to assess the long-term risk from inadvertent intrusion scenarios, and applied to a reference conceptual design of a facility for disposal of used fuel. The AECB has specified that 'the predicted radiological risk to individuals from a waste disposal facility shall not exceed 10 -6 fatal cancers and serious genetic effects in a year.' Risk is defined as the sum, of the product of the probability of the scenario, the magnitude of the resultant radiation dose, and the probability of a health effect per unit dose. The AECB also specifies that 'calculations of individual risk should be made by using the risk conversion factor of 2 x 10 -2 per sievert.' Our earlier assessment of four human intrusion scenarios showed that the estimated risk using the risk conversion factor recommended by the AECB was at least 3 orders of magnitude below the AECB risk criterion, at all times up to 10 000 a, for each of the four scenarios analysed. The AECB risk criterion and risk conversion factor are based on the recommendations of the Intemafional Commission on Radiological Protection (ICRP) in their Publication ICRP 26. More recently, in its Publication ICRP 60, the ICRP has recommended dose factors for fatal cancers that are larger than those in ICRP 26 and an increase in the risk factor for serious hereditary effects in all future generations. Another ICRP Publication, ICRP 64, states that 'For potential exposure situations, the consideration of the basic dose response used for stochastic effects must be extended into the range of high doses where deterministic effects also occur.' For the new assessments of risk we use the estimated doses and probabilities of

  6. Geochronology and geochemistry of Mesozoic intrusive rocks in the Xing'an Massif of NE China: Implications for the evolution and spatial extent of the Mongol-Okhotsk tectonic regime

    Science.gov (United States)

    Li, Yu; Xu, Wen-Liang; Tang, Jie; Pei, Fu-Ping; Wang, Feng; Sun, Chen-Yang

    2018-04-01

    This study presents new zircon U-Pb-Hf and whole-rock geochemical data for intrusive rocks in the Xing'an Massif of NE China, with the aim of furthering our understanding of the evolution and spatial influence of the Mongol-Okhotsk tectonic regime. Zircon U-Pb dating indicates that five stages of Mesozoic magmatism are recorded in the Xing'an Massif, namely during the Middle Triassic ( 237 Ma), the Late Triassic ( 225 Ma), the Early Jurassic ( 178 Ma), the Middle Jurassic ( 168 Ma), and the late Early Cretaceous ( 130 Ma). The Middle Triassic-Early Jurassic intrusive rocks in the Xing'an Massif are dominantly granodiorites, monzogranites, and syenogranites that formed from magma generated by partial melting of newly accreted continental crust. Geochemistry of the Middle Triassic-Early Jurassic granitoid suites of the Xing'an Massif indicates their formation at an active continental margin setting, related to the southwards subduction of the Mongol-Okhotsk oceanic plate. The Middle Jurassic monzogranites in the Xing'an Massif are geochemically similar to adakites and have εHf(t) values (+3.8 to +5.8) and Hf two-stage model ages (TDM2; 979-850 Ma) that are indicative of derivation from magma generated by partial melting of thickened juvenile lower crust. The Middle Jurassic monzogranites formed in a compressional setting related to the closure of the Mongol-Okhotsk Ocean. The late Early Cretaceous intrusive rocks in the Xing'an Massif are dominated by A-type granitoids that are associated with bimodal volcanic rocks, suggesting their formation in an extensional environment related to either (i) delamination of a previously thickened region of the crust, associated with the Mongol-Okhotsk tectonic regime; (ii) the subduction of the Paleo-Pacific Plate; or (iii) the combined influence of these two tectonic regimes.

  7. Vapor Intrusion

    Science.gov (United States)

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  8. Assessment of the long-term risks of inadvertent human intrusion into a proposed Canadian nuclear fuel waste disposal vault in deep plutonic rock

    International Nuclear Information System (INIS)

    Wuschke, D.M.

    1992-05-01

    This report describes the methodology developed to assess the long-term risk from inadvertent human intrusion into such a facility, and the results of its application to the proposed facility. Four intrusion scenarios were analysed, all initiated by a drilling operation. These scenarios are exposure of a member of the drilling crew, of a technologist conducting a core examination, of a construction worker and of a resident. The consequence of each scenario was estimated using standard computer codes for environmental pathways analysis and radiation dosimetry. For comparison with the risk criterion, an estimate of the probability of each scenario is also required. An event-tree methodology was used to estimate these probabilities. The estimated risks from these intrusion scenarios are several orders of magnitude below the established risk criterion. The event-tree methodology has the advantages of explicitly displaying the assumptions made, of permitting easy testing of the sensitivity of the risk estimates to assumptions, and of combining technical and sociological information

  9. Geology, mineralization, Rb-Sr & Sm-Nd geochemistry, and U–Pb zircon geochronology of Kalateh Ahani Cretaceous intrusive rocks, southeast Gonabad

    Directory of Open Access Journals (Sweden)

    Mohammad Hassan Karimpour

    2013-10-01

    Full Text Available Kalateh Ahani is located 27 km southeast of Gonabad within the Khorasan Razavi province. The area is part of Lut Block. Sub-volcanic monzonitic rocks intruded regional metamorphosed Shemshak Formation (Jurassic age. Magnetic susceptibility of less altered monzonitic rocks is 0.6%., As, Pb and Zn > 1%, Au up to 150 ppb and Sn = 133 ppm. The Sn content of vein in the northern part of Kalateh Ahani (Rud Gaz is > 1%. Based on mineralization, alteration and geochemistry, it seems that Sn mineralization is associated with the Cretaceous monzonitic rocks. Zircon U–Pb dating indicates that the age of the monzonitic rocks associated with mineralization is 109 Ma (Lower Cretaceous. Based on (87Sr/86Sri = 0.71089-0.710647 and (143Nd/144Ndi = 0.512113-0.51227 of the monzonitic rocks, the magma for these rocks were originated from the continental crust. This research has opened new window with respect to Sn-Cu mineralization and exploration within the Lut Block which is associated with Cretaceous granitoid rocks (reduced type, ilmenite series originated from the continental crust.

  10. Intrusion of lamprophyre dyke and related deformation effects in the host rock salt: A case study from the Loulé diapir, Portugal

    Czech Academy of Sciences Publication Activity Database

    Machek, Matěj; Roxerová, Zuzana; Závada, Prokop; Silva, P. F.; Henry, B.; Dědeček, Petr; Petrovský, Eduard; Marques, F. O.

    2014-01-01

    Roč. 629, August (2014), s. 165-178 ISSN 0040-1951 Institutional support: RVO:67985530 Keywords : AMS * lamprophyre dyke * rock salt * paleomagnetism * microstructure * CPO Subject RIV: DB - Geology ; Mineralogy Impact factor: 2.872, year: 2014

  11. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  12. Emplacement mechanisms and structural influences of a younger granite intrusion into older wall rocks - a principal study with application to the Goetemar and Uthammar granites. Site-descriptive modelling SDM-Site Laxemar

    Energy Technology Data Exchange (ETDEWEB)

    Cruden, Alexander R. (Dept. of Geology, Univ. of Toronto (Canada))

    2008-12-15

    The c. 1.80 Ga old bedrock in the Laxemar-Simpevarp area, which is the focus of the site investigation at Oskarshamn, is dominated by intrusive rocks belonging to the c. 1.86-1.65 Ga Transscandinavian Igneous Belt (TIB). However, the site investigation area is situated in between two c. 1.45 Ga old anorogenic granites, the Goetemar granite in the north and the Uthammar granite in the south. This study evaluates the emplacement mechanism of these intrusions and their structural influence on the older bedrock. Field observations and structural measurements indicate that both the Goetemar and the Uthammar granites are discordant and have not imposed any significant ductile deformation on their wall-rocks. The apparent conformity of geological contacts and fabrics in the wall rocks and the southern margin of the Goetemar granite is coincidental and inherited from the pattern of Svecokarelian deformation of the TIB. However, interpretation of regional aeromagnetic data suggests that the granites occur within a broad, NNE-SSW trending linear belt, pointing to deep seated tectonic control on their generation, ascent and emplacement. Thermochronology indicates that the granites were emplaced at depths between 4 and 8 km into brittle wall rocks. The 3-D shape of the Goetemar and Uthammar plutons has been investigated by 2.75D forward modelling of the residual gravity anomalies due to both granites. Both granites are associated with strong residual gravity anomalies of up to -10 mgal. Constraints on the geometry of the plutons at the surface are provided from surface geology maps and several deep boreholes located on or close to the model profiles. A further variable in the gravity modelling is introduced by either allowing the upper contact of the plutons to assume the most suitable orientation to produce the best fit between the modelled and observed gravity ('unconstrained models') or by forcing the near surface orientation of the contacts to be vertical (&apos

  13. Emplacement mechanisms and structural influences of a younger granite intrusion into older wall rocks - a principal study with application to the Goetemar and Uthammar granites. Site-descriptive modelling SDM-Site Laxemar

    International Nuclear Information System (INIS)

    Cruden, Alexander R.

    2008-12-01

    The c. 1.80 Ga old bedrock in the Laxemar-Simpevarp area, which is the focus of the site investigation at Oskarshamn, is dominated by intrusive rocks belonging to the c. 1.86-1.65 Ga Transscandinavian Igneous Belt (TIB). However, the site investigation area is situated in between two c. 1.45 Ga old anorogenic granites, the Goetemar granite in the north and the Uthammar granite in the south. This study evaluates the emplacement mechanism of these intrusions and their structural influence on the older bedrock. Field observations and structural measurements indicate that both the Goetemar and the Uthammar granites are discordant and have not imposed any significant ductile deformation on their wall-rocks. The apparent conformity of geological contacts and fabrics in the wall rocks and the southern margin of the Goetemar granite is coincidental and inherited from the pattern of Svecokarelian deformation of the TIB. However, interpretation of regional aeromagnetic data suggests that the granites occur within a broad, NNE-SSW trending linear belt, pointing to deep seated tectonic control on their generation, ascent and emplacement. Thermochronology indicates that the granites were emplaced at depths between 4 and 8 km into brittle wall rocks. The 3-D shape of the Goetemar and Uthammar plutons has been investigated by 2.75D forward modelling of the residual gravity anomalies due to both granites. Both granites are associated with strong residual gravity anomalies of up to -10 mgal. Constraints on the geometry of the plutons at the surface are provided from surface geology maps and several deep boreholes located on or close to the model profiles. A further variable in the gravity modelling is introduced by either allowing the upper contact of the plutons to assume the most suitable orientation to produce the best fit between the modelled and observed gravity ('unconstrained models') or by forcing the near surface orientation of the contacts to be vertical ('constrained

  14. Survival of the Lhasa Terrane during its collision with Asia due to crust-mantle coupling revealed by ca. 114 Ma intrusive rocks in western Tibet

    Science.gov (United States)

    Wang, Qing; Zhu, Di-Cheng; Liu, An-Lin; Cawood, Peter A.; Liu, Sheng-Ao; Xia, Ying; Chen, Yue; Wang, Hao; Zhang, Liang-Liang; Zhao, Zhi-Dan

    2018-04-01

    Survival of the Lhasa Terrane during its drift across the Tethyan Ocean and subsequent collision with Asia was likely maintained by mechanical coupling between its ancient lithospheric mantle and the overlying crust. Evidence for this coupling is provided by geochronological and geochemical data from high-Mg dioritic porphyrite dikes that intruded into granodiorites with dioritic enclaves within the Nixiong Batholith in the western segment of the central Lhasa subterrane, southern Tibet. Zircon LA-ICP-MS U-Pb dating indicates synchronous emplacement of dioritic porphyrite dikes (113.9 ± 2 Ma), dioritic enclaves (113.9 ± 1 Ma), and host granodiorites (113.1 ± 2 Ma). The hornblende-bearing granodiorites are metaluminous to weakly peraluminous (A/CNK = 0.95-1.05) and belong to high-K calc-alkaline I-type granite. These rocks are characterized by low Mg# (37-43), negative zircon εHf(t) values (-6.8 to -1.2), and negative whole-rock εNd(t) values (-8.1 to -5.4), suggestive of derivation through anatexis of ancient lower crust. The two least-mixed or contaminated dioritic porphyrite dike samples have high MgO (8.46-8.74 wt%), high Mg# (69-70), and high abundances of compatible elements (e.g., Cr = 673-646 ppm, Ni = 177-189 ppm), which are close to those of primitive magma. They are high-K calc-alkaline and show negative whole-rock εNd(t) values (-1.9 to -1.2), indicating that these samples are most likely derived from the partial melting of ancient lithospheric mantle that was metasomatized by slab-derived fluids. The dioritic enclave samples are metaluminous high-K calc-alkaline and have varying negative whole-rock εNd(t) values (-7.8 to -3.7), which are interpreted as the result of magma mixing between the ancient lower crust-derived melts and asthenospheric mantle- (rather than lithospheric mantle-) derived melts. The Nd isotope mantle model ages of the least-mixed or contaminated high-Mg dioritic porphyrite dike samples (1.1-1.4 Ga) are close to the Nd isotope

  15. Excess water generation during reaction-inducing intrusion of granitic melts into ultramafic rocks at crustal P-T conditions in the Sør Rondane Mountains of East Antarctica

    Science.gov (United States)

    Uno, Masaoki; Okamoto, Atsushi; Tsuchiya, Noriyoshi

    2017-07-01

    Arc magmas are one of the main sources of aqueous geofluids in the crust, and the movement of fluids above magma chambers has been geophysically imaged. Here, we constrain the water budget (i.e., supply, consumption and release of H2O) in these areas above magma chamber by examining the hydration caused by crust-melt reactions in the Sør Rondane Mountains of East Antarctica. The study area contains a phlogopite-pargasite-peridotite unit that has been intruded by numerous granitic dikes, creating hydration reaction zones at the dike-peridotite boundary. These reactions occurred at 0.5 GPa and 700 °C, corresponding to middle crustal conditions, and generated a series of reaction zones with distance from the granitic dikes as follows: (i) granitic dike, (ii) pargasite-actinolite zone, (iii) tremolite-phlogopite zone, (iv) anthophyllite-phlogopite zone, (v) phlogopite-olivine-orthopyroxene zone, and (vi) unaltered pargasite-phlogopite peridotite. The presence of amphiboles with a preferred orientation perpendicular to the dike margins and an absence of Cr-rich magnetite indicate that the pargasite-actinolite zone [zone (ii)] grew from the dike margins as a result of the dike reacting with the host rock, with an initial melt/rock boundary located between zones (ii) and (iii). The H2O contents of reaction zones (ii)-(v) are higher than the content in the hosting pargasite-phlogopite peridotite, suggesting that the intrusion of the dike was associated with hydration reactions. Geochemical analysis along a profile through the reaction zones indicates Mg and Fe depletion, and Si enrichment in zones (iii)-(iv), and Ca depletion and K enrichment in zones (iv)-(v) relative to the hosting pargasite-phlogopite peridotite. In contrast, zone (ii) is characterized by Ca, Fe, and Mg enrichments relative to the granitic dike. These observations suggest that the reaction zone sequence was formed by the elemental transfer between granitic dike and parasite-phlogopite peridotite: Ca

  16. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  17. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  18. Brine and Gas Flow Patterns Between Excavated Areas and Disturbed Rock Zone in the 1996 Performance Assessment for the Waste Isolation Pilot Plant for a Single Drilling Intrusion that Penetrates Repository and Castile Brine Reservoir

    Energy Technology Data Exchange (ETDEWEB)

    ECONOMY,KATHLEEN M.; HELTON,JON CRAIG; VAUGHN,PALMER

    1999-10-01

    The Waste Isolation Pilot Plant (WIPP), which is located in southeastern New Mexico, is being developed for the geologic disposal of transuranic (TRU) waste by the U.S. Department of Energy (DOE). Waste disposal will take place in panels excavated in a bedded salt formation approximately 2000 ft (610 m) below the land surface. The BRAGFLO computer program which solves a system of nonlinear partial differential equations for two-phase flow, was used to investigate brine and gas flow patterns in the vicinity of the repository for the 1996 WIPP performance assessment (PA). The present study examines the implications of modeling assumptions used in conjunction with BRAGFLO in the 1996 WIPP PA that affect brine and gas flow patterns involving two waste regions in the repository (i.e., a single waste panel and the remaining nine waste panels), a disturbed rock zone (DRZ) that lies just above and below these two regions, and a borehole that penetrates the single waste panel and a brine pocket below this panel. The two waste regions are separated by a panel closure. The following insights were obtained from this study. First, the impediment to flow between the two waste regions provided by the panel closure model is reduced due to the permeable and areally extensive nature of the DRZ adopted in the 1996 WIPP PA, which results in the DRZ becoming an effective pathway for gas and brine movement around the panel closures and thus between the two waste regions. Brine and gas flow between the two waste regions via the DRZ causes pressures between the two to equilibrate rapidly, with the result that processes in the intruded waste panel are not isolated from the rest of the repository. Second, the connection between intruded and unintruded waste panels provided by the DRZ increases the time required for repository pressures to equilibrate with the overlying and/or underlying units subsequent to a drilling intrusion. Third, the large and areally extensive DRZ void volumes is a

  19. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  20. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  1. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  2. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and....../or liquid immiscibility. Forty-eight whole rock samples from well-constrained stratigraphic levels in the intrusion were crushed, powdered and dissolved, followed by iron separation by ion chromatography. Purified solutions were analyzed by MC- ICPMS in high-resolution mode using the sample-std bracket...

  3. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  4. Determination of concentrations and isotopic ratio of uranium in groundwaters drawn from two deep wells drilled in granitic rocks belonging to Itu intrusive suite; Determinacao das concentracoes e razoes isotopicas de uranio em aguas subterraneas extraidas de pocos perfurados em rochas da suite intrusiva de Itu (SP)

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Francisca de; Reyes, Erika; Marques, Leila Soares [Sao Paulo Univ., SP (Brazil). Inst. de Astronomia, Geofisica e Ciencias Atmosfericas. Dept. de Geofisica]. E-mail: francisca@iag.usp.br; erika@iag.usp.br; leila@iag.usp.br

    2005-07-01

    This paper presents the first results obtained in the determination of dissolved uranium concentrations and ({sup 234}U/{sup 238}U) activity ratios of groundwaters drawn from two deep wells drilled in granitic rocks belonging to Itu Intrusive Suite, which is located at eastern Sao Paulo State. One of the wells, whose groundwaters have been analyzed, is located in Salto Town, while the other one is located in Itu Town. The groundwater sampling is monthly and begun on September, 2004, in order to investigate possible sazonal variations. The alpha spectrometry technique, associated with isotopic dilution method, has been used for these determinations. The data obtained up to now show that the groundwaters from Salto present uranium concentrations significantly lower ((0.098 {+-} 0.007) - (0.17 {+-} 0.01) ng/g) than those from Itu ((0.22 {+-} 0.02) - (0.31 {+-} 0.02) ng/g). The {sup 234}U and {sup 238}U isotopes of the investigated groundwaters from both wells are in radioactive disequilibrium, with ({sup 234}U/{sup 238}U) activity ratios systematically higher than unity. Although the groundwaters from Salto well are characterized by low {sup 234}U and {sup 238}U specific activities they present higher ({sup 234}U/{sup 238}U) activity ratios than those from Itu. The observed differences on the behavior of uranium concentrations and ({sup 234}U/{sup 238}U) activity ratios in the groundwaters from the two wells are very probably due to the large variety of granitic rocks from Itu Intrusive Suite, which are characterized by distinct uranium abundances. (author)

  5. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  6. Oceanic thermohaline intrusions: theory

    Science.gov (United States)

    Ruddick, Barry; Kerr, Oliver

    2003-03-01

    This is a review of theories governing growth and evolution of thermohaline intrusive motions. We discuss theories based on eddy coefficients and salt finger flux ratios and also on molecular Fickian diffusion, drawing relationships and parallels where possible. We discuss linear theories of various physical configurations, effects of rotation and shear, and nonlinear theories. A key requirement for such theories to become quantitatively correct is the development and field testing of relationships between double-diffusive fluxes and average vertical gradients of temperature and salinity. While we have some ideas about the functional dependencies and rough observational constraints on the magnitudes of such flux/gradient relationships, many questions will not be answered until usable ‘flux laws’ exist. Furthermore, numerical experiments on double-diffusive intrusions are currently feasible, but will have more quantitative meaning when fluxes are parameterised with such laws. We conclude that more work needs to be done in at least two areas. Firstly, tests of linear theory against observations should continue, particularly to discover the extent to which linear theories actually explain the genesis of intrusions. Secondly, theoretical studies are needed on the nonlinear effects that control the evolution and finite amplitude state of intrusions, since these determine the lateral fluxes of salt, heat, and momentum.

  7. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  8. Geochronology of the Neogene intrusive magmatism of the Oaș—Gutâi Mountains, Eastern Carpathians (NW Romania)

    Science.gov (United States)

    Kovacs, Marinel; Pécskay, Zoltán; Fülöp, Alexandrina; Jurje, Maria; Edelstein, Oscar

    2013-12-01

    Earlier geological work in the Oaș-Gutâi Mts (OG), Eastern Carpathians, has revealed the extensive presence of shallow subvolcanic intrusive bodies, both exposed on the surface and covered by Paleogene-Neogene sedimentary sequences and Neogene volcanic formations. This study is based on detailed mapping and sampling of the OG Neogene intrusive magmatic rocks. Thirty seven representative intrusions (sills, dykes, microlaccoliths, etc.) were selected for radiometric dating. These intrusions show a wide variety of petrographic rock-types: from microgabbros to microgranodiorites and from basalts to andesites. However, the intrusions consist of typical calc-alkaline, medium-K rocks, similar to the volcanic rocks which outcrop in the same areas. The K-Ar age determinations on whole-rock samples of intrusions yielded ages between 11.9 Ma and 7.0 Ma (from Late Sarmatian to Middle Pannonian). The results are in good agreement with the common assumption, based on the biostratigraphic and geological data, that large volumes of intrusions have formed during the paroxysm of the intermediate volcanic activity in the OG. Except for the Firiza basalt intrusive complex of the Gutâi Mts (8.1-7.0 Ma), the OG intrusions show similar K-Ar ages as the intrusions of the "Subvolcanic Zone" and Călimani Mts from Eastern Carpathians. The timing of the OG intrusive magmatism partially overlaps with the timing of the intrusive magmatic activity in the Eastern Moravia and Pieniny Mts. The systematic radiometric datings in the whole OG give clear evidence that the hydrothermal activity related to the epithermal systems always postdates intrusion emplacement.

  9. Basic rocks in Finland

    International Nuclear Information System (INIS)

    Piirainen, T.; Gehoer, S.; Iljina, M.; Kaerki, A.; Paakkola, J.; Vuollo, J.

    1992-10-01

    Basic igneous rocks, containing less than 52% SiO 2 , constitute an important part of the Finnish Archaean and Proterozoic crust. In the Archaean crust exist two units which contain the majority of the basic rocks. The Arcaean basic rocks are metavolcanics and situated in the Greenstone Belts of Eastern Finland. They are divided into two units. The greenstones of the lower one are tholeiites, komatiites and basaltic komatiites. The upper consists of bimodal series of volcanics and the basic rocks of which are Fe-tholeiites, basaltic komatiites and komatiites. Proterozoic basic rocks are divided into seven groups according to their ages. The Proterozoic igneous activity started by the volominous basic magmatism 2.44 Ga ago. During this stage formed the layered intrusions and related dykes in the Northern Finland. 2.2 Ga old basic rocks are situated at the margins of Karelian formations. 2.1 Ga aged Fe-tholeiitic magmatic activity is widespread in Eastern and Northern Finland. The basic rocks of 1.97 Ga age group are met within the Karelian Schist Belts as obducted ophiolite complexes but they occur also as tholeiitic diabase dykes cutting the Karelian schists and Archean basement. The intrusions and the volcanics of the 1.9 Ga old basic igneous activity are mostly encountered around the Granitoid Complex of Central Finland. Subjotnian, 1.6 Ga aged tholeiitic diabases are situated around the Rapakivi massifs of Southern Finland, and postjotnian, 1.2 Ga diabases in Western Finland where they form dykes cutting Svecofennian rocks

  10. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  11. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  12. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    protection in the United States. AFIT-ENG-13-M-49 NETWORK INTRUSION DATASET ASSESSMENT THESIS Presented to the Faculty Department of Electrical and...conclusions as to its use as a benchmark dataset vary: Cho et al. [10] recommend not using the KDD99 dataset at all, while Engen et al. [16] suggest that...more care be taken in interpretation of results, but recommend continued use. As discussed by Engen et al. [16], researchers continue to use the KDD99

  13. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  14. Noble gas systematics of the Skaergaard intrusion

    Science.gov (United States)

    Horton, F.; Farley, K. A.; Taylor, H. P.

    2017-12-01

    The noble gas isotopic compositions of olivines from the Skaergaard layered mafic intrusion in Greenland reveal that magmas readily exchange noble gases with their environment after emplacement. Although Skaergaard magmas are thought to have derived from the upper mantle, all of the olivine separates we analyzed have 3He/4He ratios less than that of the upper mantle ( 8 Ra, where Ra = 3He/4He of the atmosphere, 1.39 x 10-6). This suggests that crustal and/or atmospheric noble gases have contaminated all Skaergaard magmas to some extent. We obtained the highest 3He/4He ratios ( 2 Ra) from olivines found in the lowermost exposed layers of the intrusion away from the margins. Excess radiogenic 4He (indicated by Raatmospheric isotopic compositions, but higher relative helium abundances than the atmosphere. We suggest that post-crystallization hydrothermal circulation introduced atmosphere-derived noble gases into uppermost layers of the intrusion. Such high temperature exchanges of volatiles between plutons and their immediate surroundings may help explain why so few mantle-derived rocks retain mantle-like noble gas signatures.

  15. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  16. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  17. Wireless Intrusion Detection

    Science.gov (United States)

    2007-03-01

    LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Frequency Error (kHz) Figure 3-8 Frequency error Distributions...0.40 0.45 Linksys/CIAMPIAJ1 Linksys/LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Received Power (dBm) Figure 3-10...Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Rise-Time (samples) Figure 3-12 Packet Rise-Time Distributions During Intrusion

  18. U-Pb zircon geochronology of intrusive and basement rocks in the Jacurici Valley region, Sao Francisco Craton, BA, Brazil; Geocronologia U-Pb em zircao de rochas intrusivas e de embasamento na regiao do Vale do Jacurici, Craton do Sao Francisco, BA

    Energy Technology Data Exchange (ETDEWEB)

    Silveira, Carlos Jose Sobrinho da; Frantz, Jose Carlos; Marques, Juliana Charao; Roos, Siegbert; Peixoto, Vinicius Medina, E-mail: silveira.carlosjose@hotmail.com, E-mail: jose.frantz@propesq.ufrgs.br, E-mail: juliana.marques@ufrgs.br, E-mail: sig_duda@yahoo.com.br, E-mail: vinimpeixoto@hotmail.com [Universidade Federal do Rio Grande do Sul (UFRGS), Porto Alegre, RS (Brazil). Laboratorio de Geologia Isotopica; Queiroz, Waldemir Jose Alves de, E-mail: waldemirqueiroz@hotmail.com [Companhia de Ferro Ligas da Bahia (FERBASA), Pojuca, BA (Brazil)

    2015-09-15

    The Jacurici Complex, located in the NE of the Sao Francisco Craton, is constituted by several Cr-mineralized mafic-ultramafic N-S bodies, possible fragments of a single sill disrupted during deformation. Some works suggest it is intruded on the Serrinha Block while others consider it in the Salvador-Curaca Belt. The basement on this region is informally divided into paragneisses and orthogneisses; the latter is supposed to be younger considering it is less deformed. Petrography revealed that some of the paragneisses are alkali-feldspar granite strongly milonitized. The orthogneisses occur at the north and consist, at least in part, of monzogranites with heterogeneous deformation, locally of low temperature. U-Pb zircon dating were performed for five representative samples. Just three provided good concordia ages. A mafic rock produced a 2102 ± 5 Ma age and it is petrographically similar to the metanorites described in the Jacurici Complex, being interpreted as the record of the first pulses of the mafic magmatism. A monzogranite yielded a 2995 ± 15 Ma age, older than expected, related to the Serrinha Block. The alkali-feldspar granite yielded a 2081 ± 3 Ma age. The Itiuba Syenite and the pegmatites that crosscut the Jacurici Complex have similar ages. Considering the lack of information about the supracrustal sequence that hosts the intrusive alkaline and mafic-ultramafic rocks at the Ipueira and the Medrado areas, it is possible that part of the terrain belongs to the Salvador-Curaca Belt. We suggest that the Jacurici Complex could be intruded after the tectonic amalgamation between the Serrinha Block and the older part of the Salvador-Curaca Belt and, therefore, could be hosted by both terrains. (author)

  19. Motion effects on intrusion development

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Holmes, E.A.; Becker, E.S.

    2010-01-01

    Analogue studies on intrusion development have found that visuospatial tasks performed during the encoding of aversive information reduce subsequent intrusion development. However, these studies cannot rule out a physical explanation in terms of simple movement. In the current study we addressed

  20. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  1. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  2. Contact Metamorphism in the Supracrustal Rocks of the ...

    African Journals Online (AJOL)

    granite intrusion in metabasites at Mawemeru area produced heat that baked the respective country rocks through epidote-amphibolite- to amphibolite-facies. Critical and informative mineral assemblages in the metairostones of Geita Hills are ...

  3. Determination of magnetic susceptibility of sedimentation rock in Java island

    International Nuclear Information System (INIS)

    Rahmawati; Rauf, Nurlela; Bijaksana, Satria

    2002-01-01

    Determination of magnetic susceptibility of sedimentation rock in java island. It has been done a research on detemlination of magnetic susceptibility of sedimentation and intrusion rock. A simple magnetic separation method was used to separate material with high contain magnetic mineral from the low contain magnetic mineral. Besides a data measurement from magnetic susceptibility and intensity there are also X-ray diffraction data available as suppolling data. The result shown that every material has magnetic mineral In it with different contain. And sedimentation rock has higher magnetic mineral than the intrusion rock

  4. Geochemistry of PGE in mafic rocks of east Khasi Hills, Shillong ...

    Indian Academy of Sciences (India)

    The mafic rocks of east Khasi Hills of the Meghalaya Plateau, northeastern India, occur as an intrusive body which cut across the weakly metamorphosed Shillong Group of rocks. Other than Shillong Group of rocks, high grade Archaean gneissic rocks and younger porphyritic granites are also observed in the study area.

  5. Estimation of crystallization pressure of granite intrusions

    Science.gov (United States)

    Yang, Xue-Ming

    2017-08-01

    A numerical method is presented to estimate the crystallization pressure of granite intrusions based on two polynomial equations obtained by an analysis of the existing haplogranite ternary phase diagram and associated dataset. The results indicate that the pressure is correlated respectively with normative quartz (Qtz) content and with normative albite (Ab) plus orthoclase (Or) contents of granitic rocks as follows. where P is pressure in MPa, and R denotes correlation coefficient. It is noted that the procedure of normalizing the sum of CIPW norm (quartz, albite, orthoclase) contents to 100% is required before using Eqs. (1) and (2). The difference in pressure calculations between these two equations is ≤ 16 MPa for the range of normative quartz contents from 15 to 40 wt%. An example of how to use these equations to estimate the crystallization pressure of a granite intrusion is also provided to show the validity and convenience of this method. The uncertainty of such pressure estimation is not well known, although it must fall into the uncertainty range of the existing experimental work on pressure constraints. The simplicity of this empirical method is appreciable, although its applicability to natural granitoids needs further test. More experimental work is required to constrain the effects of components, such as CaO, FeO, MgO, F, Cl, CO2, on the granite phase equilibria. These equations, however, can be used for estimating crystallization pressures of water-saturated and quartz-oversaturated granitic systems.

  6. Rock magnetic properties

    International Nuclear Information System (INIS)

    Hearst, R.B.; Morris, W.A.

    1991-01-01

    In 1978 the Nuclear Fuel Waste Management Program began the long task of site selection and evaluation for nuclear waste disposal. The Canadian Nuclear Fuel Waste Management Program, administered by Atomic Energy of Canada Limited, Research Company has provided the geophysicist with the unique opportunity to evaluate many modes of geophysical investigation in conjunction with detailed geologic mapping at a number of research areas. Of particular interest is research area RA-7, East Bull Lake, Algoma District, Ontario. Geophysical survey methods applied to the study of this included detailed gravity, ground magnetics, VLF, an airborne magnetic gradiometer survey and an airborne helicopter magnetic and EM survey. A comprehensive suite of rock property studies was also undertaken providing information on rock densities and magnetic rock properties. Preliminary modeling of the magnetic data sets assuming only induced magnetization illustrated the difficulty of arriving at a magnetic source geometry consistent with the mapped surficial and borehole geology. Integration of the magnetic rock properties observations and industry standard magnetic modelling techniques provides a source model geometry that is consistent with other geophysical/geological data sets, e.g. gravity and observed geology. The genesis of individual magnetic signatures in the East Bull Lake gabbro-anorthosite record the intrusion, metamorphism and fracture alteration of the pluton. As shown by this paper, only by understanding the rock magnetic signatures associated with each of these events is it possible to obtain geologically meaningful interpretative models

  7. Work zone intrusion alarm effectiveness.

    Science.gov (United States)

    2010-09-01

    16. Abstract : The New Jersey Department of Transportation (NJDOT) commissioned a study to evaluate how : effective a work zone safety device known as the SonoBlaster! Work Zone Intrusion Alarm would be : in protecting maintenance workers fro...

  8. Environment-Sensitive Intrusion Detection

    National Research Council Canada - National Science Library

    Giffin, Jonathan T; Dagon, David; Jha, Somesh; Lee, Wenke; Miller, Barton P

    2006-01-01

    .... We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy...

  9. An immunological approach to intrusion detection

    OpenAIRE

    Watkins, A.

    2000-01-01

    This paper presents an examination of intrusion detection schemes. It discusses\\ud traditional views of intrusion detection, and examines the more novel, but perhaps more\\ud effective, approach to intrusion detection as modeled on the human immune system. The\\ud discussion looks at some of the implications raised by intrusion detection research for\\ud information security in general.

  10. Uranium in alkaline rocks

    International Nuclear Information System (INIS)

    Murphy, M.; Wollenberg, H.; Strisower, B.; Bowman, H.; Flexser, S.; Carmichael, I.

    1978-04-01

    Geologic and geochemical criteria were developed for the occurrence of economic uranium deposits in alkaline igneous rocks. A literature search, a limited chemical analytical program, and visits to three prominent alkaline-rock localities (Ilimaussaq, Greenland; Pocos de Caldas, Brazil; and Powderhorn, Colorado) were made to establish criteria to determine if a site had some uranium resource potential. From the literature, four alkaline-intrusive occurrences of differing character were identified as type-localities for uranium mineralization, and the important aspects of these localities were described. These characteristics were used to categorize and evaluate U.S. occurrences. The literature search disclosed 69 U.S. sites, encompassing nepheline syenite, alkaline granite, and carbonatite. It was possible to compare two-thirds of these sites to the type localities. A ranking system identified ten of the sites as most likely to have uranium resource potential

  11. Uranium in alkaline rocks

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, M.; Wollenberg, H.; Strisower, B.; Bowman, H.; Flexser, S.; Carmichael, I.

    1978-04-01

    Geologic and geochemical criteria were developed for the occurrence of economic uranium deposits in alkaline igneous rocks. A literature search, a limited chemical analytical program, and visits to three prominent alkaline-rock localities (Ilimaussaq, Greenland; Pocos de Caldas, Brazil; and Powderhorn, Colorado) were made to establish criteria to determine if a site had some uranium resource potential. From the literature, four alkaline-intrusive occurrences of differing character were identified as type-localities for uranium mineralization, and the important aspects of these localities were described. These characteristics were used to categorize and evaluate U.S. occurrences. The literature search disclosed 69 U.S. sites, encompassing nepheline syenite, alkaline granite, and carbonatite. It was possible to compare two-thirds of these sites to the type localities. A ranking system identified ten of the sites as most likely to have uranium resource potential.

  12. Rock fragmentation

    Energy Technology Data Exchange (ETDEWEB)

    Brown, W.S.; Green, S.J.; Hakala, W.W.; Hustrulid, W.A.; Maurer, W.C. (eds.)

    1976-01-01

    Experts in rock mechanics, mining, excavation, drilling, tunneling and use of underground space met to discuss the relative merits of a wide variety of rock fragmentation schemes. Information is presented on novel rock fracturing techniques; tunneling using electron beams, thermocorer, electric spark drills, water jets, and diamond drills; and rock fracturing research needs for mining and underground construction. (LCL)

  13. A deposit model for carbonatite and peralkaline intrusion-related rare earth element deposits: Chapter J in Mineral deposit models for resource assessment

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.; Seal, Robert R.; McCafferty, Anne E.

    2014-01-01

    Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. A wide variety of other commodities have been exploited from carbonatites and alkaline igneous rocks including niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other elements enriched in these deposits include manganese, strontium, tantalum, thorium, vanadium, and uranium. Carbonatite and peralkaline intrusion-related rare earth element deposits are presented together in this report because of the spatial, and potentially genetic, association between carbonatite and alkaline rocks. Although these rock types occur together at many locations, carbonatite and peralkaline intrusion-related rare earth element deposits are not generally found together.

  14. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  15. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  16. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  17. Science Rocks!

    Science.gov (United States)

    Prestwich, Dorothy; Sumrall, Joseph; Chessin, Debby A.

    2010-01-01

    It all began one Monday morning. Raymond could not wait to come to large group. In his hand, he held a chunk of white granite he had found. "Look at my beautiful rock!" he cried. The rock was passed around and examined by each student. "I wonder how rocks are made?" wondered one student. "Where do they come from?"…

  18. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    present technique. The present technique may be useful for monitoring refractive indices of active chemical solutions which was not possible with intrusive-type FO sensors. 2. Sensor principle. For a circular beam of light with cross-sectional area A, incident at an angle θi on the surface of a second medium, the power ...

  19. Non-Intrusive Appliance Recognition

    NARCIS (Netherlands)

    Hoogsteen, G; Hoogsteen, Gerwin; Krist, J.O.; Bakker, Vincent; Smit, Gerardus Johannes Maria

    2012-01-01

    Energy conservation becomes more important nowadays. The use of smart meters and, in the near future, smart appliances, are the key to achieve reduction in energy consumption. This research proposes a non-intrusive appliance monitor and recognition system for implementation on an embedded system.

  20. Occurrence of seawater intrusion overshoot

    NARCIS (Netherlands)

    Morgan, L.K.; Bakker, M.; Werner, A.D.

    2015-01-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position.

  1. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor is demonstrated in this communication. The working principle of the sensor is based on intensity modulation of the back-reflected light when output light from an optical fibre end focusses onto air–medium interface. The change in the refractive index ...

  2. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  3. Computer Network Equipment for Intrusion Detection Research

    National Research Council Canada - National Science Library

    Ye, Nong

    2000-01-01

    .... To test the process model, the system-level intrusion detection techniques and the working prototype of the intrusion detection system, a set of computer and network equipment has been purchased...

  4. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  5. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  6. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  7. Lead isotopes in archaean plutonic rocks

    International Nuclear Information System (INIS)

    Oversby, V.M.

    1978-01-01

    Archaean intrusive rocks have initial Pb isotopic compositions which show a varied and complex history for the source regions of the rocks. Even the oldest rocks from Greenland indicate heterogenous U and Pb distribution prior to 3800 m.y. ago. Source regions with μ values less than 7 must have played a significant role in the early history of the earth. By late Archaean time U/Pb ratios of source regions had increased substantially. Data from Australia and North America show distinct regional differences, both within and between continents. (Auth.)

  8. Recent advances in vapor intrusion site investigations.

    Science.gov (United States)

    McHugh, Thomas; Loll, Per; Eklund, Bart

    2017-12-15

    Our understanding of vapor intrusion has evolved rapidly since the discovery of the first high profile vapor intrusion sites in the late 1990s and early 2000s. Research efforts and field investigations have improved our understanding of vapor intrusion processes including the role of preferential pathways and natural barriers to vapor intrusion. This review paper addresses recent developments in the regulatory framework and conceptual model for vapor intrusion. In addition, a number of innovative investigation methods are discussed. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  9. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  10. Petrology, Magnetic susceptibility, Tectonic setting and mineralization associated with Plutonic and Volcanic Rocks, Eastern Bajestan and Taherabad, Iran

    Directory of Open Access Journals (Sweden)

    Malihe Ghoorchi

    2009-09-01

    Full Text Available Study area is located in district of Bajestan and Ferdows cities, NE of Iran. Structurally, this area is part of Lut block. The oldest exposed rocks, to the north of intrusive rocks and in Eastern Bajestan, are meta-chert, slate, quartzite, thin-bedded crystalline limestone and meta-argillite. The sedimentary units are: Sardar Formation (Carboniferous, Jamal Formation (Permian, Sorkh Shale and Shotori Formations (Triassic, carbonateous rocks (Cretaceous and lithostratigraphically equivalent to Kerman conglomerate (Cretaceous-Paleocene are exposed in this area. Based on relative age, magmatism in eastern Bajestan and Taherabad started after Late Cretaceous and it has been active and repeated during Tertiary time. At least, three episodes of volcanic activities are recognized in this area. The first stage was mainly volcanic flow with mafic composition and minor intermediate. The second episode was mainly intermediate in composition. The third stage was changed to acid-intermediate in composition. Since the plutonic rocks intruded the volcanic rocks, therefore they may be Oligo-Miocene age. Bajestan intrusive rocks are granite-granodiorite-quartz monzonite. Taherabad intrusive rocks are diorite-quartz diorite- monzonite-latite. Bajestan intrusive rocks are reduced type (ilmenite series and Taherabad intrusive rocks are oxidized type (magnetite series.Based on geochemical analysis including trace elements, REE and isotopic data, Bajestan intrusive rocks formed in continental collision zone and the magma has crustal origin. Taherabad intrusive rocks were formed in subduction zone and magma originated from oceanic crust. Taherabad intrusive rock has exploration potential for Cu-Au and pb.

  11. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  12. Recreating Rocks

    DEFF Research Database (Denmark)

    Posth, Nicole R

    2008-01-01

    Nicole Posth and colleagues spent a month touring South African rock formations in their quest to understand the origin of ancient iron and silicate layers.......Nicole Posth and colleagues spent a month touring South African rock formations in their quest to understand the origin of ancient iron and silicate layers....

  13. Igneous rocks formed by hypervelocity impact

    Science.gov (United States)

    Osinski, Gordon R.; Grieve, Richard A. F.; Bleacher, Jacob E.; Neish, Catherine D.; Pilles, Eric A.; Tornabene, Livio L.

    2018-03-01

    Igneous rocks are the primary building blocks of planetary crusts. Most igneous rocks originate via decompression melting and/or wet melting of protolith lithologies within planetary interiors and their classification and compositional, petrographic, and textural characteristics, are well-studied. As our exploration of the Solar System continues, so too does the inventory of intrusive and extrusive igneous rocks, settings, and processes. The results of planetary exploration have also clearly demonstrated that impact cratering is a ubiquitous geological process that has affected, and will continue to affect, all planetary objects with a solid surface, whether that be rock or ice. It is now recognized that the production of igneous rocks is a fundamental outcome of hypervelocity impact. The goal of this review is to provide an up-to-date synthesis of our knowledge and understanding of igneous rocks formed by hypervelocity impact. Following a brief overview of the basics of the impact process, we describe how and why melts are generated during impact events and how impact melting differs from endogenic igneous processes. While the process may differ, we show that the products of hypervelocity impact can share close similarities with volcanic and shallow intrusive igneous rocks of endogenic origin. Such impact melt rocks, as they are termed, can display lobate margins and cooling cracks, columnar joints and at the hand specimen and microscopic scale, such rocks can display mineral textures that are typical of volcanic rocks, such as quench crystallites, ophitic, porphyritic, as well as features such as vesicles, flow textures, and so on. Historically, these similarities led to the misidentification of some igneous rocks now known to be impact melt rocks as being of endogenic origin. This raises the question as to how to distinguish between an impact versus an endogenic origin for igneous-like rocks on other planetary bodies where fieldwork and sample analysis may not

  14. Art Rocks with Rock Art!

    Science.gov (United States)

    Bickett, Marianne

    2011-01-01

    This article discusses rock art which was the very first "art." Rock art, such as the images created on the stone surfaces of the caves of Lascaux and Altimira, is the true origin of the canvas, paintbrush, and painting media. For there, within caverns deep in the earth, the first artists mixed animal fat, urine, and saliva with powdered minerals…

  15. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  16. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  17. Rock Physics

    DEFF Research Database (Denmark)

    Fabricius, Ida Lykke

    2017-01-01

    Rock physics is the discipline linking petrophysical properties as derived from borehole data to surface based geophysical exploration data. It can involve interpretation of both elastic wave propagation and electrical conductivity, but in this chapter focus is on elasticity. Rock physics is based...... on continuum mechanics, and the theory of elasticity developed for statics becomes the key to petrophysical interpretation of velocity of elastic waves. In practice, rock physics involves interpretation of well logs including vertical seismic profiling (VSP) and analysis of core samples. The results...

  18. Sulfide intrusion and detoxification in Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2014-01-01

    Sulfide intrusion in seagrasses represents a global threat to seagrasses. In contrast seegrasses grow in hostile sediments, where they are constantly exposed to sulfide intrusion. Little is known about the strategies to survive sulfide intrusion, if there are detoxification mechanisms and sulfur...... indicating a possible role of sulfide in the sulfur nutrition beside the detoxification function. Our results suggest different adaptations of Z. marina to reduced sediments and sulfide intrusion ranging from bacterial and chemical reoxidation of sulfide to sulfate to incorporation of sulfide into organic...

  19. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  20. Rock Foundations

    National Research Council Canada - National Science Library

    1994-01-01

    .... Chapter 4 provides guidance on rock mass characterization and classification schemes. Chapters 5 and 6 provide guidance on related topic areas of foundation deformation and settlement and foundation bearing capacity, respectively...

  1. Geochemistry and petrogenesis of the Feshark intrusion (NE Isfahan city

    Directory of Open Access Journals (Sweden)

    Ali Kananian

    2017-11-01

    Full Text Available Introduction Granitic rocks are the most abundant rock types in various tectonic settings and they have originated from mantle-derived magmas and/or partial melting of crustal rocks. The Oligo-Miocene Feshark intrusion is situated in the northeast of the city of Isfahan, and a small part of Urumieh–Dokhtar Magmatic Arc is between 52º21' E to 52º26'E and 32º50' N to - 32º53' N. The pluton has intruded into lower Eocene volcanic rocks such as rhyolite, andesite, and dacite and limestone. Analytical methods Fifteen representative samples from the Feshark intrusion were selected on the basis of their freshness. The major elements and some trace elements were analyzed by X-ray fluorescence (XRF at Naruto University in Japan and the trace-element compositions were determined at the ALS Chemex lab. Results The Feshark intrusion can be divided into two phases, namely granodiorite with slightly granite and tonalite composition and quartz diorite with various quartz diorite and quartz monzodiorite abundant enclaves according to Middlemost (1994 classification. The quartz diorite show dark grey and are abundant at the western part of the intrusive rocks. Granodiorite are typically of white-light grey in color and change gradually into granite and tonalite. The granodiorite and granite rocks consist of quartz, K-feldspar, plagioclase, biotite, and amphibole, whereas in the quartz diorites the mineral assemblages between different minerals are very similar to those observed in the granodiorite. However, amphibole and plagioclase are more abundant and quartz and K-feldspar modal contents are lower than in the granodiorite whereas pyroxene occurs as rare grains. They are characterized as metaluminous to mildly peraluminous based on alumina saturation index (e.g. Shand, 1943 and are mostly medium-K calc-alkaline in nature (Rickwood, 1989. Discussion In the Yb vs. La/Yb and Tb/Yb variation diagrams (He et al., 2009, the studied samples show small

  2. Rocks age and metamorphic occurrence from the southeastern part of Sao Paulo State and their crustal evaluation

    International Nuclear Information System (INIS)

    Tassinari, C.C.G.

    1988-01-01

    Pb-Pb and Rb-Sr whole rock isotope systematics and U-Pb on zircons method analyses are reported for rocks from the southeastern part of Sao Paulo state Brazil. The isotopic studies on granitic intrusions, orthogneissic rocks and migmatitic terranes, in this area, provides an important indication of the age and nature of the continental crust. (author) [pt

  3. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  4. Prediction of sea water intrusion for mining activity in close precincts of sea shore.

    Science.gov (United States)

    Singh, Awanindra Pratap; Gupta, Prem Kumar; Khandelwal, Manoj

    2013-01-01

    The mining lease area of Surka [District Bhavnagar, Gujarat (India)] is located within 6-12 km horizontal distance of sea shore of Gulf of Cambay. Whenever, there will be onset of lignite extraction, there will be always a threat of sea water intrusion into the mining lease area due to its close proximity to seashore. This article describes the prediction of sea water intrusion into the lease area of whole mining block using Ghyben-Herzberg relation between fresh and saline water, Remote Sensing, Ground Truth verification, Electrical Resistivity Survey and groundwater table monitored during the year 2004. As per the Ghyben-Herzberg relation, results show that there will not be sea water intrusion. If there is excess pumping of water then also the basement rock below the lignite seam will put hindrance to any possible upconing of saline water interface.

  5. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...

  6. Petrological studies of plutonic rocks of Ecuador

    International Nuclear Information System (INIS)

    Aly, S.

    1980-01-01

    The feldspars of many tonalitic plutonic rocks in the coastal regions and West Andean regions are zoned. This leads to the conclusion that they are relatively flat intrusions and to some extent transition rocks in the subvulcanite direction. This is in accordance with the genetic and chronological relationship between plutonites and the surrounding vulcanites of the Basic Igreous Complex (BIC). The composition of representative minerals, e.g. alkali feldspar, plagioclase feldspar, biotite, chlorite, and amphibole has been determined as well as the age of plutonite samples by the K/Ar dating method. (DG) [de

  7. Traumatic intrusions as 'worse case scenario's'.

    Science.gov (United States)

    Merckelbach, H; Muris, P; Horselenberg, R; Rassin, E

    1998-11-01

    While some clinicians assume that traumatic intrusions are historically accurate revisualizations of traumatic incidents, others have suggested that these types of intrusions may represent a worse case scenario (i.e. exaggerated) version of the trauma. To explore this issue, a survey was conducted among undergraduate students (N = 189). Of the 69 respondents who had been the victim of or witness to a relatively recent trauma, 15 (22%) reported an exaggerated perception of the traumatic incident. Exaggerated intrusions were found to have more flashback qualities and tended to have a higher frequency than 'realistic' intrusions. These findings are well in line with the idea that intrusions are not necessarily veridical copies of traumatic events.

  8. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  9. A New Method for Intrusion Detection using Manifold Learning Algorithm

    OpenAIRE

    Guoping Hou; Xuan Ma; Yuelei Zhang

    2013-01-01

    Computer and network security has received and will still receive much attention. Any unexpected intrusion will damage the network. It is therefore imperative to detect the network intrusion to ensure the normal operation of the internet. There are many studies in the intrusion detection and intrusion patter recognition. The artificial neural network (ANN) has proven to be powerful for the intrusion detection. However, very little work has discussed the optimization of the input intrusion fea...

  10. Source rock

    Directory of Open Access Journals (Sweden)

    Abubakr F. Makky

    2014-03-01

    Full Text Available West Beni Suef Concession is located at the western part of Beni Suef Basin which is a relatively under-explored basin and lies about 150 km south of Cairo. The major goal of this study is to evaluate the source rock by using different techniques as Rock-Eval pyrolysis, Vitrinite reflectance (%Ro, and well log data of some Cretaceous sequences including Abu Roash (E, F and G members, Kharita and Betty formations. The BasinMod 1D program is used in this study to construct the burial history and calculate the levels of thermal maturity of the Fayoum-1X well based on calibration of measured %Ro and Tmax against calculated %Ro model. The calculated Total Organic Carbon (TOC content from well log data compared with the measured TOC from the Rock-Eval pyrolysis in Fayoum-1X well is shown to match against the shale source rock but gives high values against the limestone source rock. For that, a new model is derived from well log data to calculate accurately the TOC content against the limestone source rock in the study area. The organic matter existing in Abu Roash (F member is fair to excellent and capable of generating a significant amount of hydrocarbons (oil prone produced from (mixed type I/II kerogen. The generation potential of kerogen in Abu Roash (E and G members and Betty formations is ranging from poor to fair, and generating hydrocarbons of oil and gas prone (mixed type II/III kerogen. Eventually, kerogen (type III of Kharita Formation has poor to very good generation potential and mainly produces gas. Thermal maturation of the measured %Ro, calculated %Ro model, Tmax and Production index (PI indicates that Abu Roash (F member exciting in the onset of oil generation, whereas Abu Roash (E and G members, Kharita and Betty formations entered the peak of oil generation.

  11. Rocking pneumonia.

    Science.gov (United States)

    Rijkers, Ger T; Rodriguez Gomez, Maria

    2017-01-01

    Ever since Chuck Berry coined the term "rocking pneumonia" in his 1956 song "Roll over Beethoven", pneumonia has been mentioned frequently in modern blues and rock songs. We analyzed the lyrics of these songs to examine how various elements of pneumonia have been represented in popular music, specifically the cause of pneumonia, the risk groups, comorbidity (such as the boogie woogie flu), the clinical symptoms, and treatment and outcome. Up to this day, songwriters suggest that pneumonia is caused mainly by the cold and rain and that treatment is hardly possible, aside from a shot of rhythm and blues.

  12. Carbonate reservoirs modified by magmatic intrusions in the Bachu area, Tarim Basin, NW China

    Directory of Open Access Journals (Sweden)

    Kang Xu

    2015-09-01

    Full Text Available Oil and gas exploration in carbonate rocks was extremely successful in recent years in the Ordovician in Tarim Basin, NW China. Here, we investigate the carbonate reservoirs in the Bachu area of the Tarim Basin through petrological and geochemical studies combined with oil and gas exploration data. Geochemical analysis included the major, trace, and rare earth elements; fluid inclusion thermometry; clay mineral characterization; and carbon and oxygen isotopes of the carbonate rocks. Homogenization temperatures of the fluid inclusions of Well He-3 in the Bachu area indicate three groups, 60–80 °C, 90–130 °C, and 140–170 °C, and suggest that the carbonate rocks experienced modification due to heating events. The porosity in the reservoir is defined by fractures and secondary pores, and there is a notable increase in the porosity of the carbonate reservoirs in proximity to magmatic intrusion, particularly approximately 8–10 m from the intrusive rocks. The development of secondary pores was controlled by lithofacies and corrosion by various fluids. We identify supercritical fluids with high density (138.12–143.97 mg/cm3 in the Bachu area. The negative correlations of δ13C (−2.76‰ to −0.97‰ and δ18O (−7.91‰ to −5.07‰ suggest that the carbonate rocks in the study area were modified by high-salinity hydrothermal fluid. The formation of clay minerals, such as illite and montmorillonite, caused a decrease in porosity. Our study demonstrates the effect of magmatic intrusions in modifying the reservoir characteristics of carbonate rocks and has important implications for oil and gas exploration.

  13. X-Ray And Electron Microprobe Analysis Of Some Plagioclases From The Jabal Abu Safiyah Intrusion

    OpenAIRE

    Al Mohandis, Ahmed A. [احمد عبد القادر المهندس

    1992-01-01

    The Jabal Abu Safiyah is a layered intrusion, which was emplaced within volcanosedimentary rocks. It extends in an arc for about 15 km and displays clear layering. The lower zone plagioclases were studied by electron microprobe and X-ray diffraction techniques to investigate their chemistry and structural state. Cumulus plagioclase forms the dominant phase in all thin sections studied, except in the amphibolized clinopyroxenite. Cumulus plagioclases from the lower zone of the Jabal Abu Saf...

  14. Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.

    1986-02-01

    This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user

  15. Intellektuaalne rock

    Index Scriptorium Estoniae

    2007-01-01

    Briti laulja-helilooja ja näitleja Toyah Willcox ning Bill Rieflin ansamblist R.E.M. ja Pat Mastelotto King Krimsonist esinevad koos ansamblitega The Humans ja Tuner 25. okt. Tallinnas Rock Cafés ja 27. okt Tartu Jaani kirikus

  16. contact metamorphism in the supracrustal rocks of the sukumaland ...

    African Journals Online (AJOL)

    Mgina

    intrusion in metabasites at Mawemeru area produced heat that baked the respective country rocks through ... felsic pyroclastic and lava flows and .... grains in the matrix have the chemical composition of ferrotschermakite similar to rims of the coarse laths. M4 site in these amphiboles has intermediate values of Na ranging ...

  17. Geochemistry of crystalline basement rocks SW Ugep, Nigeria ...

    African Journals Online (AJOL)

    Geochemical data on low-grade metasedimentary phyllites and schists of SW Ugep show that they were derived from predominantly pelitic parent rocks. They form a supracrustal cover on an orthogneiss of granitic composition. The metasediments are enriched in Si02, Al203 and Zr but improverished in Ni. Intrusion of ...

  18. Igneous Rocks

    Science.gov (United States)

    Doe, Bruce R.

    “Igneous Rocks was written for undergraduate geology majors who have had a year of college-level chemistry and a course in mineralogy … and for beginning graduate students. Geologists working in industry, government, or academia should find this text useful as a guide to the technical literature up to 1981 and as an overview of topics with which they have not worked but which may have unanticipated pertinence to their own projects.” So starts the preface to this textbook.As one who works part time in research on igneous rocks, especially as they relate to mineral deposits, I have been looking for such a book with this avowed purpose in a field that has a choking richness of evolving terminology and a bewildering volume of interdisciplinary literature. In addition to the standard topics of igneous petrology, the book contains a chapter on the role of igneous activity in the genesis of mineral deposits, its value to geothermal energy, and the potential of igneous rocks as an environment for nuclear waste disposal. These topics are presented rather apologetically in the preface, but the author is to be applauded for including this chapter. The apology shows just how new these interests are to petrology. Recognition is finally coming that, for example, mineral deposits are not “sports of nature,” a view held even by many economic geologists as recently as the early 1960's; instead they are perfectly ordinary geochemical features formed by perfectly ordinary geologic processes. In fact, the mineral deposits and their attendant alteration zones probably have as much to tell us about igneous rocks as the igneous rocks have to tell us about mineral deposits.

  19. Saltwater intrusion as potential driver of phosphorus release from limestone bedrock in a coastal aquifer

    Science.gov (United States)

    Flower, Hilary; Rains, Mark; Lewis, David; Zhang, Jia-Zhong; Price, René

    2017-01-01

    An important but often overlooked consequence of saltwater intrusion is the potential increase of groundwater soluble reactive phosphorus concentrations. The phosphorus sorption dynamics of two limestone rocks of different composition were investigated by simulating seawater intrusion over a wide range of mixing ratios between freshwater and saltwater. Both rocks exhibited a logarithmic loss of sorption efficiency in mixtures containing more than approximately 3 mM Cl- concentration (100 mg Cl-/L; about saltwater). We infer that aquifer solids immersed in freshwater would undergo phosphorus desorption in response to the introduction of this minor amount of seawater. This Cl- concentration is within the range designated as fresh water. Thus we conclude that increased soluble reactive phosphorus availability from saltwater-induced desorption may occur at the ion exchange front, which is actually landward of the saltwater intrusion front as it is commonly defined. Sorption efficiency in our experiments continued to decline as salinity increased, until Cl- concentration reached a second threshold of 50 or 200 mM (1700 or 7700 mg Cl-/L), depending on the rock composition, particularly iron content. Further increase in salinity would produce little increase in groundwater soluble reactive phosphorus concentration. Our results have implications for soluble reactive phosphorus availability in estuaries that receive mixing zone groundwater discharge.

  20. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  1. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    is known about the strategies of seagrasses to survive sulfide intrusion, their potential detoxification mechanisms and sulfur nutrition in general. By a global review of sulfide intrusion, coupled with a series of field studies and in situ experiments we elucidate sulfide intrusion and different...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  2. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  3. Tertiary volcanic rocks of the Mineral Mountain and Teapot Mountain quadrangles, Pinal County, Arizona

    Science.gov (United States)

    Keith, William J.; Theodore, Ted G.

    1979-01-01

    The widespread distribution of Tertiary volcanic rocks in south-central Arizona is controlled in part by prevolcanic structures along which volcanic vents were localized. Volcanic rocks in the Mineral Mountain and Teapot Mountain quadrangles mark the site of a major northwest-trending structural hingeline. This hingeline divides an older Precambrian X terrane on the west from intensely deformed sequences of rock as young as Pennsylvanian on the east, suggesting increased westerly uplift. The volcanic rocks consist of a pile of complexly interlayered rhyolite, andesite, dacite, flows and intrusive rocks, water-laid tuffs, and very minor olivine basalt. Although the rocks erupted from several different vents, time relations, space relations, and chemistry each give strong evidence of a single source for all the rocks. Available data (by the K-Ar dating method) on hornblende and biotite separates from the volcanic rocks range from 14 to 19 m.y. and establish the pre-middle Miocene age of major dislocations along the structural hingeline. Most of the volcanic rocks contain glass, either at the base of the flows or as an envelope around the intrusive phases. One of the intrusive rhyolites, however, seems to represent one of the final eruptions. Intense vesiculation of the intrusive rhyolite suggests a large content of volatiles at the time of its eruption. Mineralization is associated with the more silicic of these middle Miocene volcanic rocks; specifically, extensive fissure quartz veins contain locally significant amounts of silver, lead, and zinc and minor amounts of gold. Many of the most productive deposits are hosted by the volcanic rocks, although others occur in the Precambrian rocks. Magnetic data correspond roughly to the geology in outlining the overall extent of the volcanic rocks as a magnetic low.

  4. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  5. Intrusion Detection Architecture Utilizing Graphics Processors

    Directory of Open Access Journals (Sweden)

    Branislav Madoš

    2012-12-01

    Full Text Available With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS. Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

  6. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  7. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  8. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  9. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  10. White Rock

    Science.gov (United States)

    2005-01-01

    14 November 2005 This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image shows a portion of the famous 'White Rock' feature in Pollack Crater in the Sinus Sabaeus region of Mars. The light-toned rock is not really white, but its light tone caught the eye of Mars geologists as far back as 1972, when it was first spotted in images acquired by Mariner 9. The light-toned materials are probably the remains of a suite of layered sediments that once spread completely across the interior of Pollack Crater. Dark materials in this image include sand dunes and large ripples. Location near: 8.1oS, 335.1oW Image width: width: 3 km (1.9 mi) Illumination from: lower left Season: Southern Summer

  11. The neural representation of intrusive thoughts

    Science.gov (United States)

    Schmiedek, Florian; Brose, Annette; Schott, Björn H.; Lindenberger, Ulman; Lövden, Martin

    2013-01-01

    Based on the philosophical notion that language embodies thought we investigated whether a habitual tendency for intrusive thought that younger and older participants report over a period of 100 sessions, spread out over about 6 months, is associated with brain regions related to language production. In favour of this hypothesis, we found that individual differences in habitual intrusive thoughts are correlated with activity in the left inferior frontal gyrus (IFG, Broca’s area) as well as the cingulate cortex (CC) during a two-choice reaction-time task in fMRI. Participants who habitually tended to experience intrusive thoughts showed greater activity during task-free (baseline) compared to task periods in brain regions involved in language production. Task performance was unrelated to individual differences in intrusive thoughts. We conclude that intrusive thoughts may be represented in a language-like format and that individuals reporting a habitually higher tendency for intrusive thoughts may have stronger and more habitual inner speech processes. PMID:22563007

  12. Radwaste storage in crystalline rocks: a natural analog

    International Nuclear Information System (INIS)

    Brookins, D.G.; Abashian, M.S.; Cohen, L.H.; Wollenberg, H.A.

    1982-01-01

    The Eldora-Bryan Stock (Colorado) intruded the 1.4-1.6 billion year old metamorphic rocks of the Idaho Springs Formation 55 million years ago. The stock may be considered a giant analog of a radwaste form without canister or engineered backfill barriers. The authors' lanthanide studies show the following: (1) The intrusive rocks remained as a closed system. (2) Lanthanide/chondrite versus ionic radius plots show only local redistribution in the immediate contact zone, and that rocks in this zone have not gained lanthanides from the magma. (3) No whole rock perturbations for the lanthanides are noted at distances greater than 3 m from the contact. Stable oxygen isotopic variations show a narrow 9.0 +- 0.3 per mille range for the intrusive rocks and whole rock values from 7.6 to 10.0 per mille for the intruded rocks. The authors conclude: (1) The Idaho Springs Formation was not penetrated by hydrothermal fluids from the Eldora-Bryan magma except possibly on a local scale within 3 m of the contact. (2) The light lanthanides may be locally redistributed in the immediate contact zone, but without additions from the magma. (3) The oxygen isotopic data imply lack of hydrothermal fluids from the magma penetrating the intruded rocks, even in the highest temperature contact zones. Whole rock data imply closed system conditions for Rb, Sr, Th, U, Pb even where mineral ages have been lowered. Data for Co, Cr, Sc, Fe, Cs also indicate retention in whole rock systems and no exchange with the magma. The combined chemical, isotopic, petrographic and theoretical data and calculations indicate suitability of rocks of the Idaho Springs Formation, and thus of many types of crystalline rocks as well, for possible use for the storage of radioactive waste

  13. THERMAL, MECHANICAL AND CHEMICAL ALTERATIONS PROMOTED ON SEDIMENTARY ROCKS HOSTING DYKE BODIES

    OpenAIRE

    Silva, Pedro; Henry, Bernard; Marques, Fernando; Madureira, Pedro; Mateus, António; Miranda, Miguel

    2006-01-01

    This work is focused on flow and propagation of magma along thick Jurassic dykes and the effects of such intrusive processes on the magnetic properties of host sedimentary rocks, which are still poorly understood. Therefore, an exhaustive study of rock magnetic and petrography analyses were performed on dolerite rocks collected along several sections across the Foum Zguid (FZD - Southern Morocco) and Messejana-Plasencia (MPD - Iberia) dykes, complemented with several sections across the sedim...

  14. New isotope data from the Koperberg Suite and some associated rocks, Okiep district, Namaqualand, South Africa

    International Nuclear Information System (INIS)

    Clifford, T.N.; Barton, E.S.; Retief, E.A.; Rex, D.C.

    1990-01-01

    The Koperberg Suite is an anorthosite-charnockite kindred and 1500 bodies of these rocks have been recognised in the Okiep district and 30 of them have been mined for copper since 1852. The suite is intrusive into country rocks. New isotope data presented includes U-Pb zircon and whole-rock Pb-Pb, Rb-Sr, Sm-Nd and Ar-Ar analyses. 10 refs

  15. Thermal Inertia of Rocks and Rock Populations

    Science.gov (United States)

    Golombek, M. P.; Jakosky, B. M.; Mellon, M. T.

    2001-01-01

    The effective thermal inertia of rock populations on Mars and Earth is derived from a model of effective inertia versus rock diameter. Results allow a parameterization of the effective rock inertia versus rock abundance and bulk and fine component inertia. Additional information is contained in the original extended abstract.

  16. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  17. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  18. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  19. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  20. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  1. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  2. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  3. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2001-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  4. A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Ye, Nong

    2002-01-01

    ...) investigate system-level intrusion detection techniques for the fusion and correlation of local information about intrusions, based on the integration infrastructure for intrusion detection; and (3...

  5. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    Science.gov (United States)

    Wotzlaw, Jörn-Frederik; Bindeman, Ilya N.; Schaltegger, Urs; Brooks, C. Kent; Naslund, H. Richard

    2012-11-01

    This paper presents a new high-precision zircon U-Pb geochronological view on the crystallization and assembly process of one of the most important and intensely studied intrusive bodies on Earth—the Skaergaard intrusion in East Greenland. With analytical uncertainties of a few tens of thousands of years, we were able to resolve several important events during cooling of this intrusion. Initial cooling of the shallowly intruded ˜300 km3 of tholeiitic basaltic magma from liquidus to zircon saturation at ˜1000 °C is recorded by a precise zircon crystallization age of 55.960±0.018 Ma of an intercumulus gabbroic pegmatite in the lower portion of the intrusion. Based on this zircon crystallization age and a published cooling model we estimate the "true" age of emplacement to be ˜56.02 Ma. The last portions of Skaergaard appear to crystallize completely ˜100 ka after emplacement as recorded by abundant ˜55.91-55.93 Ma zircons in the Sandwich Horizon (SH), where lower and upper solidification fronts met. Intrusion of an isotopically distinct new magma batch, the ˜600 m thick Basistoppen Sill, into the solidified upper portion of Skaergaard, happened at 55.895±0.018 Ma, suggesting close timing between crystallization of evolved rocks around the SH and intrusion of the Basistoppen Sill. The novel result of this work is the demonstration that zircons in the SH, >100 m below the Basistoppen contact, have a bimodal age distribution, with the youngest population of 55.838±0.019 Ma postdating intrusion of the Basistoppen Sill by 57±37 ka. Oxygen isotope analyses reveal that SH zircons are low and heterogeneous with respect to δ18O. These results support the proposed conclusion that the SH crystallized twice: it was fully crystalline, then hydrothermally-altered by low-δ18O surface waters and subsequently partially remelted, triggered by heat of the Basistoppen Sill. The low-degree partial melt generated during remelting partially migrated upward by intergranular

  6. Continental crust formation on early Earth controlled by intrusive magmatism.

    Science.gov (United States)

    Rozel, A B; Golabek, G J; Jain, C; Tackley, P J; Gerya, T

    2017-05-18

    The global geodynamic regime of early Earth, which operated before the onset of plate tectonics, remains contentious. As geological and geochemical data suggest hotter Archean mantle temperature and more intense juvenile magmatism than in the present-day Earth, two crust-mantle interaction modes differing in melt eruption efficiency have been proposed: the Io-like heat-pipe tectonics regime dominated by volcanism and the "Plutonic squishy lid" tectonics regime governed by intrusive magmatism, which is thought to apply to the dynamics of Venus. Both tectonics regimes are capable of producing primordial tonalite-trondhjemite-granodiorite (TTG) continental crust but lithospheric geotherms and crust production rates as well as proportions of various TTG compositions differ greatly, which implies that the heat-pipe and Plutonic squishy lid hypotheses can be tested using natural data. Here we investigate the creation of primordial TTG-like continental crust using self-consistent numerical models of global thermochemical convection associated with magmatic processes. We show that the volcanism-dominated heat-pipe tectonics model results in cold crustal geotherms and is not able to produce Earth-like primordial continental crust. In contrast, the Plutonic squishy lid tectonics regime dominated by intrusive magmatism results in hotter crustal geotherms and is capable of reproducing the observed proportions of various TTG rocks. Using a systematic parameter study, we show that the typical modern eruption efficiency of less than 40 per cent leads to the production of the expected amounts of the three main primordial crustal compositions previously reported from field data (low-, medium- and high-pressure TTG). Our study thus suggests that the pre-plate-tectonics Archean Earth operated globally in the Plutonic squishy lid regime rather than in an Io-like heat-pipe regime.

  7. Web Defacement and Intrusion Monitoring Tool: WDIMT

    CSIR Research Space (South Africa)

    Masango, Mfundo G

    2017-09-01

    Full Text Available at altering the content of the web pages or to make the website inactive. This paper proposes a Web Defacement and Intrusion Monitoring Tool, that could be a possible solution to the rapid identification of altered or deleted web pages. The proposed tool...

  8. Chemical Observations of a Polar Vortex Intrusion

    Science.gov (United States)

    Schoeberl, M. R.; Kawa, S. R.; Douglass, A. R.; McGee, T. J.; Browell, E.; Waters, J.; Livesey, N.; Read, W.; Froidevaux, L.

    2006-01-01

    An intrusion of vortex edge air in D the interior of the Arctic polar vortex was observed on the January 31,2005 flight of the NASA DC-8 aircraft. This intrusion was identified as anomalously high values of ozone by the AROTAL and DIAL lidars. Our analysis shows that this intrusion formed when a blocking feature near Iceland collapsed, allowing edge air to sweep into the vortex interior. along the DC-8 flight track also shows the intrusion in both ozone and HNO3. Polar Stratospheric Clouds (PSCs) were observed by the DIAL lidar on the DC-8. The spatial variability of the PSCs can be explained using MLS HNO3 and H2O observations and meteorological analysis temperatures. We also estimate vortex denitrification using the relationship between N2O and HNO3. Reverse domain fill back trajectory calculations are used to focus on the features in the MLS data. The trajectory results improve the agreement between lidar measured ozone and MLS ozone and also improve the agreement between the HNO3 measurements PSC locations. The back trajectory calculations allow us to compute the local denitrification rate and reduction of HCl within the filament. We estimate a denitrification rate of about lO%/day after exposure to below PSC formation temperature. Analysis of Aura MLS observations made

  9. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  10. Investigation of Seawater Intrusion into Coastal Groundwater ...

    African Journals Online (AJOL)

    ADOWIE PERE

    https://dx.doi.org/10.4314/jasem.v21i2.18. Key words: Escravos, Vertical electrical sounding, Saltwater Intrusion, freshwater lenses, Aquifer, groundwater. Globally groundwater contributes a greater percentage of water usage in domestic, irrigation of agricultural farms and industrial purposes. Though groundwater is not the ...

  11. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  12. Vapor Intrusion Characterization Report (Revision 1.0)

    Science.gov (United States)

    Vapor Intrusion Characterization Report (Revision 1) - February 5, 2015: This report, which was approved by the EPA on February 18, 2015, documents the results from implementation of the Final Vapor Intrusion Characterization Work Plan.

  13. On the Feasibility of Intrusion Detection Inside Workstation Disks

    National Research Council Canada - National Science Library

    Griffin, John L; Pennington, Adam; Bucy, John S; Choundappan, Deepa; Muralidharan, Nithya; Ganger, Gregory R

    2003-01-01

    Storage-based intrusion detection systems (IDSs) can be valuable tools in monitoring for and notifying administrators of malicious software executing on a host computer, including many common intrusion tool kits...

  14. CERN Rocks

    CERN Document Server

    2004-01-01

    The 15th CERN Hardronic Festival took place on 17 July on the terrace of Rest 3 (Prévessin). Over 1000 people, from CERN and other International Organizations, came to enjoy the warm summer night, and to watch the best of the World's High Energy music. Jazz, rock, pop, country, metal, blues, funk and punk blasted out from 9 bands from the CERN Musiclub and Jazz club, alternating on two stages in a non-stop show.  The night reached its hottest point when The Canettes Blues Band got everybody dancing to sixties R&B tunes (pictured). Meanwhile, the bars and food vans were working at full capacity, under the expert management of the CERN Softball club, who were at the same time running a Softball tournament in the adjacent "Higgs Field". The Hardronic Festival is the main yearly CERN music event, and it is organized with the support of the Staff Association and the CERN Administration.

  15. How stratospheric are deep stratospheric intrusions?

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2014-09-01

    Full Text Available Preliminary attempts of quantifying the stratospheric ozone contribution in the observations at the Zugspitze summit (2962 m a.s.l. next to Garmisch-Partenkirchen in the German Alps had yielded an approximate doubling of the stratospheric fraction of the Zugspitze ozone during the time period 1978 to 2004. These investigations had been based on data filtering by using low relative humidity (RH and elevated 7Be as the criteria for selecting half-hour intervals of ozone data representative of stratospheric intrusion air. To quantify the residual stratospheric component in stratospherically influenced air masses, however, the mixing of tropospheric air into the stratospheric intrusion layers must be taken into account. In fact, the dewpoint mirror instrument at the Zugspitze summit station rarely registers RH values lower than 10% in stratospheric air intrusions. Since 2007 a programme of routine lidar sounding of ozone, water vapour and aerosol has been conducted in the Garmisch-Partenkirchen area. The lidar results demonstrate that the intrusion layers are drier by roughly one order of magnitude than indicated in the in situ measurements. Even in thin layers RH values clearly below 1% have frequently been observed. These thin, undiluted layers present an important challenge for atmospheric modelling. Although the ozone values never reach values typical of the lower-stratosphere it becomes, thus, obvious that, without strong wind shear or convective processes, mixing of stratospheric and tropospheric air must be very slow in most of the free troposphere. As a consequence, the analysis the Zugspitze data can be assumed to be more reliable than anticipated. Finally, the concentrations of Zugspitze carbon monoxide rarely drop inside intrusion layers and normally stay clearly above full stratospheric values. This indicates that most of the CO, and thus the intrusion air mass, originates in the shallow "mixing layer" around the thermal tropopause. The

  16. Geochemistry and tectonomagmatic setting of the Kharaju gabbroic intrusions (South Azarshahr, East Azerbaijan province

    Directory of Open Access Journals (Sweden)

    Abdolnaser Fazlnia

    2016-12-01

    Full Text Available Kharaju mafic intrusions (south Azarshahr; East Azarbaijan are gabbro in composition. The rocks with Eocene age intruded the northwest part of Urumieh -Dokhtar magmatic belt with a trend of NW-SE. These rocks contain mostly of minerals such as plagioclase, quartz, pyroxene, titanite, apatite and magnetite. The rocks are moderate to high calc-alkaline. The gabbros were produced as a result of the partial melting of mantle wedge with spinel lherzolite and after emplacement into the crustal magma chamber underwent fractional crystallization. Injection of the Kharaju intrusions is in relation to the last stages of Neotethys subduction activity under Central Iran. Negative anomaly in the high ionic strength elements (HFSE like, Nb, Ta, P, Hf and Zr and mild positive anomalies of Eu and Sr with moderate increases in values of K, Sr, Rb, Ba, Pb and U show oblique subduction beneath Central Iran might be willing to make the appropriate space on the edge of central Iran and as a result, partial melting in the mantle wedge occurred due to reduce the pressure as decompression.

  17. Thermal effects of water intrusion in hydrophobic nanoporous materials.

    Science.gov (United States)

    Karbowiak, Thomas; Paulin, Christian; Ballandras, Anthony; Weber, Guy; Bellat, Jean-Pierre

    2009-07-29

    Liquid water intrusion in hydrophobic nanoporous silicalite-1, a pure siliceous zeolite, in isothermal conditions under high pressure produces an endothermic effect. After intrusion, confined water in zeolite pores is in a different state from that of the liquid bulk water. Such forced intrusion also chemically modifies the material and tends to render it slightly more hydrophilic.

  18. Petrogenesis of the ∼500 Ma Fushui mafic intrusion and Early Paleozoic tectonic evolution of the Northern Qinling Belt, Central China

    Science.gov (United States)

    Shi, Yu; Pei, Xiaoli; Castillo, Paterno R.; Liu, Xijun; Ding, Haihong; Guo, Zhichao

    2017-06-01

    The Fushui mafic intrusion in the Qinling orogenic belt (QOB) is composed of meta-gabbro, meta-gabbro-diorite, diorite, and syenite. Most of these rocks are metamorphosed under the upper greenschist facies to lower amphibolite facies metamorphism. Zircon separates from eight samples have LA-ICP-MS U-Pb ages of 497-501 Ma which are taken to be the emplacement age of magmas that formed the Fushui intrusion. Most of the zircon grains exhibit negative εHf values, correspond to TDM2 model ages of late Paleoproterozoic-early Mesoproterozoic or Neoproterozoic and suggest that the mafic rocks were most probably derived from mafic melts produced by partial melting of a previously metasomatized lithospheric mantle. The intrusion is not extensively contaminated by crustal materials and most chemical compositions of rocks are not modified during the greenschist to amphibolite-facies metamorhism. Rocks from the intrusion have primitive mantle-normalized trace element patterns with significant enrichment in light-REE and large ion lithophile elements (LILE) and depletion in high field-strength elements (HFSE). On the basis of the trace element contents, the Fushui intrusion was derived from parental magmas generated by <10% partial melting of both phlogopite-lherzolite and garnet-lherzolite mantle sources. These sources are best interpreted to be in a subduction-related arc environment and have been modified by fluids released from a subducting slab. The formation of the Fushui intrusion was related to the subduction of the Paleotethyan Shangdan oceanic lithosphere at ∼500 Ma.

  19. Geology, alteration, age dating and petrogenesis of intrusive bodies in Halak Abad prospect area, NE Iran

    Directory of Open Access Journals (Sweden)

    Maliheh Ghourchi

    2014-04-01

    Full Text Available The Halak Abad prospect occurs in the northeastern part of Central Iran zone (Sabzevar structural zone. In this investigation, geochemical evolution, age and source of part of northeastern Iran magmatic arc (intrusive bodies in Halak Abad area in the Khorasan Razavi province has been studied. The exposed rocks consist of volcanic rocks with andesite and dacite nature, limestone, plutonic rocks mostly diorite, quartz diorite, monzodiorite, quartz monzonite, granodiorite and granite and sedimentary rocks such as limestone, sandstone and conglomerate. Magnetic susceptibility of intrusive rocks is >100 × 10-5 SI, so they belong to the magnetite-series (oxidized. This magmatism is mainly low-K (tholeiite series and meta-aluminous. The amounts of Zr, Th, Nb and Ti show depletion compared to N-MORB. Trace elements behavior shows a nearly flat pattern. Age of granodiorite body based on U-Pb zircon dating is 99.7±1.8 Ma (Mid-Cretaceous and 87Sr/86Sr initial ratio is 0.7047. The geochemical signature and 87Sr/86Sr initial ratio in the area suggest volcanic arc magmatism in subduction zone. This magmatism has characteristic such as high Na2O (3-7 %, low K2O (0.12-1 %, high CaO (4-5.7%, low Rb (1-20 ppm, low total REE (<40 ppm, high Ba/Nb, Sm/Yb<2, (La/YbN<5, 87Sr/86Sr initial ratio < 0.7045 and εNd: +4.5 show differences with normal granitoids in subduction zones. Geochemical and petrological characteristics indicate melting in relatively low pressure (shallow depth. The lines of evidence demonstrate that formation of this granitoid needs a suprasubduction zone.

  20. Evolution of zircons from postorogenic intrusive series with Li-F granites, Russian Far East

    Science.gov (United States)

    Alekseev, V. I.; Polyakova, E. V.; Machevariani, M. M.; Marin, Yu. B.

    2014-12-01

    The paper discusses the morphology, anatomy, and geochemistry of zircons from granitic rocks of postorogenic intrusive series with Li-F granites in the Russian Far East. The multiphase Upper Urmi pluton in the Amur region and the Severny pluton in the Chukchi Peninsula have been chosen as reference objects. The directed variations of zircon morphology and geochemistry in the history of Pacific postorogenic granitic magmatism reflect decrease in depth of magma generation and crystallization temperature along with an increase in alkalinity, fluid saturation, and rare-metal potential of granitic melts.

  1. Workshop on Pristine Highlands Rocks and the early History of the Moon

    Science.gov (United States)

    Longhi, J. (Editor); Ryder, G. (Editor)

    1983-01-01

    Oxide composition of the Moon, evidence for an initially totally molten Moon, geophysical contraints on lunar composition, random sampling of a layered intrusion, lunar highland rocks, early evolution of the Moon, mineralogy and petrology of the pristine rocks, relationship of the pristine nonmore rocks to the highlands soils and breccias, ferroan anorthositic norite, early lunar igneous history, compositional variation in ferroan anosthosites, a lunar magma ocean, deposits of lunar pristine rocks, lunar and planetary compositions and early fractionation in the solar nebula, Moon composition models, petrogenesis in a Moon with a chondritic refractory lithophile pattern, a terrestrial analog of lunar ilmenite bearing camulates, and the lunar magma ocean are summarized.

  2. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  3. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  4. The Development of Agent Information for Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Bambang Sugiantoro

    2017-10-01

    Full Text Available As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

  5. Rollerjaw Rock Crusher

    Science.gov (United States)

    Peters, Gregory; Brown, Kyle; Fuerstenau, Stephen

    2009-01-01

    The rollerjaw rock crusher melds the concepts of jaw crushing and roll crushing long employed in the mining and rock-crushing industries. Rollerjaw rock crushers have been proposed for inclusion in geological exploration missions on Mars, where they would be used to pulverize rock samples into powders in the tens of micrometer particle size range required for analysis by scientific instruments.

  6. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  7. A simplified approach to true molar intrusion

    Directory of Open Access Journals (Sweden)

    Flieger Stefanie

    2012-11-01

    Full Text Available Abstract Background Orthodontic management of anterior open bites is a demanding task for orthodontists. Molar intrusion as a primary means of open bite correction entails the need for appropriate anchorage. Orthodontic mini implants can provide the required mechanical support. The suggested procedure aims to reduce the risk of complications such as root damage or soft tissue irritations while minimizing overall complexity. Methods Three female patients aged 14, 18 and 19 years who decided against a surgical correction were treated with a device consisting of mini implants in the palatal slope, a palatal bar and intrusion cantilevers. Results In all three patients, an open bite reduction of more than a millimeter occurred within four months. An anterior overbite of 2 mm or more could be established within 6 to 9 months. Conclusions The method presented in this article enables the practitioner to use mini implants in an easily accessible insertion site. A lab-side procedure is optional but not required.

  8. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  9. Intrusion Learning: An Overview of an Emergent Discipline

    Directory of Open Access Journals (Sweden)

    Tony Bailetti

    2016-02-01

    Full Text Available The purpose of this article is to provide a definition of intrusion learning, identify its distinctive aspects, and provide recommendations for advancing intrusion learning as a practice domain. The authors define intrusion learning as the collection of online network algorithms that learn from and monitor streaming network data resulting in effective intrusion-detection methods for enabling the security and resiliency of enterprise systems. The network algorithms build on advances in cyber-defensive and cyber-offensive capabilities. Intrusion learning is an emerging domain that draws from machine learning, intrusion detection, and streaming network data. Intrusion learning offers to significantly enhance enterprise security and resiliency through augmented perimeter defense and may mitigate increasing threats facing enterprise perimeter protection. The article will be of interest to researchers, sponsors, and entrepreneurs interested in enhancing enterprise security and resiliency.

  10. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  11. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  12. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  13. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  14. Tensile rock mass strength estimated using InSAR

    KAUST Repository

    Jonsson, Sigurjon

    2012-11-01

    The large-scale strength of rock is known to be lower than the strength determined from small-scale samples in the laboratory. However, it is not well known how strength scales with sample size. I estimate kilometer-scale tensional rock mass strength by measuring offsets across new tensional fractures (joints), formed above a shallow magmatic dike intrusion in western Arabia in 2009. I use satellite radar observations to derive 3D ground displacements and by quantifying the extension accommodated by the joints and the maximum extension that did not result in a fracture, I put bounds on the joint initiation threshold of the surface rocks. The results indicate that the kilometer-scale tensile strength of the granitic rock mass is 1–3 MPa, almost an order of magnitude lower than typical laboratory values.

  15. Ring complexes and related rocks in Africa

    Science.gov (United States)

    Vail, J. R.

    Over 625 igneous complexes throughout Africa and Arabia have been selected and classified on the basis of petrographic association and chronology into six broad age groups forming 29 provinces. The groups range from Mid-Proterozoic to Tertiary and include gabbro, granite, syenite, foid syenite and carbonatite plutonic rocks, the majority in the form of ring-dykes, cone-sheets, plugs, circular intrusions, and their associated extrusive phases. Pan-African late or post-orogenic complexes (720-490 Ma) are common in the Arabian-Nubian and Tuareg shields of north Africa originating from subduction zone derived magmatism. Anorogenic complexes in Egypt, NE and central Sudan, Niger, Nigeria, Cameroon, Zaïre-Burundi, Malawi, Mozambique, Zimbabwe, Namibia and Angola span 550 to 50 Ma and are dominantly alkali granites and foid syenites. Many groups occur as en-echelon bands within linear arrays, and show migrating centres of intrusion in variable directions. In W. Africa there was a progressive shift of emplacement southwards during early Ordovician to Mid-Cretaceous times. Distribution patterns suggest thatdeep seated features, such as shear zones associated with lithospheric plate movements,controlled melting, and the resultant location of the complexes. Economic mineralization is not widespread in the rocks of the African ring complexes and is mainly restricted to small deposits of Sn, W, F, U and Nb.

  16. Intrusion detection using pattern recognition methods

    Science.gov (United States)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  17. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  18. Palaeomagnetism of the Puerto Vallarta intrusive complex and the accretion of the Guerrero terrain, Mexico

    Science.gov (United States)

    Böhnel, H.; Negendank, J. F. W.

    1988-11-01

    The batholith exposed around Puerto Vallarta is part of the Guerrero tectonostratigraphic terrain, presumably accreted to Mexico during the Laramide orogenic phase. Fourteen sites on this batholith were studied palaeomagnetically and geochemically. Nine sites define a paleopole at 76.6°N, 181.8°E, with α95 = 6.6°, coinciding with the reference pole for stable North America. It is proposed that no important movements of the region relative to North America have occurred since emplacement of the intrusive rocks ˜ 80 Ma ago. This would mean that the Guerrero terrain was accreted to the Mexican continental margin before that time. Geochemical data support this interpretation, characterizing the rocks as volcanic-arc granites intruded at an active continental margin.

  19. Broad accommodation of rift-related extension recorded by dyke intrusion in Saudi Arabia

    KAUST Repository

    Pallister, John S.

    2010-09-26

    The extensive harrat lava province of Arabia formed during the past 30 million years in response to Red Sea rifting and mantle upwelling. The area was regarded as seismically quiet, but between April and June 2009 a swarm of more than 30,000 earthquakes struck one of the lava fields in the province, Harrat Lunayyir, northwest Saudi Arabia. Concerned that larger damaging earthquakes might occur, the Saudi Arabian government evacuated 40,000 people from the region. Here we use geologic, geodetic and seismic data to show that the earthquake swarm resulted from magmatic dyke intrusion. We document a surface fault rupture that is 8 km long with 91 cm of offset. Surface deformation is best modelled by the shallow intrusion of a north-west trending dyke that is about 10 km long. Seismic waves generated during the earthquakes exhibit overlapping very low- and high-frequency components. We interpret the low frequencies to represent intrusion of magma and the high frequencies to represent fracturing of the crystalline basement rocks. Rather than extension being accommodated entirely by the central Red Sea rift axis, we suggest that the broad deformation observed in Harrat Lunayyir indicates that rift margins can remain as active sites of extension throughout rifting. Our analyses allowed us to forecast the likelihood of a future eruption or large earthquake in the region and informed the decisions made by the Saudi Arabian government to return the evacuees. © 2010 Macmillan Publishers Limited. All rights reserved.

  20. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  1. Study on Kalimantan uranium province: The assessment on uranium mineralization of metamorphic and granitic rocks at Schwaner mountains

    International Nuclear Information System (INIS)

    Tjokrokardono, Soeprapto

    2002-01-01

    Uranium exploration activities done by CEA-BATAN had discovered uranium occurrences as the radiometric and uranium content anomalies at metamorphic and granite rocks of Schwaner Mountains, Kalimantan. A part of the occurrences on metamorphic rocks at Kalan basin has been evaluated and be developed onto follow-up step of prospecting by construction of some drilling holes and an exploration adit. In order to increase the national uranium resources, it is necessarily to extent the exploration activity to out side or nearby of Kalan basin. The goal of this assessment is to understand the uranium accumulation mechanism at Pinoh metamorphic rocks of Kalan Kalimantan and to delineate areas that uranium may exist. The assessment was based on the aspect of geology, anomaly of radioactivity and uranium contents, tectonics and alterations. Pinoh metamorphic rocks which is influenced by Sukadana granite intrusion are the high potential rocks for the uranium accumulation, because the intrusion contains a relatively high of U, Th, Cu, Zn, Nb, Mn, and W. The potential rock distributions are in between G. Ransa granite intrusion at the east and Kotabaru granite intrusions at the west. The mineralizations are categorized as vein type deposits of granitic association

  2. Rocks Can Wow? Yes, Rocks Can Wow!

    Science.gov (United States)

    Hardman, Sally; Luke, Sue

    2016-01-01

    Rocks and fossils appear in the National Curriculum of England science programmes of study for children in year 3 (ages 7-8). A frequently asked question is "How do you make the classification of rocks engaging?" In response to this request from a school, a set of interactive activities was designed and organised by tutors and students…

  3. Petrology, geochemistry, and geochronology of the Chah-Bazargan gabbroic intrusions in the south Sanandaj-Sirjan zone, Neyriz, Iran

    Science.gov (United States)

    Fazlnia, Abdolnaser; Schenk, Volker; Appel, Peter; Alizade, Abouzar

    2013-07-01

    The Chah-Bazargan gabbroic intrusions are located in the south of Sanandaj-Sirjan zone. Precise U-Pb zircon SHRIMP ages of the intrusions show magmatic ages of 170.5 ± 1.9 Ma. These intrusions consist primarily of gabbros, interspersed with lenticular bodies of anorthosite, troctolite, clinopyroxenite, and wehrlite. The lenticular bodies show gradational or sharp boundaries with the gabbros. In the gradational boundaries, gabbros are mineralogically transformed into anorthosites, wehrlites, and/or clinopyroxenites. On the other hand, where the boundaries are sharp, the mineral assemblages change abruptly. There is no obvious deformation in the intrusions. Hence, the changes in mineral compositions are interpreted as the result of crystallization processes, such as fractionation in the magma chamber. Rock types with sharp boundaries show abrupt chemical changes, but the changes exhibit the same patterns of increasing and decreasing elements, especially of rare earth elements, as the gradational boundaries. Therefore, it is possible that all parts of the intrusions were formed from the same parental magma. Parts showing signs of nonequilibrium crystallization, such as cumulate features and sub-solidification, underwent fracturing and were interspersed throughout the magma chamber by late injection pulses or mechanical movements under mush conditions. The geological and age data show that the intrusions were formed from an Al-, Sr-, Fe-enriched and K-, Nb-depleted tholeiitic magma. The magma resulted from the partial melting of a metasomatized spinel demonstrated by negative Nb, P, Hf, and Ti, and positive Ba, Sr, and U anomalies typical of subduction-related magmas.

  4. Radiological consequences of drilling intrusion into a deep repository for high level waste

    International Nuclear Information System (INIS)

    Charles, D.; McEwen, T.J.

    1991-01-01

    This report provides estimates of maximum annual individual doses to personnel for given set of scenarios associated with intrusion by drilling into a deep repository for high level waste (HLW) and recovery to the surface of contaminated material. Geological and engineering judgment has been used to formulate the manner of this intrusion and the parameters which would determine the resulting doses to field workers and to others who might be involved subsequently in procedures carried out in a geotechnical laboratory. Calculations have been performed to quantify the magnitudes of doses resulting from drilling into the HLW spent fuel matrix, the bentonite buffer and the adjacent rock. Doses have been calculated in the basis of the potential for external irradiation, inhalation of suspended contamination, and inadvertent ingestion of small amounts of contaminated material. The results show that intrusion doses into spent fuel within a few decades of disposal could be very high, in the range about 10 to 100 Sv. At this stage all three exposure pathways make a significant contribution to the total dose. Beyond about 100 y, as 137 Cs decays away, the contribution from external irradiation falls off sharply. However the doses from ingestion and inhalation have only fallen by about a factor of 5 after 10 3 y, and the total dose still in the range from about 2 to 25 Sv. Apart form the direct consequences of intrusion discussed above, drilling might influence safety in other ways. Thus, a borehole might modify the groundwater flow system around the waste, and provide a direct permeable flow path to the near surface; it might results in the introduction of drilling fluids which modify groundwater chemistry; it might results in the early failure of a fuel canister, leading to earlier release to groundwater; or, in the extreme, some combination of all three. (au)

  5. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  6. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  7. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  8. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  9. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  10. Rock Slope Design Criteria

    Science.gov (United States)

    2010-06-01

    Based on the stratigraphy and the type of slope stability problems, the flat lying, Paleozoic age, sedimentary : rocks of Ohio were divided into three design units: 1) competent rock design unit consisting of sandstones, limestones, : and siltstones ...

  11. Rocks in Our Pockets

    Science.gov (United States)

    Plummer, Donna; Kuhlman, Wilma

    2005-01-01

    To introduce students to rocks and their characteristics, teacher can begin rock units with the activities described in this article. Students need the ability to make simple observations using their senses and simple tools.

  12. Rock slope design guide.

    Science.gov (United States)

    2011-04-01

    This Manual is intended to provide guidance for the design of rock cut slopes, rockfall catchment, and : rockfall controls. Recommendations presented in this manual are based on research presented in Shakoor : and Admassu (2010) entitled Rock Slop...

  13. Enhancing Battlemind: Preventing PTSD by Coping with Intrusive Thoughts

    Science.gov (United States)

    2015-09-01

    Training enhancement (not treatment)  Addressing intrusive thoughts (secondary prevention of PTSD ?? decrease distress)  Mindfulness based intervention...AWARD NUMBER: W81XWH-09-1-0535 TITLE: Enhancing BATTLEMIND: Preventing PTSD by Coping with Intrusive Thoughts PRINCIPAL INVESTIGATOR...SUBTITLE 5a. CONTRACT NUMBER W81XWH-09-1-0535 Enhancing BATTLEMIND: Preventing PTSD by Coping With Intrusive Thoughts 5b. GRANT NUMBER 08194004

  14. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  15. SHRIMP U-Pb zircon geochronology and thermal modeling of multilayer granitoid intrusions. Implications for the building and thermal evolution of the Central System batholith, Iberian Massif, Spain

    Science.gov (United States)

    Díaz Alvarado, Juan; Fernández, Carlos; Castro, Antonio; Moreno-Ventas, Ignacio

    2013-08-01

    This work shows the results of a U-Pb SHRIMP zircon geochronological study of the central part of the Gredos massif (Spanish Central System batholith). The studied batholith is composed of several granodiorite and monzogranite tabular bodies, around 1 km thick each, intruded into partially molten pelitic metasediments. Granodiorites and monzogranites, belonging to three distinct intrusive bodies, and samples of anatectic leucogranites have been selected for SHRIMP U-Pb zircon geochronology. Distinct age groups, separated by up to 20 Ma, have been distinguished in each sample. Important age differences have also been determined among the most representative age groups of the three analyzed granitoid bodies: 312.6 ± 2.8 Ma for the Circo de Gredos Bt-granodiorites (floor intrusive layer), 306.9 ± 1.5 Ma for the Barbellido-Plataforma granitoids (top intrusive layer) and 303.5 ± 2.8 Ma for Las Pozas Crd-monzogranites (middle intrusive layer). These age differences are interpreted in terms of sequential emplacement of the three intrusive bodies, contemporary with the Late Paleozoic D3 deformation phase. The anatectic leucogranites are coeval to slightly younger than the adjacent intrusive granodiorites and monzogranites (305.4 ± 1.6 Ma for Refugio del Rey leucogranites and 303 ± 2 Ma for migmatitic hornfelses). It is suggested that these anatectic magmas were generated in response to the thermal effects of granodiorite intrusions. Thermal modeling with COMSOL Multiphysics® reveals that sequential emplacement was able to keep the thermal conditions of the batholith around the temperature of zircon crystallization in granitic melts (around 750 °C) for several million of years, favoring the partial melting of host rocks and the existence of large magma chambers composed of crystal mush prone to be rejuvenated after new intrusions.

  16. Zircon U-Pb dating of early Palaeozoic monzonitic intrusives from the Goonumbla area, New South Wales

    International Nuclear Information System (INIS)

    Butera, K.M.; Williams, I.S.; Blevin, P.L.; Simpson, C.J.

    2001-01-01

    Zircon U-Pb ages measured on four small intrusions into the succession of Ordovician volcanic rocks that hosts North Parkes Cu-Au mine northwest of Parkes. New South Wales. place limits on the age of the volcanic sequence. The basal Nelungaloo Volcanics are constrained by a cross-cutting monzodiorite to be ≥484.3 ± 2.9Ma (Early Ordovician). Similarly. the overlying basal Goonumbla Volcanics are constrained by another cross-cutting monzodiorite to be ≥450.8 ± 4.2Ma (Middle Ordovician). A later generation of monzonites intruded into the middle and upper Goonumbla Volcanics yield ages of 439.1 ± 4.5 and 438.9 ± 4.7 Ma (Siluro-Ordovician). These various ages are consistent with the ages of fossiliferous sediments within the volcanic sequence. and indicate that both the intrusive and volcanic rocks span an appreciable period of time-neither are the product of a single magmatic episode. Intrusion of the youngest monzonites and mineralisation was virtually contemporaneous. Copyright (2001) Geological Society of Australia

  17. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  18. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  19. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  20. Synkinematic(?) intrusion of the ``anorogenic'' 1425 Ma Beer Bottle Pass pluton, southern Nevada

    Science.gov (United States)

    Duebendorfer, Ernest M.; Christensen, Clint

    1995-02-01

    The tectonic setting of a transcontinental belt of 1500-1300 Ma granitic intrusions that extends from southern California to Labrador is controversial; however, the granites are conventionally considered to be "anorogenic." Detailed field, microstructural, and geochronologic data from the 1425 Ma Beer Bottle Pass pluton, southern Nevada, indicate that major mylonite zones recording dextral-contractile strains were probably active during and/or shortly after pluton emplacement and suggest that the anorogenic interpretation for this pluton requires reevaluation. Mylonite zones up to 100 m thick strike northeast, dip moderately northwest, and contain a consistent west plunging elongation lineation. Mylonites occur along 15% of the exposed granite-wall rock contact and extend into both the pluton and the wall rock. Mesoscopic and microscopic kinematic indicators record an oblique, dextral/reverse (pluton side down) movement sense. Synkinematic mineral assemblages of hornblende and biotite and dynamic recrystallization of feldspars suggest that deformation occurred minimally under amphibolite facies conditions. A K/Ar biotite date of 1399±32 Ma, obtained from a sample of mylonitic granite, suggests that deformation took place during or soon following pluton crystallization. We reject forcible emplacement of the Beer Bottle Pass pluton as a mechanism for formation of the mylonite zones because (1) rocks near the granite-wall rock contact are largely unstrained, (2) the mylonite zones conform only locally to the pluton-wall rock contact, (3) mylonite zones strike at high angles to, and truncate, the intrusive pluton-wall rock contact, (4) the pluton-side-down shear sense is more compatible with a uniform sense simple shear zone than a forcibly intruding pluton, and (5) fabrics indicative of noncoaxial deformation dominate over flattening fabrics. We suggest that the Beer Bottle Pass pluton is fundamentally synkinematic with respect to either (1) a local, contractile

  1. Oxygen isotope mapping and evaluation of paleo-hydrothermal systems associated with synvolcanic intrusion and VMS deposits

    International Nuclear Information System (INIS)

    Taylor, B.E

    2001-01-01

    Whole-rock oxygen isotope mapping provides a useful method for the delineation and quantitative evaluation of paleo-hydrothermal systems associated with syn-volcanic intrusions and volcanic-associated massive sulfide (VMS) deposits. During the course of a four-year study of regional alteration systems associated with VMS Deposits, four syn-volcanic intrusive complexes in Canada were mapped using stable isotope techniques. The complexes included Noranda, Quebec; Clifford-Ben Nevis, Ontario; Snow Lake, Manitoba, and Sturgeon Lake, Ontario. This study was regional in extent, involving large areas and large numbers of whole-rock samples: Noranda (625 km 2 ;≥600 samples, plus others (total = 1198); Sturgeon Lake (525 km 2 ; 452 samples); Clifford-Ben Nevis (160 km 2 ; 251 samples); and Snow Lake (84 km 2 ; 575 samples). Isotopic data on whole-rock carbonates and hydrous minerals were also collected. The regional isotopic studies were carried out in concert with other studies on mineral assemblages and mineral composition, and on associated intrusive and extrusive rocks. The Clifford-Ben Nevis area was selected as a control area, in as much as it contains no known VMS deposits; all other areas are well-known, productive VMS districts. Oxygen isotope maps are, in a sense, thermal maps, illustrating the paleo-distribution of heat and fluids, and offering a potential aid to exploration. The isotopic data may be contoured to reveal zones of 18 O depletion and enrichment, relative to unaltered rocks. Zones of δ 18 O≤60% comprise rocks that have reacted with seawater at high (e.g., 300+ o C) temperatures. The volume of foot-wall rocks isotopically-depleted by water/rock interaction during the life of one or more episodes of submarine hydrothermal activity is proportional to the amount of heat available from the syn-volcanic intrusive center. These altered rocks comprise the reaction zone often inferred to have supplied metals and other constituents for the VMS deposits

  2. Molar Intrusion in Open-bite Adults Using Zygomatic Miniplates.

    Science.gov (United States)

    Marzouk, Eiman S; Abdallah, Essam Mohamed; El-Kenany, Walid A

    2015-01-01

    The aim of this study is to evaluate the skeletal, dental and soft tissue changes that arise after intrusion of the maxillary molars using zygomatic miniplates in adult skeletal anterior open bite patients. In addition to measuring the amount and rate of molar intrusion; with special emphasis on changes in the axial inclination of the intruded molars. The study group was composed of 13 anterior open bite patients (mean age 18 years, 8 months ± 2 years, 2 months) with posterior dentoalveolar excess. Mini-plates were placed in the zygomatic buttress bilaterally. The upper arch was segmentally leveled and a double Trans-Palatal Arch (TPA) was bonded. Closed NiTi coil spring was placed bilaterally between the book of the mini-plate just mesial and distal to the first molar buccal tube applying intrusive force of 450 gper side. Lateral and posteroanterior cephalograms were taken before intrusion (T1: post upper segmental leveling) and after intrusion (T2). Comparison between means before and after the intrusion was done using Wilcoxon Signed Ranks test (WSRT). Mandibular autorotation followed the molar intrusion, SNB and SN-Pog angles significantly increased while the ANB, MP-SN angle and N-S-Gn angle significantly decreased. The mean amount of accomplished molar intrusion was 3.1mm ± 0.74mm, with a rate of 0.36mm per month ± 0.08mm per month and a bite closure of 6.55mm ± 1.83mm. There was no significant buccal tip in the right and left molars upon intrusion. Conclusion: Miniplates zygomatic anchorage can be used effectively for skeletal open bite correction through posterior dento-alveolar intrusion. Intrusion of the posterior teeth with skeletal anchorage induced counterclockwise rotation of the mandible and, as a consequence, corrected the anteroposterior intermaxillary relationship with a dramatic improvement in the facial soft tissue convexity.

  3. Scattering from Rock and Rock Outcrops

    Science.gov (United States)

    2018-01-23

    of the open questions which exist for scattering from these types of surfaces and include increasing our basic understanding of: (1) geoacoustic...ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) Office of Naval Research 875 North Randolph Street ...ideal mean seafloor could be mapped to the local SCATTERING FROM ROCKS 5 Figure 4. (color online) SAS images of the calibration rock outcrop. Boxes

  4. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  5. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  6. Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android

    Science.gov (United States)

    2015-10-01

    ARL-TN-0681 ● OCT 2015 US Army Research Laboratory Porting Extremely Lightweight Intrusion Detection (ELIDe) to Android by...Lightweight Intrusion Detection (ELIDe) to Android by Ken F Yu and Garret S Payer Computational and Information Sciences Directorate, ARL...

  7. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  8. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

    Directory of Open Access Journals (Sweden)

    Indah Yulia Prafitaning Tiyas

    2014-06-01

    Full Text Available Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL. Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R and high speed (44 ms.The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable. Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.

  9. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  10. Statistical decision making for authentication and intrusion detection

    NARCIS (Netherlands)

    Dimitrakakis, C.; Mitrokotsa, A.

    2009-01-01

    User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose alternatives based on a

  11. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    A fairly good fitness between the observed and computed values was obtained by a manual trial-and-error method. ... controlling seawater intrusion in such coastal aquifer systems. 1. Introduction. Seawater intrusion constitutes a ..... reveals that FEFLOW is an effective and robust simulation tool for studying variable-density.

  12. Soft-sensing, non-intrusive multiphase flow meter

    NARCIS (Netherlands)

    Wrobel, K.; Schiferli, W.

    2009-01-01

    For single phase flow meters more and better non-intrusive or even clamp-on meters become available. This allows for a wider use of meters and for easier flow control. As the demand for multiphase meters is increasing, the current aim is to develop a non-intrusive multiphase flow meter. The

  13. Performance Assessment of Network Intrusion-Alert Prediction

    Science.gov (United States)

    2012-09-01

    through honeypots, machines explicitly designated solely to learn the methods used by black-hats to probe and hack a system so that a network...Maintaining access Miscellanous Reverse engineering RFID tools Table 3. BackTrack Intrusion-detection System/Intrusion-prevention System Penetration

  14. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Seawater intrusion in coastal aquifers is generally three dimensional (3-D) in nature. In the literature, there is a general lack of reported results on 3-D simulations. This paper presents some typical example simulations of 3-D seawater intrusion process for a specified hypothetical study area. The simulation results presented ...

  15. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    primitive, mantle-derived components and evolved, crust-derived components.Each compositional subtype can be ascribed to a relatively unique petrogenetic history. The numerically dominant ferroan, peraluminous granites probably represent low-degree, relatively high-pressure partial melting of preexisting, crust-derived, intermediate-composition granitoids. The moderately numerous, weakly magnesian, peraluminous granites probably reflect similar partial melting but at a higher degree and in a lower pressure environment. In contrast, the ferroan but metaluminous granites may be the result of extensive differentiation of tholeiitic basalt. Finally, the peralkaline igneous rocks at Mountain Pass have compositions potentially derived by differentiation of alkali basalt. The varying alkalic character of each subtype probably reflects polybaric petrogenesis and the corresponding effect of diverse mineral stabilities on ultimate melt compositions. Mantle-derived mafic magma and variably assimilated partial melts of mainly juvenile Paleoproterozoic crustal components are required to generate the relatively low initial strontium (87Sr/86Sr) and distinctive neodymium isotope compositions characteristic of the U.S. 1.4 Ga granitoid intrusions. The characteristics of these intrusions are consistent with crustal melting in an extensional/decompressional, intracratonic setting that was triggered by mantle upwelling and emplacement of tholeiitic basaltic magma at or near the base of the crust. Composite magmas, formed by mingling and mixing mantle components with partial melts of Paleoproterozoic crust, produced variably homogenized storage reservoirs that continued polybaric evolution as intrusions lodged at various crustal depths.

  16. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  17. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  18. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  19. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  20. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  1. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  2. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  3. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  4. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    Science.gov (United States)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  5. Poleward intrusion in the northern Galician shelf

    Science.gov (United States)

    Alvarez, I.; Ospina-Alvarez, N.; deCastro, M.; Varela, M.; Gomez-Gesteira, M.; Prego, R.

    2010-05-01

    The evolution of a warm water mass related to the Iberian Poleward Current (IPC) was characterized along the northern Galician shelf in November 2008 by means of Sea Surface Temperature and wind data. It was observed that under upwelling favorable conditions water temperature decreased along the northern coast and a temperature break appeared between Cape Vilano and Cape Ortegal showing a relaxation of the poleward intrusion. The effect of the IPC was also analyzed inside the Northern Galician Rias taking into account the hydrographical and biogeochemical properties measured on November 18. Water driven by the IPC was observed close to the mouth of the rias, around Cape Estaca de Bares, causing a nutrient salts decrease. Inside the rias a slight biological activity was found near surface resulting from fluvial contributions.

  6. Emplacement of sandstone intrusions during contractional tectonics

    Science.gov (United States)

    Palladino, Giuseppe; Grippa, Antonio; Bureau, Denis; Alsop, G. Ian; Hurst, Andrew

    2016-08-01

    Sandstone injections are created by the forceful emplacement of remobilized sand in response to increases in overpressure. However, the contribution provided by horizontal compressive stress to the build-up in overpressure, and the resulting emplacement of sand injection complexes, is still to be substantiated by robust field observations. An opportunity to address this issue occurs in Central California where a large volume of sandstone intrusions record regionally-persistent supra-lithostatic pore-pressure. Detailed fieldwork allows sandstone-filled thrusts to be recognized and, for the first time, permits us to demonstrate that some sandstone intrusions are linked to contractional deformation affecting the western border of the Great Valley Basin. Fluidized sand was extensively injected along thrust surfaces, and also fills local dilatant cavities linked to thrusting. The main aims of this paper are to provide detailed descriptions of the newly recognized syn-tectonic injections, and describe detailed cross-cutting relationships with earlier sandstone injection complexes in the study area. Finally, an evolutionary model consisting of three phases of sand injection is provided. In this model, sand injection is linked to contractional tectonic episodes affecting the western side of the Great Valley Basin during the Early-Middle Cenozoic. This study demonstrates that sand injections, driven by fluid overpressure, may inject along thrusts and folds and thereby overcome stresses associated with regional contractional deformation. It is shown that different generations of sand injection can develop in the same area under the control of different stress regimes, linked to the evolving mountain chain.

  7. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  8. Petrological and Geochemical Studies of the Igneous Rocks at Cerro EL Borrego, Chihuahua, Mexico

    Science.gov (United States)

    Estrada, V. M.; Espejel-Garcia, V. V.; Villalobos-Aragon, A.

    2013-05-01

    Cerro El Borrego, which is a hill composed of igneous rocks, is located 13.7 km to the SW of Chihuahua city, in northern Mexico. The coordinates of the hill are 28° 11' 07'' N latitude and 105° 33' 23'' W longitude. The study area is within the Basin and Range Physiographic Province, characterized by a complex tectonic-structural pattern, such as elongated ranges with folds and igneous rock formations of Paleogene age. A lava flow of Oligocene age is part of the large volcanic and plutonic activity at the early times of the Cenozoic, which occurred to the NW portion of Mexico. In Cerro El Borrego, the rocks that outcrop are middle Oligocene's rhyolitic tuff to the NW of the hill, while to its SE there is a Pleistocene polymictic conglomerate. Previous work shows different interpretations about the origin and composition of the igneous rocks at Cerro El Borrego. This project includes whole rock and textural analyses, which helped to discern the petrogenesis of these rocks. Preliminary petrographic analyses indicate that the Cerro El Borrego, is a structural dome, and its feldspar-rich rocks contain large crystals that can be appreciated without a microscope. The presence of a porphyritic texture, suggest a sallow intrusion origin. A preliminary conclusion is that Cerro El Borrego is a shallow depth intrusive body with a syenitic composition derived from the Oligocene plutonic activity.

  9. The Significance of Atypical High-Silica Igneous Rocks

    Science.gov (United States)

    Frazer, Ryan Edward

    The origins of high-silica igneous rocks are debated, as they may be products of high-degree fractional crystallization or low-degree partial melting. They may play a role in the generation of intermediate igneous rocks and are responsible for large, ash-rich volcanic eruptions. High-silica granites and rhyolites in the Sierra Nevada, California, and the Colorado Mineral Belt (CMB) are investigated using isotope geochemistry to better understand how they bear on these questions. Zircon U-Pb geochronology identifies two intrusive suites comprising large volumes of high-silica granites emplaced in the mid-Cretaceous Sierra Nevada batholith: the 106-98 Ma Shaver Intrusive Suite (SIS) in the central part of the batholith, and the 103-100 Ma Kearsarge intrusive suite (KIS) on the Sierra Crest and Owens Valley. High-silica granites in both suites have relatively high concentrations of middle rare earth and high field strength elements. Data for these and other discrete high-silica plutons in the batholith suggest they were derived from titanite-free sources in the deep crust, unlike similarly felsic parts of zoned intrusive suites. Despite similar trace element signatures, SIS and KIS high-silica granites have divergent isotopic compositions. High-silica granites of the SIS have supracrustal O in zircon, crustal Sr and Nd whole rock isotopic compositions, and negative Ce anomalies suggesting the SIS granites may have been derived from oceanic sedimentary sources. In contrast, KIS granites have mantle-like isotopic compositions. The location and geochemistry of the KIS suggests it may have resulted from backarc magmatism in the mid-Cretaceous Sierra. Volcanic and plutonic rocks in the central CMB were emplaced during the Laramide orogeny and subsequent Oligocene-Eocene volcanic flare-up. Strontium and Nd data suggest the 63-39 Ma Twin Lakes pluton and igneous rocks as young as 24 Ma were derived from a persistent mafic lower crust or enriched lithospheric mantle source

  10. Age determination of Precambrian rocks from Greenland: past and present

    International Nuclear Information System (INIS)

    Karlsbeek, F.

    1997-01-01

    For Precambrian rocks as well as for younger igneous intrusions, precise ages can only be obtained by isotopic analysis of minerals or rocks. Isotopic (radiometric) age determination of Greenland rocks began in the early 1960s and has continued since with gradually improving methods. In this contribution, the development of geochronological knowledge of the Precambrian of Greenland is described in historical perspective, and an outline of new results is given. The history of geochronology can be roughly divided into three periods: 1) a period of single-sample K-Ar and Rb-Sr mineral or whole-rock age determinations; 2) a time when most ages were determined with the help of Rb-Sr and Pb-Pb whole-rock isochrones and multi-grain zircon U-Pb isotope data; 3) the present, where 'single' zircon U-Pb data are the preferred method to obtain rock ages. These stages in the development of radiometric dating methods partly overlap in time, and each has yielded very significant contributions to the knowledge of Precambiran evolution in Greenland. (EG)

  11. The Uitkomst intrusion and Nkomati Ni-Cu-Cr-PGE deposit, South Africa: trace element geochemistry, Nd isotopes and high-precision geochronology

    Science.gov (United States)

    Maier, W. D.; Prevec, S. A.; Scoates, J. S.; Wall, C. J.; Barnes, S.-J.; Gomwe, T.

    2018-01-01

    The Uitkomst intrusion is a tubular mafic-ultramafic layered body that hosts one of South Africa's largest Ni-Cu-Cr-PGE deposits, Nkomati. The sulphide ore occurs in the form of massive lenses in the immediate quartzitic footwall and as disseminations within peridotite. The chromite ore forms an up to ˜10-m-thick layer in the lower portion of the intrusion. Uitkomst has generally been interpreted as a magma conduit, possibly related to the Bushveld event. Here, we present a new high-precision U-Pb zircon date of 2057.64 ± 0.69 Ma that overlaps with the age of the Merensky Reef of the Bushveld Complex and thus demonstrates a coeval relationship between the intrusions. Based on incompatible trace elements as well as O- and Nd isotope data (ɛNd -4.5 to -6.2), we show that the Uitkomst parent magmas were contaminated with up to 20% Archean upper crust prior to emplacement, and with up to 15% dolomitic country rock during emplacement. Ore formation at Nkomati was critically aided by substantial devolatisation and removal of dolomitic floor rocks leading to hydrodynamic concentration of sulphide and chromite during slumping of crystal mushes into the trough-like centre of the subsiding intrusion and its footwall.

  12. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  13. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  14. The Experience of Intrusions Scale: a preliminary examination.

    Science.gov (United States)

    Salters-Pedneault, Kristalyn; Vine, Vera; Mills, Mary Alice; Park, Crystal; Litz, Brett T

    2009-01-01

    Intrusive thoughts (i.e., unwelcome, distressing, involuntary thoughts) are prevalent in a variety of clinical conditions and are increasingly a focus of translational research. The goal of this study was to develop and preliminarily examine a brief self-report measure designed to assess clinically relevant aspects of the experience of intrusive thoughts related to a particular target. The Experience of Intrusions Scale (EIS) is a five-item measure that assesses the frequency, unpredictability, and unwantedness of intrusive thoughts, as well as the interference and distress caused by the intrusions, each on a five-point Likert-type scale. Five times over a four-] period, female undergraduates (N=160) completed the EIS in response to intrusive thoughts regarding a film clip depicting a sexual assault. On the first and last days, participants completed the EIS five minutes after watching the clip. In between film clip viewings, participants completed the EIS once per day. The EIS demonstrated good internal consistency, good to excellent test-retest reliability using both immediate post-stimulus and 24-hour time intervals, and convergent validity with two existing measures of intrusive phenomena: the White Bear Suppression Inventory (Wegner & Zanakos, 1994) and the Post-traumatic Stress Disorder Checklist-Civilian Version (Weathers, Litz, Herman, Huska, & Keane, 1993).

  15. The role of stress during memory reactivation on intrusive memories.

    Science.gov (United States)

    Cheung, Jessica; Garber, Benjamin; Bryant, Richard A

    2015-09-01

    Intrusive memories are unwanted recollections that maintain distress in psychological disorders. Increasing evidence suggests that memories that are reactivated through retrieval become temporarily vulnerable to environmental or pharmacological manipulation, including changes in levels of circulating stress hormones. This study investigated the influence of stress during memory reactivation of an emotionally arousing trauma film on subsequent intrusive memories. Three groups of participants (N=63) viewed a trauma film depicting a serious car accident at baseline. Two days later (Time 2), one group received a reactivation induction following a socially evaluated cold pressor test (SECPT; Stress/Reactivation condition), whilst the second group reactivated the memory after a control procedure (Reactivation condition). A third group underwent the SECPT but was not asked to reactivate memory of the trauma film (Stress condition). Two days later (Time 3), all participants received a surprise cued memory recall test and intrusions questionnaire which they completed online. Results showed that those in the Stress/Reactivation group had higher intrusions scores than the other two groups, suggesting that acute stress promotes intrusive memories only when the memory trace is reactivated shortly afterwards. Increased cortisol predicted enhanced intrusive experiences in the Stress/Reactivation condition but not in the other conditions. This pattern of results suggests that acute stress during the reactivation of emotional material impacts on involuntary emotional memories. These findings suggest a possible explanation for the mechanism underlying the maintenance of intrusive memories in clinical disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Re-Os isotopic evidence for an enriched-mantle source for the Noril'sk-type, ore-bearing intrusions, Siberia

    Science.gov (United States)

    Walker, R.J.; Morgan, J.W.; Horan, M.F.; Czamanske, G.K.; Krogstad, E.J.; Fedorenko, V.A.; Kunilov, V.E.

    1994-01-01

    Magmatic Cu-Ni sulfide ores and spatially associated ultramafic and mafic rocks from the Noril'sk I, Talnakh, and Kharaelakh intrusions are examined for Re-Os isotopic systematics. Neodymium and lead isotopic data also are reported for the ultramafic and mafic rocks. The Re-Os data for most samples indicate closed-system behavior since the ca. 250 Ma igneous crystallization age of the intrusions. There are small but significant differences in the initial osmium isotopic compositions of samples from the three intrusions. Ores from the Noril'sk I intrusion have ??Os values that vary from +0.4 to +8.8, but average +5.8. Ores from the Talnakh intrusion have ??Os values that range from +6.7 to +8.2, averaging +7.7. Ores from the Kharaelakh intrusion have ??Os values that range from +7.8 to +12.9, with an average value of +10.4. The osmium isotopic compositions of the ore samples from the Main Kharaelakh orebody exhibit minimal overlap with those for the Noril'sk I and Talnakh intrusions, indicating that these Kharaelakh ores were derived from a more radiogenic source of osmium than the other ores. Combined osmium and lead data for major orebodies in the three intrusions plot in three distinct fields, indicating derivation of osmium and lead from at least three isotopically distinct sources. Some of the variation in lead isotopic compositions may be the result of minor lower-crustal contamination. However, in contrast to most other isotopic and trace element data, Os-Pb variations are generally inconsistent with significant crustal contamination or interaction with the subcontinental lithosphere. Thus, the osmium and lead isotopic compositions of these intrusions probably reflect quite closely the compositions of their mantle source, and suggest that these two isotope systems were insensitive to lithospheric interaction. Ultramafic and mafic rocks have osmium and lead isotopic compositions that range only slightly beyond the compositions of the ores. These rocks also

  17. Intrusive hyaloclastite and peperitic breccias associated to sill and cryptodome emplacement on an Early Paleocene polymagmatic compound cone-dome volcanic complex from El Guanaco mine, Northern Chile

    Science.gov (United States)

    Páez, G. N.; Permuy Vidal, C.; Galina, M.; López, L.; Jovic, S. M.; Guido, D. M.

    2018-04-01

    This work explores the textural characteristics, morphology and facies architecture of well-preserved Paleocene hyaloclastic and peperitic breccias associated with subvolcanic intrusions at El Guanaco gold mine (Northern Chile). The El Guanaco mine volcanic sequence is part of a polymagmatic compound cone-dome volcanic complex grouping several dacitic domes and maar-diatremes, and subordinated subvolcanic intrusions of basaltic, andesitic and dacitic compositions. The Soledad-Peñafiel Fault System is a first order regional structure controlling the location and style of the volcanism in the region. Three different intrusive bodies (Basaltic sills, Dacitic cryptodomes and Andesitic cryptodomes) were found to intrude into a wet and poorly consolidated pyroclastic sequence representing the upper portions of a maar-diatreme. Consequently, extensive quench fragmentation and fluidization along their contacts occurred, leading to the formation of widespread breccia bodies enclosing a coherent nucleus. Differences in matrix composition allows to define two main breccias types: 1) poorly-sorted monomictic breccias (intrusive hyaloclastites) and 2) poorly-sorted tuff-matrix breccias (peperites). The observed facies architecture is interpreted as the result of the interplay of several factors, including: 1) magma viscosity, 2) the geometry of the intrusives, and 3) variations on the consolidation degree of the host rocks. Additionally, the overall geometry of each intrusive is interpreted to be controlled by the effective viscosity of the magmas along with the available magma volume at the time of the intrusions. The presence of three compositionally different subvolcanic bodies with intrusive hyaloclastite and peperite envelopes indicate, not only that all these intrusions occurred in a short period of time (probably less than 2-3 Ma), but also that the volcaniciclastic pile suffer little or none compaction nor consolidation during that time. The presence of three

  18. Contribution of hydrochemical and geoelectrical approaches to investigate salinization process and seawater intrusion in the coastal aquifers of Chaouia, Morocco.

    Science.gov (United States)

    Najib, Saliha; Fadili, Ahmed; Mehdi, Khalid; Riss, Joëlle; Makan, Abdelhadi

    2017-03-01

    This study aims to identify groundwater salinization origin and to determine seawater intrusion extension toward the inland in Chaouia, Morocco. To reach these objectives, firstly, 46 groundwater samples were analyzed for major chemical elements during January 2012 and, secondly, 10 electrical resistivity tomography (ERT) profiles were performed perpendicularly to the coastal fringe. Statistical analysis provided the distinction between three Clusters reflecting different hydrochemical processes. Cluster I and Cluster II-a showed a high water electrical conductivity (EC) (from 2.3 to 11.2mS/cm) with the dominance of Na + (668mg/L on average) and Cl - (1735mg/L on average) ions as a consequence of seawater intrusion. However, Cluster II-b presented low ECs (from 0.5 to 1.7mS/cm) and Ca 2+ (99.6mg/L on average) and HCO 3 2- (235.2mg/L on average) ions dominance. Water chemistry in these wells was controlled by water-rock interaction, cation exchange, and anthropogenic activities. The Hydrochemical Facies Evolution Diagram highlighted the succession of different water facies developed between intrusion and freshening phases. The formation of Na-HCO 3 facies, which characterizes the last facies of freshening phase, followed the succession of Na-Cl, MixNa-MixCl, MixCa-MixCl, MixCa-MixHCO 3 , and Na-HCO 3 . In contrast, Na-Cl facies formation, which characterizes the last facies of intrusion phase, followed the evolution of Ca-HCO 3 , Ca-MixHCO 3 , Ca-MixCl, MixCa-MixCl, MixCa-Cl, and Na-Cl. Moreover, the obtained ERT results allowed determining the extent of different hydrochemical facies and provided more details about seawater intrusion extension. The conductive level assigned to seawater contamination showed a resistivity less than 36Ω.m, which remains limited to 3000m from the ocean, where Na-Cl water type dominates. The seawater intrusion depth varied between 5 and 40m from the surface. Overall, this original study in Chaouia region demonstrated the effectiveness

  19. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  20. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  1. High-resolution 40Ar/39Ar chronology of multiple intrusion igneous complexes

    Science.gov (United States)

    Foland, K. A.; Chen, J.-F.; Linder, J. S.; Henderson, C. M. B.; Whillans, I. M.

    1989-06-01

    The Mount Brome complex of the Monteregian province of southern Quebec, Canada, consits of several major intrusions ranging compositionally from gabbro to syenite. The relative ages of these intrusives have been investigated with high-resolution 40Ar/39Ar analyses, including a specially designed irradiation configuration to cancel the effects of fluence gradients. Small yet distinct apparent age differences are observed. While a number of analytical and geological factors could be proposed to explain the small variations, evaluation of these suggests the age differences reflect those in emplacement times. The gabbro and nepheline diorite were emplaced within a short span 123.1 Ma ago. Generally more evolved lithologies (biotite monzodiorite, pulaskite, nordmarkite) appear to have been emplaced within a restricted interval 1.4±0.3 Ma later. Whole-rock Rb-Sr systematics do not give acceptable isochrons because of significant scatter interpreted to reflect initial 87Sr/86Sr heterogeneities resulting from crustal contamination. Considering the variations in initial ratio, the Rb-Sr data are consistent with the 40Ar/39Ar age.

  2. The crust role at Paramillos Altos intrusive belt: Sr and Pb isotope evidence

    International Nuclear Information System (INIS)

    Ostera, H.A.; Linares, E; Haller, M.J; Cagnoni, M.C

    2001-01-01

    Paramillos Altos Intrusive Belt (PAIB) (Ostera, 1996) is located in the thick skinned folded-thrust belt of Malargue, southwestern Mendoza, Argentina. Geochemical, geochronologic and isotopic studies were carried out in it (Ostera 1996, 1997, Ostera et al. 1999; Ostera et al. 2000) and these previous papers suggested a minor involvement of the crust in the genesis of the PAIB. According with Ostera et al. (2000) it is composed by stocks, laccoliths, dykes and sills which range in composition from diorites to granodiorites, and from andesites to rhyolites, and divided in five Members, which range in age from Middle Miocene to Early Miocene: a- Calle del Yeso Dyke Complex (CYDC), with sills and dykes of andesitic composition (age: 20±2 Ma). b- Puchenque-Atravesadas Intrusive Complex (PAIC), composed by dykes and stocks ranging from diorites to granodiorites (age: 12.5±1 Ma). c- Arroyo Serrucho Stock (SAS), an epizonal and zoned stock, with four facies, with K/Ar and Ar/Ar dates of 10±1 and 9.5±0.5 Ma. d- Portezuelo de los Cerros Bayos (PCB), that includes porphyritic rocks of rhyolitic composition, of 7.5±0.5 Ma. e- Cerro Bayo Vitrophyres (CBV), with andesitic sills and dykes (age: 4.8±0.2 Ma). We present in this paper new Sr and Pb isotopes data that constrain the evolution of the PAIB (au)

  3. The undersea location of the Swedish Final Repository for reactor waste, SFR - human intrusion aspects

    International Nuclear Information System (INIS)

    Eng, T.

    1989-01-01

    The Swedish Final Repository for reactor waste, SFR, is built under the Baltic sea close to the Forsmark nuclear power plant. Sixty metres of rock cover the repository caverns under the seabed. The depth of the Baltic sea is about 5-6 m at this location. A human intrusion scenario that in normal inland locations has shown to be of great importance, is a well that is drilled through or in the close vicinity of the repository. Since the land uplift in the SFR area is about 6 mm/year the undersea location of SFR ensures that no well will be drilled at this location for a considerable time while the area is covered by the Baltic sea

  4. Characterization of crystalline rocks in the Lake Superior region, USA: implications for nuclear waste isolation

    International Nuclear Information System (INIS)

    Sood, M.K.; Flower, M.F.J.; Edgar, D.E.

    1984-01-01

    The Lake Superior region (Wisconsin, the Upper Peninsula of Michigan, and Minnesota) contains 41 Precambrian crystalline rock complexes comprising 64 individual but related rock bodies with known surface exposures. Each complex has a map area greater than 78 km 2 . About 54% of the rock complexes have areas of up to 500 km 2 , 15% fall between 500 km 2 and 1000 km 2 , 19% lie between 1000 km 2 and 2500 km 2 , and 12% are over 2500 km 2 . Crystalline rocks of the region vary widely in composition, but they are predominantly granitic. Repeated thermo-tectonic events have produced early Archean gneisses, migmatites, and amphibolites with highly tectonized fabrics that impart a heterogeneous and anisotropic character to the rocks. Late Archean rocks are usually but not invariably gneissose and migmatitic. Proterozoic rocks of the region include synorogenic (foliated) granitic rocks, anorogenic (non-foliated) granites, and the layered gabbro-anorthosite-troctolite intrusives of the rift-related Keweenawan igneous activity. Compared with the Archean rocks of the region, the Proterozoic bodies generally lack highly tectonized fabrics and have more definable contacts where visible. Anorogenic intrusions are relatively homogeneous and isotropic. On the basis of observed geologic characteristics, postorogenic and anorogenic crystalline rock bodies located away from recognized tectonic systems have attributes that make them relatively more desirable as a possible site for a nuclear waste repository in the region. This study was conducted at Argonne National Laboratory under the sponsorship of the US Department of Energy through the Office of Crystalline Repository Development at Battelle Memorial Institute, Columbus, Ohio. 84 references, 4 figures, 3 tables

  5. Intrusion signature creation via clustering anomalies

    Science.gov (United States)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  6. A Review of Vapor Intrusion Models

    Science.gov (United States)

    Yao, Yijun; Suuberg, Eric M.

    2013-01-01

    A complete vapor intrusion (VI) model, describing vapor entry of volatile organic chemicals (VOCs) into buildings located on contaminated sites, generally consists of two main parts-one describing vapor transport in the soil and the other its entry into the building. Modeling the soil vapor transport part involves either analytically or numerically solving the equations of vapor advection and diffusion in the subsurface. Contaminant biodegradation must often also be included in this simulation, and can increase the difficulty of obtaining a solution, especially when explicitly considering coupled oxygen transport and consumption. The models of contaminant building entry pathway are often coupled to calculations of indoor air contaminant concentration, and both are influenced by building construction and operational features. The description of entry pathway involves consideration of building foundation characteristics, while calculation of indoor air contaminant levels requires characterization of building enclosed space and air exchange within this. This review summarizes existing VI models, and discusses the limits of current screening tools commonly used in this field. PMID:23360069

  7. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  8. Maurim intrusive suite: a calc-alkacic batholite zoned of catarinense shield

    International Nuclear Information System (INIS)

    Wildner, W.; Ramgrab, G.E.; Zanini, L.F.P.; Branco, P.M.; Camozzato, E.

    1990-01-01

    The geological survey of the Florianopolis Sheet (SG.22-Z-D-V) identified and characterized a calc-alkacic multi-intrusive and polydiapiric suite that occurs as a granitic batholite roughly concentric in texture and composition. This co-magmatic plutonic sequence is intrusive in the granite-gneissic basement of amphibolite facies, with which it was formerly confounded. The initial magmatic terms, put-in-place at the marginal portions of the batholite, are represented by quartz-diorites and tonalites (Forquilha Tonalites), followed by granodiorites (alto da Varginha Granodiorite), granodiorites to monzonites (Rio das Antas Granite) and completed by an inner portions of porphyritic monzonites (Sao Pedro de Alcantara Granite). The identifications of the compositional zoning that results from the development of the magmatic chamber is based on the examination of 74 rock samples that were analysed for major and minor oxides and trace elements (Ba, F, Li, Mo, Sn, W, Y, Rb, Nb, Zr and Sr). The treatment of these data shows the portions where mantle fractions predominate as well as the others where crustal meltings dominate, what demonstrates an origin by in situ differentiation processes, fractioning and different degrees of magmatic mixing. Geochronologic dating by Rb/Sr, K/Ar and U/Pb methods show isochronic and conventional ages of 600 to 700 m.y. that roughly are in accord with the temporal progress towards the younger felsic phases, putting this suite in the Upper Proterozoic age. The initial Sr sup(87) / Sr sup(86) ratios, around 0.710, point to a crustal origin with variable mantle contribution to these rocks. (author)

  9. Management of aquifer recharge in Lebanon by removing seawater intrusion from coastal aquifers.

    Science.gov (United States)

    Masciopinto, Costantino

    2013-11-30

    This study investigates the feasibility of management of aquifer recharge (MAR) in Lebanon by designing well barriers to remove seawater intrusion from the fractured carbonate aquifers. Groundwater flow and saltwater/freshwater 50% sharp interface have been modeled along the coastal area using the Ghyben-Herzberg theory. The groundwater flow simulations have been supported by field transmissivity estimations and depth measurements carried out on 44 wells during 2003. Results have shown the seawater intrusion in coastal aquifers at Jieh and Damour regions. Three well-injection barriers have been proposed. The water volumes for recharge and the barrier positions have been defined by means of groundwater flow simulations. MAR can provide a valuable contribution to colloid (even pathogen) removal from injectant water, although during water infiltration in subsoil the reduction of aquifer permeability causes clogging. A simple new model for estimating the soil-rock permeability reduction due to the well clogging has been presented. The MAR, including the soil aquifer treatment at Damour and Jieh regions, has been studied by considering aquifer transmissivity (and soil porosity) reduction caused by clogging. Furthermore, the appropriate mixing of the injectant water by using reclaimed water, groundwater and surface water can be simulated using the proposed models. The time required to achieve 5% of rock permeability reduction at the proposed well barriers ranged from 71 to 935 d, by changing water quality and flow rate for recharge. This study can assist regional governments with water management in areas affected by scarcity of freshwater by implementing appropriate well-barrier projects. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Natural analogue for storage of radwaste in crystalline rocks

    International Nuclear Information System (INIS)

    Brookins, D.G.; Abashian, M.S.; Cohen, L.H.; Wollenberg, H.A. Jr.

    1982-01-01

    The Bryan-Eldora stock (Colorado) intruded the Precambrian Idaho Springs Formation metamorphic rocks 58 million years ago. Geochronologic-geochemical work by Hart et al. [S.R. Hart et al., in Radiometric Dating for Geologists, E.I. Hamilton, R.S. Farquhar, eds. (Wiley-Interscience, New York, 1968) pp. 73-110] has demonstrated that the heat from the cooling intrusive rocks was sufficient to affect mineral isotopic systematics up to 2000 m from the contact, and the nature of these isotopic perturbations can be explained by a simple diffusion model in turn based on various heat flow models. Our new studies are focused on elemental exchange between stock and intruded rock as a function of distance from the contact; the assumption is made that the stock is a very large, high heat source analogous to a waste form emplaced in the metamorphic rocks without benefit of canister or engineered backfill. Data for U, Th and the REE indicate actinide and lanthanide immobility except perhaps in the 0 to 2m contact zone where some infiltration of the country rocks by stock-derived fluids occurred. Beyond 4m no stock-derived U, Th, REE or *Pb are noted. Further, whole rock Rb-Sr and stable O isotopic data indicate conductive cooling as opposed to convective, water-induced cooling. The intruded rocks possess low porosity and permeability; this helped prevent elemental migration during the 10 5 to 10 6 years of stock crystallization. The petrographic and geochemical studies show that the Idaho Springs (or equivalent) metamorphic rocks are well suited for radwaste storage. 1 figure, 1 table

  11. Simulating the influence of groundwater table fluctuation on vapor intrusion

    Science.gov (United States)

    Huo, J.

    2017-12-01

    The migration of volatile chemicals from groundwater to an overlying building is a commonly existing phenomenon around the world. Due to the distinction of hydrologic conditions among vapor intrusion sites, it is necessary to consider the effect of dominant hydrologic factors in order to obtain a precise site evaluation and a health risk assessment during the screening process. This study mainly discusses the impact of groundwater table fluctuation and other hydrological factors including porosity, permeability and soil moisture on the vapor intrusion transport. A two-dimensional model is configured to inject different typical volatile organic contaminants from EPA's Vapor Intrusion Database. Through quantifying the contaminant vapor concentration attenuation factors under the effect of groundwater table fluctuation, this study provides suggestions for indoor air sample and vapor intrusion assessment.

  12. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  13. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  14. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  15. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  16. Novel Non-Intrusive Vibration Monitoring System for Turbopumps Project

    Data.gov (United States)

    National Aeronautics and Space Administration — ASRI proposes to develop an advanced and commercially viable Non-Intrusive Vibration Monitoring System (NI-VMS) which can provide effective on-line/off-line engine...

  17. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  18. Slick: An Intrusion Detection System for Virtualized Storage Devices

    NARCIS (Netherlands)

    Bacs, A.; Giuffrida, C.; Grill, B.; Bos, H.J.; Ossowski, Sascha

    2016-01-01

    Cloud computing is rapidly reshaping the server administration landscape. The widespread use of virtualization and the increasingly high server consolidation ratios, in particular, have introduced unprecedented security challenges for users, increasing the exposure to intrusions and opening up new

  19. Information Assurance Intrusion Detection Sensor Database Design: Lessons Learned

    National Research Council Canada - National Science Library

    Spink, Brian

    2001-01-01

    Current architectural trends in information assurance for the DOD focuses on the fusion and correlation of large volumes of data collected across several intrusion detection systems and boundary devices...

  20. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  1. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  2. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  3. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  4. Classification of Intrusion Detection Dataset using machine learning Approaches

    OpenAIRE

    Neethu B

    2012-01-01

    The paper describes about a method of intrusion detection that uses machine learning algorithms. Here we discuss about the combinational use of two machine learning algorithms called Principal Component Analysis and Naive Bayes classifier. The dimensionality of the dataset is reduced by using the principal component analysis and the classification of the dataset in to normal and attack classes is done by using Naïve Bayes Classifier. The experiments were conducted on the intrusion detection d...

  5. Space Weathering of Rocks

    Science.gov (United States)

    Noble, Sarah

    2011-01-01

    Space weathering discussions have generally centered around soils but exposed rocks will also incur the effects of weathering. On the Moon, rocks make up only a very small percentage of the exposed surface and areas where rocks are exposed, like central peaks, are often among the least space weathered regions we find in remote sensing data. However, our studies of weathered Ap 17 rocks 76015 and 76237 show that significant amounts of weathering products can build up on rock surfaces. Because rocks have much longer surface lifetimes than an individual soil grain, and thus record a longer history of exposure, we can study these products to gain a deeper perspective on the weathering process and better assess the relative impo!1ance of various weathering components on the Moon. In contrast to the lunar case, on small asteroids, like Itokowa, rocks make up a large fraction of the exposed surface. Results from the Hayabusa spacecraft at Itokowa suggest that while the low gravity does not allow for the development of a mature regolith, weathering patinas can and do develop on rock surfaces, in fact, the rocky surfaces were seen to be darker and appear spectrally more weathered than regions with finer materials. To explore how weathering of asteroidal rocks may differ from lunar, a set of ordinary chondrite meteorites (H, L, and LL) which have been subjected to artificial space weathering by nanopulse laser were examined by TEM. NpFe(sup 0) bearing glasses were ubiquitous in both the naturally-weathered lunar and the artificially-weathered meteorite samples.

  6. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  7. Saltwater intrusion in coastal regions of North America

    Science.gov (United States)

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  8. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  9. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Directory of Open Access Journals (Sweden)

    K. Iyer

    2018-01-01

    Full Text Available Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene–Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary

  10. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Science.gov (United States)

    Iyer, Karthik; Svensen, Henrik; Schmid, Daniel W.

    2018-01-01

    Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene-Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM)-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC) content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary column through time and

  11. Pb, Sr and Nd isotope geological characteristics and its evolution of Jianchaling rock

    International Nuclear Information System (INIS)

    Pang Chunyong; Chen Minyang; Xu Wenxin

    2003-01-01

    It has been a long time debatable subject on the raw material source and its genesis of Jianchaling ultrabasic rock, because the original rock phases, the original mineral compositions, texture and structure, even part of the chemical components of the rocks had been changed completely after many periods and phases of metamorphism. According to the content of Pb, Rb, Sr, Nd elements and their Pb, Sr, Nd isotope compositions of the rocks, together with the isotope geological age of late magmatic activities, the authors analyze the evolution of Pb, Sr, Nd isotope compositions, The inferred initiate Nd isotope ratio of ultrabasic rocks is 0.510233, lower than that of meteorite unity at a corresponding period, its ε Nd(T)>O; The initiate Sr ratios inferred by the isotope geological age ranges from 0.702735 to 0.719028; Projecting the lead isotope compositions on the Pb tectonic evolution model, the result indicates that the raw material of Jianchaling ultrabasic rock coming from the deplete upper mantle. The ultrabasic magma which enrich of Mg, Ni and less S intruded the crust and formed the Jianchaling ultrabasic rock at late Proterozoic era (927 Ma±). The forming time of serpentinite is mostly equal to the granitoid intruding time, showing the intrusion o flate acidic magma caused a large scale alteration of the ultrabasic rocks and formed the meta-ultrabasic phase rock observed today. (authors)

  12. Rock kinoekraanil / Katrin Rajasaare

    Index Scriptorium Estoniae

    Rajasaare, Katrin

    2008-01-01

    7.-11. juulini kinos Sõprus toimuval filminädalal "Rock On Screen" ekraanile jõudvatest rockmuusikuid portreteerivatest filmidest "Lou Reed's Berlin", "The Future Is Unwritten: Joe Strummer", "Control: Joy Division", "Hurriganes", "Shlaager"

  13. Rock Equity Holdings, LLC

    Science.gov (United States)

    The EPA is providing notice of an Administrative Penalty Assessment in the form of an Expedited Storm Water Settlement Agreement against Rock Equity Holdings, LLC, for alleged violations at The Cove at Kettlestone/98th Street Reconstruction located at 3015

  14. Pop & rock / Berk Vaher

    Index Scriptorium Estoniae

    Vaher, Berk, 1975-

    2001-01-01

    Uute heliplaatide Redman "Malpractice", Brian Eno & Peter Schwalm "Popstars", Clawfinger "A Whole Lot of Nothing", Dario G "In Full Color", MLTR e. Michael Learns To Rock "Blue Night" lühitutvustused

  15. Solid as a rock

    International Nuclear Information System (INIS)

    Pincus, H.J.

    1984-01-01

    Recent technologic developments have required a more comprehensive approach to the behavior of rock mass or rock substance plus discontinuities than was adequate previously. This work considers the inherent problems in such operations as the storage of hot or cold fluids in caverns and aquifers, underground storage of nuclear waste, underground recovery of heat from hydrocarbon fuels, tertiary recovery of oil by thermal methods, rapid excavation of large openings at shallow to great depths and in hostile environments, and retrofitting of large structures built on or in rock. The standardization of methods for determining rock properties is essential to all of the activities described, for use not only in design and construction but also in site selection and post-construction monitoring. Development of such standards is seen as a multidisciplinary effort

  16. FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    OpenAIRE

    Borgohain, Rajdeep

    2012-01-01

    With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion dete...

  17. Innovative rock bed construction

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.

    1983-06-01

    A general discussion of the use of rock beds for heating and cooling thermal storage is particularized for design and construction in Phoenix, Arizona. The rock bed parameters for three two-story condominium apartments constructed in 1982 are discussed, including sizing criteria and original construction details. A revised construction method using gabions that are self-supporting chain link cylinders provided a much more economical construction method as well as other advantages of speed and structural flexibility.

  18. Rock and Soil Rheology

    Science.gov (United States)

    Cristescu, Nicolae; Ene, Horia I.

    The first part of the volume contains theoretical considerations of the physical properties of soils and rocks. Articles on the mechanical and kinematical behavior of rocks as well as mathematical models are the base for the understanding of the physical properties of natural systems. In the second part articles deal with experiments and applications regarding creep deformation of clay, underground cavities, tunnels and deformation of sand and lamistrine sediments.

  19. Evidence for stratification of basic, silicic, and hybrid magmas in the Newark Island layered intrusion, Main, Labrador

    Science.gov (United States)

    Wiebe, R. A.

    1987-04-01

    The Newark Island layered intrusion (NILI), located in the Nain anorthosite complex of Labrador, developed through a complex sequence of fractional crystallization, periodic replenishment of both basic and silicic magmas, and magma mixing. It is subdivided into a lower layered series and an upper hybrid series. Three large transgressive trough structures cut these cumulate rocks at different levels. Each trough is lined by granitic rocks and filled mainly by chilled mafic pillows that grade inward to massive olivine gabbro. Each of these troughs originated as a large feeder dike of granitic magma into the NILI chamber when it was floored by basic magma. This resident basic magma collapsed downward into the granitic feeder and formed chilled pillows. These pillows preserve the compositions of basic magma existing in the chamber at the time of granite replenishment. Pillows in the lowest trough show a wide compositional range and provide a direct record of compositional stratification of a magma chamber related to a layered intrusion. Note: Additional material for this article is Supplementary Data 8717, available on request from the GSA Documents Secretary (see footnote 1).

  20. Rare earth mineralisation in the Cnoc nan Cuilean intrusion of the Loch Loyal Syenite Complex, northern Scotland

    Science.gov (United States)

    Walters, A. S.; Hughes, H. S. R.; Goodenough, K. M.; Gunn, A. G.; Lacinska, A.

    2012-04-01

    Due to growing global concerns about security of rare earth element (REE) supply, there is considerable interest in identifying new deposits and in understanding the processes responsible for their formation. Ongoing studies by BGS on potential indigenous resources have focused on the Caledonian alkaline intrusive complexes of north-west Scotland. The highest values of total rare earth oxide (TREO) have been found in the Cnoc nan Cuilean intrusion of the Loch Loyal Complex in Sutherland. The Loch Loyal Syenite Complex comprises three intrusions: Ben Loyal, Beinn Stumanadh and Cnoc nan Cuilean. The Cnoc nan Cuilean intrusion, which covers an area of about 3 km2, can be subdivided into two zones: a Mixed Syenite Zone (MSZ) and a later Massive Leucosyenite Zone (MLZ). Evidence from field mapping and 3D-modelling suggests that the melasyenites were passively emplaced to form a lopolith concordant with the Moine and Lewisian country rocks. A later episode of leucosyenitic magmatism caused mixing and mingling with the melasyenite forming the MSZ. Continued intrusion of leucosyenite melts then formed the MLZ [1]. The melasyenites are enriched in TREO relative to the leucosyenites with average values of 3800 ppm and 1400 ppm respectively. The highest contents, up to 20 000 ppm TREO, are found in narrow biotite-magnetite-rich veins identified in a single stream section near the eastern margin of the intrusion. All lithologies are light rare earth element (LREE) dominated with high concentrations of Ba and Sr and low levels of Nb and Ta. Various REE-bearing minerals are present but allanite is dominant, being present in all major magmatic lithologies and the biotite-magnetite veins. Three generations of allanite have been identified: a late-magmatic phase rimming apatite; allanite micro veinlets cross-cutting the syenite; and a third phase only observed in the biotite-magnetite veins. TREO concentrations of the different allanite generations are similar, averaging 22%. The

  1. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  2. Petrogenesis of the Dalongkai ultramafic-mafic intrusion and its tectonic implication for the Paleotethyan evolution along the Ailaoshan tectonic zone (SW China)

    Science.gov (United States)

    Liu, Huichuan; Wang, Yuejun; Zi, Jian-Wei

    2017-06-01

    Layered ultramafic-mafic intrusions are usually formed in an arc/back-arc or intra-plate tectonic environment, or genetically related to a mantle plume. In this paper, we report on an ultramafic-mafic intrusion, the Dalongkai intrusion in the Ailaoshan tectonic zone (SW China), whose occurrence is closely associated with arc/back-arc magmatic rocks. The Dalongkai intrusion is composed of plagioclase-lherzolite, hornblende-peridotite, lherzolite and wehrlite at the bottom, cumulate plagioclase-pyroxenite at the middle part, changing to fine-grained gabbro towards the upper part of the intrusion, forming layering structure. Zircons from the plagioclase-pyroxenites and gabbros yielded U-Pb ages of 272.1 ± 1.7 Ma and 266.4 ± 5.8 Ma, respectively. The plagioclase-pyroxenites show cumulate textures, and are characterized by high MgO (25.0-28.0 wt.%; mg# = 80.6-82.3), Cr (1606-2089 ppm) and Ni (893-1203 ppm) contents, interpreted as early cumulate phases. By contrast, the gabbros have relatively lower mg# values (56.3-62.7), and Cr (157-218 ppm) and Ni (73-114 ppm) concentrations, and may represent frozen liquids. The plagioclase-pyroxenites and gabbros share similar chondrite-normalized REE patterns and primitive mantle-normalized trace element profiles which are analogous to those of typical back-arc basin basalts. The εNd(t) values for both rock types range from +2.20 to +4.22. These geochemical and isotopic signatures suggest that the Dalongkai ultramafic-mafic rocks originated from a MORB-like mantle source metasomatized by subduction-related, sediment-derived fluids. Our data, together with other geological evidence, indicate that the emplacement of the Dalongkai ultramafic-mafic intrusion most likely occurred in a back-arc extensional setting associated with subduction of the Ailaoshan Paleotethyan branch ocean during the Middle Permian, thus ruling out the previously speculated linkage to the Emeishan mantle plume, or to an intra-continental rift.

  3. Intrusão dentária utilizando mini-implantes Orthodontic intrusion with mini-implant anchorage

    Directory of Open Access Journals (Sweden)

    Telma Martins de Araújo

    2008-10-01

    Full Text Available INTRODUÇÃO: dentre os diversos tipos de movimentos dentários induzidos ortodonticamente, o de intrusão é, sem dúvida, um dos mais difíceis de serem conseguidos. A mecânica intrusiva convencional, apesar de viável, é complexa, no que diz respeito ao controle de seus efeitos colaterais. Isso, em grande parte, refere-se à dificuldade em se obter uma ancoragem satisfatória. Neste contexto, os mini-implantes, por oferecerem efetiva ancoragem esquelética, têm se mostrado de extrema valia para os ortodontistas, tornando a intrusão, tanto de dentes anteriores quanto posteriores, um procedimento cada vez mais simples, do ponto de vista mecânico. OBJETIVO: pretende-se, então, neste artigo, descrever e demonstrar, clinicamente, as diversas possibilidades de utilização dos mini-implantes como recurso de ancoragem para o movimento de intrusão.INTRODUCTION: Among all different varieties of orthodontically induced tooth movement, intrusion is, without doubt, one of the most difficult movements to be reached. Conventional intrusive biomechanics, although possible, may lead to undesirable side-effects. These events, in most cases, are related to the difficulty in obtaining an efficient anchorage unit. Then, mini-implants, because of their high success rates of effective skeletal anchorage, are valuable devices to orthodontists, transforming the intrusion movement, both at the anterior and the posterior regions, a more and more uncomplicated biomechanical procedure. AIM: to describe and show, clinically, different ways of using mini-implants as an anchorage system to intrusion movement.

  4. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  5. Seismic signature of active intrusions in mountain chains.

    Science.gov (United States)

    Di Luccio, Francesca; Chiodini, Giovanni; Caliro, Stefano; Cardellini, Carlo; Convertito, Vincenzo; Pino, Nicola Alessandro; Tolomei, Cristiano; Ventura, Guido

    2018-01-01

    Intrusions are a ubiquitous component of mountain chains and testify to the emplacement of magma at depth. Understanding the emplacement and growth mechanisms of intrusions, such as diapiric or dike-like ascent, is critical to constrain the evolution and structure of the crust. Petrological and geological data allow us to reconstruct magma pathways and long-term magma differentiation and assembly processes. However, our ability to detect and reconstruct the short-term dynamics related to active intrusive episodes in mountain chains is embryonic, lacking recognized geophysical signals. We analyze an anomalously deep seismic sequence (maximum magnitude 5) characterized by low-frequency bursts of earthquakes that occurred in 2013 in the Apennine chain in Italy. We provide seismic evidences of fluid involvement in the earthquake nucleation process and identify a thermal anomaly in aquifers where CO 2 of magmatic origin dissolves. We show that the intrusion of dike-like bodies in mountain chains may trigger earthquakes with magnitudes that may be relevant to seismic hazard assessment. These findings provide a new perspective on the emplacement mechanisms of intrusive bodies and the interpretation of the seismicity in mountain chains.

  6. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  7. Orthodontic intrusive movement to reduce infrabony defects in periodontal pacients

    Directory of Open Access Journals (Sweden)

    Aldrieli Regina Ambrósio

    2008-01-01

    Full Text Available The adult tends to be an excellent orthodontic patient, because he/she is motivated and cooperative. Nevertheless, many adult patientspresent periodontal problems. Intrusive movement is usually necessary against an area with infrabony defects, and in order for treatmentto be successful, it is necessary for all related aspects to be well understood. The aim of this study was to discuss the feasibility and efficacy of orthodontic intrusion as a means of reducing infrabony defects caused by periodontal disease. The methodology used was reviewed in the literature, from which articles were selected using the MEDLINE, LILACS and BBO databases. After periodontal treatment and maintenance with suitable bacterial plaque control has been performed, orthodontic treatment with intrusive tooth movement can be performed in case of pathological tooth migration and extrusion. The segmented arch technique is the most indicated for intruding teeth with infrabony defects because it is capable of developing light and continuous forces. Furthermore, although studies did not confirm, they suggested that orthodontic intrusion could lead to the formation of new periodontal support tissue. With a multidisciplinary approach, it is possible to successfully perform intrusion movements in teeth that present infrabony defects, provided that periodontal inflammation has been treated and the patient presents an excellent level of plaque control. Among the benefits of this approach are: better appearance, better access to dental hygiene, restitution of incisal occlusion and reduction in non axial load.

  8. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-01-01

    Study Objectives: To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Methods: Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. Results: The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Conclusions: Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. Citation: Kleim B, Wysokowsky J, Schmid N, Seifritz E, Rasch B. Effects of sleep after experimental trauma on intrusive emotional memories. SLEEP 2016;39(12):2125–2132. PMID:27748249

  9. Recovery of freshwater marsh vegetation after a saltwater intrusion event.

    Science.gov (United States)

    Flynn, K M; McKee, K L; Mendelssohn, I A

    1995-07-01

    Greenhouse mesocosms of freshwater marsh vegetation were exposed to a simulated saltwater intrusion event followed by a recovery period during which water levels and interstitial water salinity were adjusted over a range of conditions. Virtually all above-ground vegetation, including the three dominant species, Sagittaria lancifolia L., Leersia oryzoides (L.) Swartz, and Panicum hemitomon Schultes, was killed by the initial saltwater intrusion event. P. hemitomon did not recover, but S. lancifolia and L. oryzoides, as well as many of the other species initially present, exhibited some ability to recover depending on post-saltwater intrusion conditions. Increasingly harsh recovery conditions (for freshwater marsh vegetation), including more reduced soil conditions, higher interstitial salinities, and higher interstitial sulfide concentrations were associated with decreased live above-ground biomass and species richness. The effect of elevated salinity on vegetative recovery became more pronounced under flooded conditions. This experiment illustrates that the response of a freshwater marsh community to the long-term disturbance effect of a transient saltwater intrusion event will be strongly influenced by post-intrusion salinity and water levels.

  10. A low-δ18O intrusive breccia from Koegel Fontein, South Africa: Remobilisation of basement that was hydrothermally altered during global glaciation?

    Science.gov (United States)

    Olianti, Camille A. E.; Harris, Chris

    2018-02-01

    The Cretaceous Koegel Fontein igneous complex is situated on the west coast of South Africa, and has a high proportion of rocks with abnormally low δ18O values. The rocks with the lowest δ18O values (- 5.2‰) belong to intrusive matrix-supported breccia pipes and dykes, containing a variety of clast types. The breccia rocks range in SiO2 from 44 to 68 wt% and their whole-rock δ18O values vary between - 5.2‰ and + 1.8‰. The major and trace element composition of the breccia rocks is consistent with them containing variable proportions of clasts of Cretaceous intrusive rocks and basement gneiss and the matrix being fluidized material derived from the same source as the clasts. Based on the nature of the clasts contained in the breccia, it was emplaced just prior to intrusion of the main Rietpoort Granite at 134 Ma. All components of the breccia have low δ18O value and, at least in the case of the gneiss clasts, this predates incorporation in the fluidized material. Although the early Cretaceous appears to have been a period of cold climate, it is unlikely that the δ18O values of ambient precipitation ( - 10‰) would have been low enough to have generated the required 18O-depletion. The basement gneiss was probably 2-3 km below the Cretaceous surface, minimizing the possibility of interaction with isotopically unmodified meteoric water, and there is no evidence for foundered blocks of cover rocks in the breccia. There is, therefore, no evidence for downwards movement of material. We favour a model where basement gneiss interacted with extremely 18O-depleted fluid during crustal reworking at 547 Ma, a time of global glaciation. Low-δ18O metamorphic fluids produced by dehydration melting of 18O-depleted gneiss became trapped and, as the fluid pressure increased, failure of the seal resulted in explosive upwards movement of fluidized breccia. Migration was along pre-existing dykes, incorporating fragments of these dykes, as well as the country rock gneiss.

  11. Geochemistry of metavolcanics and granitic intrusive from western ...

    African Journals Online (AJOL)

    The western margin of northern Afar Depression constitutes various rock units of Neoproterozoic basement complex. Major oxide data of metavolcanic and granitoid rock samples from basement complex indicate significant variation in the concentration of major oxides (e.g. Fe2O3, TiO2, CaO, MgO). Metavolcanic rocks of ...

  12. Distress and Recurrence of Intrusive Thoughts in Younger and Older Adults

    Science.gov (United States)

    Magee, Joshua C.; Teachman, Bethany A.

    2011-01-01

    The current study incorporated a lifespan perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults, despite not differing in the actual recurrence of the intrusive thought. With regard to distress, ooHAcrosslder adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts. PMID:21707184

  13. Distress and recurrence of intrusive thoughts in younger and older adults.

    Science.gov (United States)

    Magee, Joshua C; Teachman, Bethany A

    2012-03-01

    The current study incorporated a life span perspective into existing theories of intrusive thoughts to examine age-related differences in the difficulty controlling intrusive thoughts, the distress following intrusive thought recurrences, and the meanings assigned to these recurrences. Younger (N = 51) and older (N = 49) community adults were randomly assigned to suppress (i.e., keep out of mind) or monitor an intrusive thought. Participants rated their positive and negative affect throughout engagement with the intrusive thought, and they also rated the meanings they gave to recurrences of their everyday intrusive thoughts. The results demonstrated that older adults tended to perceive greater difficulty with controlling the intrusive thought than younger adults despite the fact that they did not differ in the actual recurrence of the intrusive thought. With regard to distress, older adults experienced steadier levels of positive affect than younger adults throughout engagement with the intrusive thought. However, older adults also reported greater residual negative affect after engaging with the intrusive thought than younger adults. Finally, older and younger adults appeared to assign meanings to recurrences of intrusive thoughts in line with age-relevant concerns. Specifically, older adults were prone to interpret the recurrence of intrusive thoughts as a sign of cognitive decline, but they were less likely than younger adults to see intrusive thoughts as a sign of moral failure. Together, these results highlight a range of potential risk and protective factors in older adults for experiencing emotion dysregulation after intrusive thoughts.

  14. INTERACTIONS BETWEEN GABBROID AND GRANITOID MAGMAS DURING FORMATION OF THE PREOBRAZHENSKY INTRUSION, EAST KAZAKHSTAN

    Directory of Open Access Journals (Sweden)

    S. V. Khromykh

    2017-01-01

    Full Text Available The paper reports on studies of the Preobrazhensky gabbro‐granitoid intrusion, East Kazakhstan, com‐ posed of the rocks that belong to four phases of intrusion, from quartz monzonites and gabbroids to granite‐ leucogranites. Specific relationships between basite and granitoid rocks are usually classified as the result of interac‐ tions and mixing of liquid magmas, i.e. magma mingling and mixing. Basite rocks are represented by a series from biotite gabbros to monzodiorites. Granitoids rocks are biotite‐amphibole granites. Porphyric granosyenites, com‐ bining the features of both granites and monzodiorites, are also involved in mingling. It is established that the primary granitoid magmas contained granosyenite/quartz‐monzonite and occurred in the lower‐medium‐crust conditions in equilibrium with the garnet‐rich restite enriched with plagioclase. Monzodiorites formed during fractionation of the parent gabbroid magma that originated from the enriched mantle source. We propose a magma interaction model describing penetration of the basite magma into the lower horizons of the granitoid source, which ceased below the viscoplastic horizon of granitoids. The initial interaction assumes the thermal effect of basites on the almost crystal‐ lized granitic magma and saturation of the boundary horizons of the basite magma with volatile elements, which can change the composition of the crystallizing melt from gabbroid to monzodiorite. A ‘boundary’ layer of monzodiorite melt is formed at the boundary of the gabbroid and granitoid magmas, and interacts with granitoids. Due to chemical interactions, hybrid rocks – porphyric granosyenites – are formed. The heterogeneous mixture of monzodiorites and granosyenites is more mobile in comparison with the overlying almost crystallized granites. Due to contraction frac‐ turing in the crystallized granites, the heterogeneous mixture of monzodiorites and granosyenites penetrate into the

  15. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  16. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  17. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been...... developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...

  18. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  19. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Physical model simulations of seawater intrusion in unconfined aquifer

    Directory of Open Access Journals (Sweden)

    Tanapol Sriapai

    2012-12-01

    Full Text Available The objective of this study is to simulate the seawater intrusion into unconfined aquifer near shoreline and to assessthe effectiveness of its controlling methods by using scaled-down physical models. The intrusion controlled methods studiedhere include fresh water injection, saltwater extraction, and subsurface barrier. The results indicate that under natural dynamicequilibrium between the recharge of fresh water and the intrusion well agree with the Ghyben-Herzberg mathematical solution.Fresh water pumping from the aquifer notably move the fresh-salt water interface toward the pumping well, depending on thepumping rates and the head differences (h between the aquifer recharge and the salt water level. The fresh water injectionmethod is more favorable than the salt water extraction and subsurface barrier method. The fresh water injection rate of about10% of the usage rate can effectively push the interface toward the shoreline, and keeping the pumping well free of salinity.

  1. Classification Scheme for Diverse Sedimentary and Igneous Rocks Encountered by MSL in Gale Crater

    Science.gov (United States)

    Schmidt, M. E.; Mangold, N.; Fisk, M.; Forni, O.; McLennan, S.; Ming, D. W.; Sumner, D.; Sautter, V.; Williams, A. J.; Gellert, R.

    2015-01-01

    The Curiosity Rover landed in a lithologically and geochemically diverse region of Mars. We present a recommended rock classification framework based on terrestrial schemes, and adapted for the imaging and analytical capabilities of MSL as well as for rock types distinctive to Mars (e.g., high Fe sediments). After interpreting rock origin from textures, i.e., sedimentary (clastic, bedded), igneous (porphyritic, glassy), or unknown, the overall classification procedure (Fig 1) involves: (1) the characterization of rock type according to grain size and texture; (2) the assignment of geochemical modifiers according to Figs 3 and 4; and if applicable, in depth study of (3) mineralogy and (4) geologic/stratigraphic context. Sedimentary rock types are assigned by measuring grains in the best available resolution image (Table 1) and classifying according to the coarsest resolvable grains as conglomerate/breccia, (coarse, medium, or fine) sandstone, silt-stone, or mudstone. If grains are not resolvable in MAHLI images, grains in the rock are assumed to be silt sized or smaller than surface dust particles. Rocks with low color contrast contrast between grains (e.g., Dismal Lakes, sol 304) are classified according to minimum size of apparent grains from surface roughness or shadows outlining apparent grains. Igneous rocks are described as intrusive or extrusive depending on crystal size and fabric. Igneous textures may be described as granular, porphyritic, phaneritic, aphyric, or glassy depending on crystal size. Further descriptors may include terms such as vesicular or cumulate textures.

  2. Ultrapotassic rocks geology from Salgueiro region, Pernambuco state, Brazil

    International Nuclear Information System (INIS)

    Silva Filho, A.F. da; Guimaraes, I.P.

    1990-01-01

    The Cachoeirinha-Salgueiro belt has Proterozoic age and is located in the Borborema Province, NE Brazil. The ultrapotassic rocks from Salgueiro region intrudes the Cachoeirinha-Salgueiro belt rocks. The ultrapotassics from Salgueiro region constitutes of three units; Serra do Livramento pluton, and two dyke swarms called respectively beige alkali feldspar granites and green alkali feldspar syenite/quartz-syenite. The Serra do Livramento pluton shows E-W direction, boudin shape, width between 0,15 and 2,10 km, and it is intruded into metamorphic rocks and into the Terra Nova complex. Detailed geological mapping at the Serra das Duas Irmas allowed us to establish the dyke swarm chronology. The mapping reveals seven intrusion episodes, into the Terra Nova pluton, of green alkali feldspar syenite/quartz-syenite and five episodes of bege alkali feldspar granite. They alternate between them in space and time, and there are evidence that they were intruded under the tectonic control of the Pernambuco lineament. A systematic whole-rock Rb-Sr geochronology was done in the green alkali feldspar syenite/quartz-syenite, and an age of 514,8 ± 20,3 Ma was obtained. The initial ratio is 0,710615 + 0,000441. The age obtained shows small error and an initial ratio compatible with a strong crustal contamination. (author)

  3. Ultramafic intrusion triggers hydrothermal explosions at Colle Fabbri (Spoleto, Umbria), Italy

    Science.gov (United States)

    Stoppa, Francesco; Rosatelli, Gianluigi

    2009-10-01

    The eroded Colle Fabbri volcano comprises intrusive and extrusive rocks which cover an area of about 10,000 m 2 in the Umbria region, Central Italy. The outcrop is located at the SW boundary of the Umbria Valley Graben (Umbria Region) on an N140 normal fault inside the Intramountain Ultra-Alkaline Province of carbonatite and melilitite rocks of central-southern Italy. A field survey of the outcrop allowed a reconstruction of igneous activity events of this unusual small-scale volcano. It is younger than 0.7 m.y. and rests on Lower Pleistocene conglomerates with intercalated clay beds. A palaeosoil marks the base of the volcanic sequence. It follows several metres of extrusive breccias composed of fragments of thermometamorphosed clay and travertine. Key features of these breccias are mud shells on blocks, plastic mud lumps, slumps, and mechanical injection from one layer into another, as well as plastic and vesiculated, micro-brecciated matrix. The breccias are cemented by a variety of silicate, sulphate, and sulphate-carbonate minerals deposited by intense hydrothermal circulation. The breccias are related to phreatic explosions triggered by the eruption of a superficial hydrothermal system. Up to 1 m thick sill and a dykelet swarm intrude the breccias. In the southern part of the outcrop there is a plug of melilitolitic composition which intrudes the breccias and deforms them upward. A variety of contact breccias is also scattered around the sill and the plug. In some places, hyaloclastite formed when melt invaded water pockets contained in the encasing rocks under hydrostatic pressure conditions. A thermal aureole, which moves up to 10 m away from the contact, is characterised by cordierite-trydimite association, thus indicating high-temperature (>>1000 °C) contact phenomena.

  4. Intrusive upwelling in the Central Great Barrier Reef

    Science.gov (United States)

    Benthuysen, Jessica A.; Tonin, Hemerson; Brinkman, Richard; Herzfeld, Michael; Steinberg, Craig

    2016-11-01

    In the Central Great Barrier Reef, the outer continental shelf has an open reef matrix that facilitates the exchange of waters with the Coral Sea. During austral summer, cool water intrudes onto the shelf along the seafloor. Temperature observations reveal cool, bottom intrusions during a 6 year period from the Queensland Integrated Marine Observing System's Palm Passage mooring. A metric is used to identify 64 intrusion events. These intrusions predominantly occur from October to March including the wet season. During an event, the outer-shelf's near-bottom temperature decreases by 1-3°C typically over 1 week. The near-bottom salinity tends to increase, while near-surface changes do not reflect these tendencies. Intrusion events occur predominantly with either weakening equatorward winds or poleward wind bursts. A regional hydrodynamic model for the Great Barrier Reef captures the timing and amplitude of these intrusions. During intrusion events, isotherms tend to uplift over the continental slope and onto the shelf and the East Australian Current intensifies poleward. Over the shelf, a bottom-intensified onshore current coincides with bottom cooling. For numerous events, the model diagnostics reveal that the cross-shelf flow is dominated by the geostrophic contribution. A vertical circulation tilts the isopycnals upward on the southern side of the passage, causing an along-shelf density gradient and geostrophic onshore flow with depth. While wind fluctuations play a major role in controlling the along-shelf currents, model results indicate that a concurrent topographically induced circulation can assist the onshore spread of cool water.

  5. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Sedimentary Rocks and Dunes

    Science.gov (United States)

    2004-01-01

    25 November 2004 This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) image shows buttes composed of light-toned, sedimentary rock exposed by erosion within a crater occurring immediately west of Schiaparelli Basin near 4.0oS, 347.9oW. Surrounding these buttes is a field of dark sand dunes and lighter-toned, very large windblown ripples. The sedimentary rocks might indicate that the crater interior was once the site of a lake. The image covers an area about 3 km (1.9 mi) wide. Sunlight illuminates the scene from the lower left.

  7. Session: Hard Rock Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Tennyson, George P. Jr.; Dunn, James C.; Drumheller, Douglas S.; Glowka, David A.; Lysne, Peter

    1992-01-01

    This session at the Geothermal Energy Program Review X: Geothermal Energy and the Utility Market consisted of five presentations: ''Hard Rock Penetration - Summary'' by George P. Tennyson, Jr.; ''Overview - Hard Rock Penetration'' by James C. Dunn; ''An Overview of Acoustic Telemetry'' by Douglas S. Drumheller; ''Lost Circulation Technology Development Status'' by David A. Glowka; ''Downhole Memory-Logging Tools'' by Peter Lysne.

  8. An Approach for Cross-Domain Intrusion Detection

    Science.gov (United States)

    2012-01-01

    supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view and manipulate network trace data...multilevel (trusted) components, supported by open source software (i.e., BASE, snort, PostgreSQL and pgpool-II). Our prototype enables an analyst to view...component is implemented by the open source object-relational database system PostgreSQL 0). 4.4.3 Intrusion analysis engine The intrusion analysis

  9. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  10. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  11. A national inventory of seawater intrusion vulnerability for Australia

    Directory of Open Access Journals (Sweden)

    Leanne K. Morgan

    2015-09-01

    New hydrological insights for the region: The combination of methods identified areas of highest risk to SWI including unconfined aquifers at Derby (WA and Esperance (WA, and confined aquifers at Esperance (WA and Adelaide (SA. The combination of analytic and qualitative approaches offers a more comprehensive and less subjective seawater intrusion characterization than arises from applying the methods in isolation, thereby imparting enhanced confidence in the outcomes. Importantly, active seawater intrusion conditions occur in many of Australia’s confined coastal aquifers, obviating the use of the analytical solution, and suggesting that offshore groundwater resources provide significant contributions to these systems.

  12. A feasibility study on the expected seismic AVA signatures of deep fractured geothermal reservoirs in an intrusive basement

    International Nuclear Information System (INIS)

    Aleardi, Mattia; Mazzotti, Alfredo

    2014-01-01

    The deep geothermal reservoirs in the Larderello-Travale field (southern Tuscany) are found in intensively fractured portions of intrusive/metamorphic rocks. Therefore, the geothermal exploration has been in search of possible fracture signatures that could be retrieved from the analysis of geophysical data. In the present work we assess the feasibility of finding seismic markers in the pre-stack domain which may pinpoint fractured levels. Thanks to the availability of data from boreholes that ENEL GreenPower drilled in the deep intrusive basement of this geothermal field, we derived the expected amplitude versus angle (AVA) responses of the vapour reservoirs found in some intensely, but very localized, fractured volumes within the massive rocks. The information we have available limit us to build 1D elastic and isotropic models only and thus anisotropy effects related to the presence of fractures cannot be properly modelled. We analysed the velocities and the density logs pertaining to three wells which reached five deep fractured zones in the basement. The AVA response of the fractured intervals is modelled downscaling the log data to seismic scale and comparing the analytical AVA response (computed with the Aki and Richards approximation) and the AVA extracted from a synthetic common mid point (calculated making use of a reflectivity algorithm). The results show that the amplitude of the reflections from the fractured level is characterized by negative values at vertical incidence and by decreasing absolute amplitudes with the increase of the source to receiver offset. This contrasts with many observations from hydrocarbon exploration in clastic reservoirs where gas-sand reflections often exhibit negative amplitudes at short offsets but increasing absolute amplitudes for increasing source to receiver offsets. Thereby, some common AVA attributes considered in silicoclastic lithologies would lead to erroneous fracture localization. For this reason we propose a

  13. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  14. Waste-rock interactions in the immediate repository

    International Nuclear Information System (INIS)

    McCarthy, G.J.

    1977-01-01

    The high level wastes (HLW's) to be placed underground in rock formations will contain significant amounts of radioactive decay heat for the first hundred-or-so years of isolation. Several physical-chemical changes analogous to natural geochemical processes can occur during this ''thermal period.'' The waste canister can act as a heat source and cause changes in the mineralogy and properties of the surrounding rocks. Geochemically, this is ''contact metamorphism.'' In the event that the canister is corroded and breached, chemical reactions can occur between the HLW, the surrounding rock and possibly the remains of the canister. In a dry repository which has not been backfilled (and thus pressurized) these interactions could be slow at best and with rates decreasing rapidly as the HLW cools. However, significant interactions can occur in years, months or even days under hydrothermal conditions. These conditions could be created by the combination of HLW heat, overburden pressure and water mobilized from the rocks or derived from groundwater intrusion. At the end of the thermal period these interaction products would constitute the actual HLW form (or ''source term'') subject to the low temperature leaching and migration processes under investigation in other laboratories. It is quite possible that these interaction product waste forms will have superior properties compared to the original HLW. Experimental programs initiated at Penn State during the last year aim at determining the nature of any chemical or mineralogical changes in, or interactions between, HLW solids and host rocks under various repository ambients. The accompanying figures describe the simulated HLW forms and the experimental approach and techniques. Studies with basalts as the repository rock are supported by Rockwell Hanford Operations and with shales by the Office of Waste Isolation

  15. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  16. Petrogenesis, geochronology, and tectonic significance of granitoids in the Tongshan intrusion, Anhui Province, Middle-Lower Yangtze River Valley, eastern China

    Science.gov (United States)

    Zhang, Zhi-Yu; Du, Yang-Song; Teng, Chuan-Yao; Zhang, Jing; Pang, Zhen-Shan

    2014-01-01

    The Tongshan copper deposit in Anhui Province is a typical mid-sized skarn and porphyry type deposit in the Anqing-Guichi district along the Middle-Lower Yangtze River Valley, eastern China. The Tongshan intrusion is closely related to this mineralization. The intrusion mainly comprises rocks that are quartz diorite porphyry, quartz monzonite porphyry, and granodiorite porphyry. Plagioclase in these rocks is mostly andesine (An = 31.0-42.9), along with minor oligoclase. Biotite is magnesium-rich [Mg/(Mg + Fe) = 0.52-0.67] and aluminum-poor (Al2O3 = 12.32-14.09 wt.%), and can be classified as magnesio-biotite. Hornblende is TiO2-poor ( 0.60], and is magnesio-hornblende or edenite. The SHRIMP zircon U-Pb age of the quartz monzonite porphyry is 145.1 ± 1.2 Ma, which corresponds to the middle Yanshanian period. Whole-rock geochemical results show that the rocks are silica-rich (SiO2 = 60.23-66.23 wt.%) and alkali-rich (K2O + Na2O = 4.97-8.72 wt.%), and low in calcium (CaO = 2.61-5.66 wt.%). Trace element results show enrichments in large ion lithophile element (e.g., K, Rb, and Ba) and depletions in some high field strength elements (e.g., Nb, Ta, P, and Ti). The total rare earth element (REE) content of the rocks is low (ΣREE 10] and small positive Eu anomalies (average δEu = 1.16). These mineralogical, geochronological, and geochemical results show that the intrusion has a mixed crust-mantle source. The Tongshan intrusion was formed by multiple emplacements of crustally contaminated basaltic magma generated by varying degrees of partial melting of enriched lithospheric mantle and lower crust. Hornblende thermobarometry yielded magmatic crystallization temperatures of 652-788 °C and an average crystallization pressure of 1.4 kbar, which corresponds to a depth of approx. 4.7 km. Biotite thermobarometry yielded similar temperatures and lower pressures of 735-775 °C and 0.6 kbar (depth 2.1 km), respectively. The parental magma had a high oxygen fugacity and was

  17. Mushy magma processes in the Tuolumne intrusive complex, Sierra Nevada, California

    Science.gov (United States)

    Memeti, V.; Paterson, S. R.

    2012-12-01

    Debates continue on the nature of volcanic-plutonic connections and the mechanisms of derivation of large volcanic eruptions, which require large volumes of magma to be readily available within a short period of time. Our focus to understand these magma plumbing systems has been to study the nature of their mid-to upper crustal sections, such as the 1,000 km2, 95-85 Ma old Tuolumne intrusive complex in the Sierra Nevada, California, USA. The Tuolumne intrusive complex is a great example where the magma mush model nicely explains observations derived from several datasets. These data suggest that a magma mush body was present and may have been quite extensive especially at times when the Tuolumne intrusive complex was undergoing waxing periods of magmatism (increased magma input), which alternated with waning periods of magmatism (decreased magma addition) and thus a smaller mush body, essentially mimicking in style periodic flare-ups and lulls at the arc scale. During waxing stages, magma erosion and mixing were the dominant processes, whereas waning stages allowed mush domains to continue to undergo fractional crystallization creating additional compositional variations. Over time, the imprint left behind by previous waxing and waning stages was partly overprinted, but individual crystals successfully recorded the compositions of these earlier magmas. Waxing periods in the Tuolumne intrusive complex during which large magma mush bodies formed are supported by the following evidence: 1) Hybrid units and gradational contacts are commonly present between major Tuolumne units. 2) CA-TIMS U/Pb zircon geochronology data demonstrate that antecrystic zircon recycling took place unidirectional from the oldest, marginal unit toward the younger, interior parts of the intrusion, where increasing zircon age spread encompasses the entire age range of the Tuolumne. 3) The younger, interior units also show an increasing scatter and complexity in geochemical element and isotope

  18. Northeast Church Rock Mine

    Science.gov (United States)

    Northeast Church Rock Mine, a former uranium mine 17 miles northeast of Gallup, NM in the Pinedale Chapter of the Navajo Nation. EPA is working with NNEPA to oversee cleanup work by United Nuclear Corporation, a company owned by General Electric (GE).

  19. Rock-hard coatings

    OpenAIRE

    Muller, M.

    2007-01-01

    Aircraft jet engines have to be able to withstand infernal conditions. Extreme heat and bitter cold tax coatings to the limit. Materials expert Dr Ir. Wim Sloof fits atoms together to develop rock-hard coatings. The latest invention in this field is known as ceramic matrix composites. Sloof has signed an agreement with a number of parties to investigate this material further.

  20. Rock-hard coatings

    NARCIS (Netherlands)

    Muller, M.

    2007-01-01

    Aircraft jet engines have to be able to withstand infernal conditions. Extreme heat and bitter cold tax coatings to the limit. Materials expert Dr Ir. Wim Sloof fits atoms together to develop rock-hard coatings. The latest invention in this field is known as ceramic matrix composites. Sloof has

  1. Fluids in metamorphic rocks

    NARCIS (Netherlands)

    Touret, J.L.R.

    2001-01-01

    Basic principles for the study of fluid inclusions in metamorphic rocks are reviewed and illustrated. A major problem relates to the number of inclusions, possibly formed on a wide range of P-T conditions, having also suffered, in most cases, extensive changes after initial trapping. The

  2. Os isotope systematics in the cretaceous potassic rocks from Brazil

    International Nuclear Information System (INIS)

    Araujo, A.L.N; Gaspar, J.C; Carlson, R.W; Sichel, S.E; Costa, V; Teixeira, N.A

    2001-01-01

    Mafic potassic rocks of the Alto Paranaiba, Juina, Paranatinga, and Pimenta Bueno Provinces were studied by isotope geochemistry in order to understand the characteristics of the magma sources. These Cretaceous provinces belong to a large (approximately 2500 km) lineament of alkaline rocks (mafic and more evolved lithotypes) that crosses from the western to southeastern part of Brazil, and has been associated with a mantle plume activity (Gibson et al. 1995, Bizzi et al. 1994). The Alto Paranaiba Province intruded the Neoproterozic Brasilia Mobile Belt bounded by the Parana Basin and the Sao Francisco Craton. The lithotypes of the province correspond to kamafugites, kimberlites, and carbonatites (Gibson et al. 1995; Araujo 2000). The majority of radiometric ages for the Alto Paranaiba cluster between 80-90 Ma (Sonoki and Garda 1988; Gibson et al. 1995). The Paranatinga Province is located near the southern border of the Amazonic Craton, and is underlain by the Neoproterozoic Paraguay Mobile belt and the Mesoproterozoic Rio-Negro Mobile Belt (Teixeira et al. 1998; Costa 1997). At shallow levels, the kimberlites intrude into sedimentary rocks and sediments related to the cratonic cover (Heaman et al. 1998). U/Pb zircon ages of 123-126 Ma were obtained for the intrusions (Heaman et al. 1998; Crough et al. 1980). The kimberlites of the Juina Province, at the northern border of the Paleozoic Parecis Basin, like the Paranatinga Province, intruded the Mesoproterozoic Rio-Negro Juruena Belt (Teixeira et al. 1998). U/Pb zircon ages of 92-95 Ma were obtained for the intrusions by Heaman et al. 1998. The Pimenta Bueno Province, which is located in eastern Rondonia State, is poorly known. The province intruded through the Mesoproterozoic Rio- Negro Juruena Belt. The kimberlitic mineral assemblage in the area was previously reported by Svisero et al. (1983) (au)

  3. Geophysical study of saline water intrusion in Lagos municipality

    African Journals Online (AJOL)

    aghomotsegin

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  4. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  5. Numerical modelling of seawater intrusion in Shenzhen (China ...

    Indian Academy of Sciences (India)

    1. Introduction. Seawater intrusion constitutes a prominent hydro- logical problem in many coastal areas of the world. It is generally defined as the encroachment of saline water into fresh groundwater domains in coastal aquifer settings (Werner and Simmons 2008). This phenomenon will occur when the natural equilib-.

  6. Intrusive Thoughts: A Primary Variable in Breakup Distress

    Science.gov (United States)

    Field, Tiffany; Diego, Miguel; Pelaez, Martha; Deeds, Osvelia; Delgado, Jeannette

    2013-01-01

    University students who were high versus low on breakup distress scores were given self-report measures to assess their intrusive thoughts about the romantic breakup and their somatic symptoms that followed the breakup as well as their extracurricular activities and social support that might alleviate their breakup distress. In a regression…

  7. Depressed mood mediates the relationship between rumination and intrusions

    NARCIS (Netherlands)

    Smets, Jorien; Luyckx, Koen; Wessel, Ineke; Raes, Filip

    2012-01-01

    Research suggests that rumination is a causal factor for intrusive memories. These are disturbing autobiographical memories that pop into one's mind involuntarily, spontaneously, and repetitively. A three-wave longitudinal study was conducted to replicate this finding and to test whether one route

  8. Sensitivity analysis on parameters and processes affecting vapor intrusion risk

    NARCIS (Netherlands)

    Picone, S.; Valstar, J.R.; Gaans, van P.; Grotenhuis, J.T.C.; Rijnaarts, H.H.M.

    2012-01-01

    A one-dimensional numerical model was developed and used to identify the key processes controlling vapor intrusion risks by means of a sensitivity analysis. The model simulates the fate of a dissolved volatile organic compound present below the ventilated crawl space of a house. In contrast to the

  9. Fast Content-Based Packet Handling for Intrusion Detection

    National Research Council Canada - National Science Library

    Fisk, Mike

    2001-01-01

    ... use of Royer-Moore currently used in the popular intrusion detection platform Snort. We then measure the actual performance of several search algorithms on actual packet traces and rulesets. Our results provide lessons on the structuring of content-based handlers.

  10. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  11. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... A multisensor-based IDS enables identification of the intrusion patterns semantically by correlating the events and context information provided by multiple sensors. ... R Bhargavi1 V Vaidehi1. Department of Information Technology, Madras Institute of Technology, Anna University, Chennai 600 044, India ...

  12. A bagging approach to network intrusion detection | Adetunmbi ...

    African Journals Online (AJOL)

    The presences of these flaws make a secured system a mirage for now, hence the need for intrusion detection system. In this paper, an ensemble approach – Bagging was used on five different machine learning techniques to improve accuracy of classifiers. Machine learning seeks for methods of extracting hidden pattern ...

  13. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    user

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and. February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  14. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  15. Attenuating fearful memories: effect of cued extinction on intrusions.

    Science.gov (United States)

    Marks, Elizabeth H; Zoellner, Lori A

    2014-12-01

    Exposure-based therapies for posttraumatic stress disorder are thought to reduce intrusive memories through extinction processes. Methods that enhance extinction may translate to improved treatment. Rat research suggests retrieving a memory via a conditioned stimulus (CS) cue, and then modifying the retrieved memory within a specific reconsolidation window may enhance extinction. In humans, studies (e.g., Kindt & Soeter, 2013; Schiller et al., 2010) using basic learning paradigms show discrepant findings. Using a distressing film paradigm, participants (N = 148) completed fear acquisition and extinction. At extinction, they were randomized to 1 of 3 groups: CS cue within reconsolidation window, CS cue outside window, or non-CS cue within window. Intrusions were assessed 24 hr after extinction. Participants receiving the CS cue and completing extinction within the reconsolidation window had more intrusions (M = 2.40, SD = 2.54) than those cued outside (M = 1.65, SD = 1.70) or those receiving a non-CS cue (M = 1.24, SD = 1.26), F(2, 145) = 4.52, p = .01, d = 0.55. Consistent with the reconsolidation hypothesis, presenting a CS cue does appear to activate a specific period of time during which a memory can be updated. However, the CS cue caused increased, rather than decreased, frequency of intrusions. Understanding parameters of preextinction cueing may help us better understand reconsolidation as a potential memory updating mechanism.

  16. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  17. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  18. Saltwater Intrusion Simulation in Heterogeneous Aquifer Using Lattice Boltzmann Method

    Science.gov (United States)

    Servan-Camas, B.; Tsai, F. T.

    2006-12-01

    This study develops a saltwater intrusion simulation model using a lattice Boltzmann method (LBM) in a two- dimensional coastal confined aquifer. The saltwater intrusion phenomenon is described by density-varied groundwater flow and mass transport equations, where a freshwater-saltwater mixing zone is considered. Although primarily developed using the mesoscopic approach to solve macroscopic fluid dynamic problems (e.g. Navier-Stoke equation), LBM is able to be adopted to solve physical-based diffusion-type governing equations as for the groundwater flow and mass transport equations. The challenge of using LBM in saltwater intrusion modeling is to recover hydraulic conductivity heterogeneity. In this study, the Darcy equation and the advection-dispersion equation (ADE) are recovered in the lattice Boltzmann modeling. Specifically, the hydraulic conductivity heterogeneity is represented by the speed of sound in LBM. Under the consideration on the steady-state groundwater flow due to low storativity, in each time step the flow problem is modified to be a Poisson equation and solved by LBM. Nevertheless, the groundwater flow is still a time-marching problem with spatial-temporal variation in salinity concentration as well as density. The Henry problem is used to compare the LBM results against the Henry analytic solution and SUTRA result. Also, we show that LBM is capable of handling the Dirichlet, Neumann, and Cauchy concentration boundary conditions at the sea side. Finally, we compare the saltwater intrusion results using LBM in the Henry problem when heterogeneous hydraulic conductivity is considered.

  19. Extension by faulting, stretching and magma intrusion in Ethiopia

    Science.gov (United States)

    Bastow, I. D.; Keir, D.

    2012-12-01

    The 2001-2004 Ethiopia Afar Geoscientific Lithospheric Experiment showed that high seismic wavespeed, dense, mafic crustal intrusions exist beneath many zones of Quaternary magmatism in the Main Ethiopian rift, and that crustal thinning is minimal. From these observations, a consensus quickly emerged that extension presently occurs not by ductile stretching and brittle faulting but by magma intrusion. Striking InSAR images and accompanying seismic data from the 2005 Afar diking episode provided further compelling evidence in support of the magma assisted rifting hypothesis. Patterns of mantle seismic anisotropy, constrained by a combination of body and surface-wave analysis showed that melt intrusion likely also plays an important role in accommodating extension at greater depths in the extending plate. Evidence from further north in Afar, however, where crustal thickness decreases abruptly into the Danakil Depression, is not so easily explained by the magma assisted rifting hypothesis. Subsidence of the newly forming margin towards and below sea level, and eruption of voluminous basalt flows, is likely the result of late-stage thinning of the heavily intruded, weakened plate just before the onset of seafloor spreading. Faulting, stretching and magma intrusion are thus each important, but at different times during breakup. Combining, not isolating, these mechanisms of strain in new rifting models and appreciating how plate strength varies during rifting is essential in developing a clearer understanding of the incomplete geological record that documents continental breakup over time.

  20. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    The abandonment of shallow boreholes is presumed to have been caused by saltwater intrusion from the ocean. ... The evidence revealed by the 2D electrical resistivity tomography investigation combined with geochemistry of groundwater from literature suggested that abandonment of shallow boreholes are probably not ...

  1. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal aquifers is generally three dimensional. (3-D) in nature. In the literature, there is a general lack ...

  2. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  3. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  4. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  5. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, R.; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  6. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  7. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  8. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    1Department of Civil Engineering, Regional Engineering College, Durgapur. 713 209, India. 2Department of Civil Engineering, Indian Institute of Technology, Kanpur. 208 016, India. e-mail: adas wrpm@yahoo.com; bithin@iitk.ac.in. MS received 1 March 1999; revised 9 April 2001. Abstract. Seawater intrusion in coastal ...

  9. Effects of Sleep after Experimental Trauma on Intrusive Emotional Memories.

    Science.gov (United States)

    Kleim, Birgit; Wysokowsky, Julia; Schmid, Nuria; Seifritz, Erich; Rasch, Björn

    2016-12-01

    To investigate sleep's effect in the immediate aftermath of experiencing an analog trauma in the laboratory on reducing intrusive emotional memory formation. Sixty-five healthy women were exposed to an experimental laboratory trauma. They viewed a neutral and a trauma film in the laboratory and were randomly allocated to either a group that slept following film viewing or a group that remained awake. Sleep was recorded with electroencephalogram in a subgroup of participants in the sleep group. All participants recorded intrusive memories in the week following the film. The sleep group experienced fewer and less distressing intrusive trauma memories compared to the wake group. These effects were particularly evident toward the end of the week. Duration spent in stage N2 as opposed to light N1 sleep, a higher number of fast parietal sleep spindles and a lower rapid eye movement sleep density predicted intrusion frequency. Our results have clinical implications and set the ground for early-intervention sleep studies following trauma and prevention of chronic posttrauma disorders. © 2016 Associated Professional Sleep Societies, LLC.

  10. Intrusion detection for the solution of security problems

    International Nuclear Information System (INIS)

    Buchmueller, R.

    1982-01-01

    Constantly growing security problems in public as well as private sectors can no longer be solved without the use of modern intrusion detection systems. BBC, as general contractor, offers the system solutions to fully meet these problems. These solutions include analysis of the site to be protected, installation, commissioning and maintenance of the security system. (orig.) [de

  11. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 120; Issue 2. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora Group, Chhattisgarh ... Zr, Y and Nb ternary diagrams plot in the fields of within plate basalt. Selected HFSE ratios indicate a non-plume source with crustal assimilation/sediment mixing.

  12. Groundwater quality degradation due to salt water intrusion in ...

    African Journals Online (AJOL)

    Saltwater intrusion problems are widespread where there are over pumping of groundwater from coastal aquifers. Water samples were collected from production boreholes in Zanzibar municipality and analyzed for salinity indication parameters comprising of chloride, electrical conductivity, total dissolved salts and ...

  13. Brief exercise enhances intrusive memories of traumatic stimuli.

    Science.gov (United States)

    Keyan, Dharani; Bryant, Richard A

    2017-05-01

    Brief physical exercise enhances memories for neutral events, and recently has been shown to modulate fear learning in animals. To date there is no evidence pertaining to the impact of exercise on emotional memories in humans. Accordingly, this study investigated the role of brief exercise in the development of emotional intrusive memories. Forty-nine university students (18-29year olds) viewed a car accident film depicting accident and injury, and were then randomly assigned to engage in either 10min of intense exercise or easy walking. Two days following the experiment participants were assessed for both intrusive memories of the film and intentional recall of film details. Results indicated that participants in the exercise relative to the walking condition reported more intrusive memories, but not voluntarily recalled memories, of the car accident film two days later. These findings are consistent with recent evidence of exercise-induced emotional learning in animals, and point to the potential for physical activity to contribute to the development of intrusions in the context of encoding emotionally-laden information. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  15. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  16. Geophysical study of saline water intrusion in Lagos municipality ...

    African Journals Online (AJOL)

    Saline water intrusion presently constitutes serious concerns in the Lagos municipality just like many other coastal cities, thus necessitating its intervallic study. The present study involving 52 borehole logs (consisting of natural gamma and electrical resistivity components) was aimed at delineating intruded and vulnerable ...

  17. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from ...

  18. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Science.gov (United States)

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  19. Melanite garnet-bearing nepheline syenite minor intrusion in ...

    Indian Academy of Sciences (India)

    (Chattopadhyay and Hashmi 1984; Maitra 1992;. Srivastava et al 2005; Srivastava ... Keywords. Melanite garnet; nepheline syenite minor intrusion; Mesozoic magmatism; Mawpyut complex; Meghalaya plateau. J. Earth Syst. Sci. 120, No. 6, December 2011, pp. ... dated 110–120 Ma (Coffin et al 2002; Srivastava et al 2005).

  20. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  1. Microstructure in hardened cement pastes measured by mercury intrusion porosimetry and low temperature microcalorimetry

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Baroghel, V.B.; Künzel, H.M.

    1996-01-01

    , image analysis, mercury intrusion porosimetry and low temperature microcalorimetry.The present paper is dealing with cumulated pore size distributions measured by mercury intrusion porosimetry (MIP) from two laboratories (LCPC, IBP) and low temperature microcalorimetry (CAL) from one laboratory (BKM...

  2. Why do close partners snoop? Predictors of intrusive behavior in newlywed couples

    NARCIS (Netherlands)

    Vinkers, C. D. W.; Finkenauer, C.; Hawk, S. T.

    2011-01-01

    Existing research shows that intrusive behavior has detrimental consequences for relationships. Surprisingly, little is known about why close relationship partners snoop. This study examined why romantic partners engage in intrusive behavior among newlywed couples in the Netherlands. As predicted,

  3. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  4. Report: Lack of Final Guidance on Vapor Intrusion Impedes Efforts to Address Indoor Air Risks

    Science.gov (United States)

    Report #10-P-0042, December 14, 2009. EPA’s efforts to protect human health at sites where vapor intrusion risks may occur have been impeded by the lack of final Agency guidance on vapor intrusion risks.

  5. Soil/Rock Properties Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — Soil/Rock Properties LaboratoryLocation: Spokane SiteThe Soil/Rock Properties Laboratory is contained in the soils bay, a 4,700 sq. ft. facility that provides space...

  6. Classification and Geochemical Characterization of Igneous Rocks: Southern Part of Chihuahua City, Mexico

    Science.gov (United States)

    Fontes, I. D.; Espejel-Garcia, V. V.; Villalobos-Aragon, A.

    2013-05-01

    Chihuahua City is the capital of the state with the same name, located in northern Mexico. The city was established near the Chuviscar River, but in the last decades it has been extended to the nearby areas (mountains), with volcanic (rhyolitic tuffs), and sedimentary rocks (limestone). The study area includes areas in the south part of Chihuahua City, where we can still find unbuilt lands and it is possible to appreciate outcrops of igneous rocks. This project includes 5 study spots, which are located about 9 km. far from the south extreme of the city. This research is developed in order to complement the geological information in this area, as there is no is detailed record of it. In the geological map H13-10 (SGM, 1997), it is said that the urban area is covered by Quaternary conglomerates, while exploring the region we have located several igneous rocks outcrops. In three of the sampling points, dark colored intrusive igneous rocks with large crystals appear in blocks without noticeable fractures. While in the other two sampling points, highly fractured blocks of pink aphanitic igneous rocks, showing traces of pyrolusite were observed. The petrographic study shows the two different textures that classify these rocks as extrusive (aphanitic) or intrusive (phaneritic), both with quartz and feldspars being the dominant minerals. Geochemical analyses confirm the felsic composition of the rocks, varying form trachytes to rhyolites. The trace element results show high contents of Sr, Ba, V, Rb, and Zr in trachytic compositions, while there are high concentrations of Mn, W, Rb and Co for rhyolitic compositions.

  7. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  8. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  9. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  10. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  11. Saltwater Intrusion Through Submerged Caves due to the Venturi Effect

    Science.gov (United States)

    Khazmutdinova, K.; Nof, D.

    2016-12-01

    Saltwater intrusion into freshwater sources is a concern in coastal areas. In order to reduce the intrusion of seawater the physical mechanisms that allow this to occur must be understood. This study presents an approach to quantify saltwater intrusion in karstic coastal aquifers due to the presence of submerged caves. Many water-filled caves have variable tunnel cross-sections and often have narrow connections between two otherwise large tunnels. Generally, the diameter of these restrictions is 1 - 2 m and the flow speed within them is approximately 1 - 5 m/s. Main cave tunnels can be 10 - 20 times bigger than restrictions, and have flow speeds ranging anywhere between 0.5 cm/s and 20 cm/s. According to Bernoulli's theorem, in order to balance high velocities within a restriction, the pressure has to drop as the water flow passes through a narrow tunnel. This is expected to influence the height to which a deeper saline aquifer can penetrate in conduits connecting the narrow restriction and saltwater. For sufficiently small restrictions, saline water can invade the freshwater tunnel. The intrusion of saltwater from a deeper, saline aquifer into a fresh groundwater system due to the Venturi effect in submerged caves was computed, and an analytical and a qualitative model that captures saltwater intrusion into a fresh aquifer was developed. Using Bernoulli's theorem, we show that depths from which the saline water can be drawn into the freshwater tunnel reach up to 450 m depending on the difference in the density between fresh and saltwater. The velocity of the saline upward flow is estimated to be 1.4 m/s using the parameters for Wakulla Spring, a first order magnitude spring in Florida, with a saltwater interface 180 m below the spring cave system.

  12. A new physical barrier system for seawater intrusion control

    Science.gov (United States)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  13. Detection of stratospheric ozone intrusions by windprofiler radars.

    Science.gov (United States)

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-08

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport.

  14. Protrusive intrusion, dehydration and polymorphism in minerals as possible reason of seismic activity, relation between ophiolite belts and seismic zonation of the territory of Armenia

    Science.gov (United States)

    Harutyunyan, A. V.; Petrosyan, H. M.

    2010-05-01

    In the basis of multiple geological and geophysical data, also on the results of investigations seismic and density properties of rocks at high termobaric conditions, we proposed the petrophisical section and model of evolution of Earth crust of the territory of Armenia. On the proposed model the following interrelated problems are debated: forming of ophiolite belts and volcanic centers, genesis of hydrocarbons by organic and inorganic ways, and also reasons of originating of seismic centers. The reasons of originating of seismic centers in different depths of Earth crust, are miscellaneous. According to the model of Earth crust evolution the ophiolite belts are formed due to permanent protrusive intrusion of serpentinized masses from the foot of the crust (35-50km) into upper horizons. It is natural to assume, that the permanent intrusion of serpentinizd masses through deep faults has drastically occurred accompanying with seismic shakings. This process encourages the development of deep faults. The protrusive intrusion of serpentinized masse accompanied with partial dehydration of serpentinites and serpentinized ultrabasites and new mineral formation. The processes was accompanied also with drastic change of seismic waves and volumes up to 30%. Experiments at high termobaric conditions show, that some minerals undergone polymorphous transformations, accompanied with phase change and drastic change of rocks volume. Particularly plastic calcite, included in the composition of metamorphic rocks to run into the cracks expends and diversifies them. The process described cause some general effects similar to those of the process of dilatancy. Therefore, the protrusive intrusion of serpentinized masses into upper horizons, it dehydrations and polymorphous transformations in different minerals, may be cause of geo-dynamic processes at different depths of Earth crust. It may be assumed, that those processes permanently occur nowadays as well. Comparing the maps of

  15. 10 CFR 63.321 - Individual protection standard for human intrusion.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Individual protection standard for human intrusion. 63.321... Standards Human Intrusion Standard § 63.321 Individual protection standard for human intrusion. (a) DOE must determine the earliest time after disposal that the waste package would degrade sufficiently that a human...

  16. Acidic Microenvironments in Waste Rock Characterized by Neutral Drainage: Bacteria–Mineral Interactions at Sulfide Surfaces

    Directory of Open Access Journals (Sweden)

    John W. Dockrey

    2014-03-01

    Full Text Available Microbial populations and microbe-mineral interactions were examined in waste rock characterized by neutral rock drainage (NRD. Samples of three primary sulfide-bearing waste rock types (i.e., marble-hornfels, intrusive, exoskarn were collected from field-scale experiments at the Antamina Cu–Zn–Mo mine, Peru. Microbial communities within all samples were dominated by neutrophilic thiosulfate oxidizing bacteria. However, acidophilic iron and sulfur oxidizers were present within intrusive waste rock characterized by bulk circumneutral pH drainage. The extensive development of microbially colonized porous Fe(III (oxyhydroxide and Fe(III (oxyhydroxysulfate precipitates was observed at sulfide-mineral surfaces during examination by field emission-scanning electron microscopy-energy dispersive X-ray spectroscopy (FE-SEM-EDS. Linear combination fitting of bulk extended X-ray absorption fine structure (EXAFS spectra for these precipitates indicated they were composed of schwertmannite [Fe8O8(OH6–4.5(SO41–1.75], lepidocrocite [γ-FeO(OH] and K-jarosite [KFe3(OH6(SO42]. The presence of schwertmannite and K-jarosite is indicative of the development of localized acidic microenvironments at sulfide-mineral surfaces. Extensive bacterial colonization of this porous layer and pitting of underlying sulfide-mineral surfaces suggests that acidic microenvironments can play an important role in sulfide-mineral oxidation under bulk circumneutral pH conditions. These findings have important implications for water quality management in NRD settings.

  17. Improvements of Spiers model for compaction creep of crushed rock salt

    International Nuclear Information System (INIS)

    Poley, A.D.

    1996-10-01

    This report describes a number of improvements to the existing model for the process of compaction creep of rock salt developed by Spiers and co-workers. The process of compaction creep determines the behaviour of the seals of crushed rock salt, the last engineered barriers of a repository in rock salt for (radioactive) wastes. In Chapter 2 the derivation of the original model of Spiers and co-workers is followed except for some simplifying approximations. A comparison of the model results is made with experimental data and a number of model adjustments are suggested. In Chapter 3 one of these suggested model adjustments is explored, and an alternative model is developed. The results obtained with this model compare favourably with the experimental data without the use of adjustable shape functions as for the original model. Preliminary investigations of the impact of the new model on estimated releases to the geosphere of radionuclides form a repository in rock salt revealed striking differences: with the new model the compaction of the rock salt seals was so rapid that no releases could occur. The striking differences between the results - in terms of releases form a rock salt repository to the geosphere after groundwater intrusion - obtained using the two models clearly indicate the need for further experimental research into the end-compaction behaviour of rock salt backfill. (orig.)

  18. Rock and mineral magnetism

    CERN Document Server

    O’Reilly, W

    1984-01-01

    The past two decades have witnessed a revolution in the earth sciences. The quantitative, instrument-based measurements and physical models of. geophysics, together with advances in technology, have radically transformed the way in which the Earth, and especially its crust, is described. The study of the magnetism of the rocks of the Earth's crust has played a major part in this transformation. Rocks, or more specifically their constituent magnetic minerals, can be regarded as a measuring instrument provided by nature, which can be employed in the service of the earth sciences. Thus magnetic minerals are a recording magnetometer; a goniometer or protractor, recording the directions of flows, fields and forces; a clock; a recording thermometer; a position recorder; astrain gauge; an instrument for geo­ logical surveying; a tracer in climatology and hydrology; a tool in petrology. No instrument is linear, or free from noise and systematic errors, and the performance of nature's instrument must be assessed and ...

  19. Limados : Rock peruano

    OpenAIRE

    García Morete, Ramiro

    2013-01-01

    Incentivado por la corriente nuevaolera que llegaba de México, fue señalado por especialistas como pionero del punk. Aunque el plan, era tocar con lo que hubiera. Un recodo ínfimo de un período breve pero sorprendentemente poderoso, los 60 en un país que hizo del rock una expresión propia de su cultura. Facultad de Periodismo y Comunicación Social

  20. Deformations of fractured rock

    International Nuclear Information System (INIS)

    Stephansson, O.

    1977-09-01

    Results of the DBM and FEM analysis in this study indicate that a suitable rock mass for repository of radioactive waste should be moderately jointed (about 1 joint/m 2 ) and surrounded by shear zones of the first order. This allowes for a gentle and flexible deformation under tectonic stresses and prevent the development of large cross-cutting failures in the repository area. (author)

  1. Assimilation of carbonate country rock by the parent magma of the Panzhihua Fe-Ti-V deposit (SW China: Evidence from stable isotopes

    Directory of Open Access Journals (Sweden)

    Clément Ganino

    2013-09-01

    Full Text Available The Panzhihua intrusion in southwest China is part of the Emeishan Large Igneous Province and host of a large Fe-Ti-V ore deposit. During emplacement of the main intrusion, multiple generations of mafic dykes invaded carbonate wall rocks, producing a large contact aureole. We measured the oxygen-isotope composition of the intrusions, their constituent minerals, and samples of the country rock. Magnetite and plagioclase from Panzhihua intrusion have δ18O values that are consistent with magmatic equilibrium, and formed from magmas with δ18O values that were 1–2‰ higher than expected in a mantle-derived magma. The unmetamorphosed country rock has high δ18O values, ranging from 13.2‰ (sandstone to 24.6–28.6‰ (dolomite. The skarns and marbles from the aureole have lower δ18O and δ13C values than their protolith suggesting interaction with fluids that were in exchange equilibrium with the adjacent mafic magmas and especially the numerous mafic dykes that intruded the aureole. This would explain the alteration of δ18O of the dykes which have significantly higher values than expected for a mantle-derived magma. Depending on the exact δ18O values assumed for the magma and contaminant, the amount of assimilation required to produce the elevated δ18O value of the Panzhihua intrusion was between 8 and 13.7 wt.%, assuming simple mixing. The exact mechanism of contamination is unclear but may involve a combination of assimilation of bulk country rock, mixing with a melt of the country rock and exchange with CO2-rich fluid derived from decarbonation of the marls and dolomites. These mechanisms, particularly the latter, were probably involved in the formation of the Fe-Ti-V ores.

  2. Geochronology, geochemistry and Sr-Nd-Pb-Hf isotopes of the Early Jurassic granodiorite from the Sankuanggou intrusion, Heilongjiang Province, Northeastern China: Petrogenesis and geodynamic implications

    Science.gov (United States)

    Deng, Ke; Li, Qiugen; Chen, Yanjing; Zhang, Cheng; Zhu, Xuefeng; Xu, Qiangwei

    2018-01-01

    Mesozoic granitoid rocks represent a volumetrically component of the Northeastern (NE) China and preserve useful information about the tectonomagmatic history of this region. The Sankuanggou intrusion associated with skarn Fe-Cu deposit in the Duobaoshan ore field within NE China primarily consists of granodiorite with minor alkali-feldspar granite and diorite, which intrudes the Ordovician Duobaoshan Formation in the region. Zircon LA-ICP-MS U-Pb geochronology and whole-rock geochemistry, and Sr-Nd-Pb-Hf isotope analysis were performed on the Sankuanggou intrusion to investigate the petrogenesis and geodynamic implications. Zircon U-Pb dating of magmatic zircons from the granodiorite rock suggests that the intrusion was emplaced in the Early Jurassic (177 ± 1 Ma). Geochemically, it belongs to the metaluminous to slightly peraluminous high-K calc-alkaline I-type granitoids with a narrow range of SiO2 concentration (65.73-67.33 wt.%), high Ba, Sr, LREE and LILE contents and low abundance of Rb, Y, HREE and HFSE. All of these studied samples have homogeneous initial isotope traits with (87Sr/86Sr)i ranging from 0.70415 to 0.70423, εNd(t) of + 3.6 to + 4.0, (206Pb/204Pb)i = 17.933-18.458, (207Pb/204Pb)i = 15.520-15.587 and (208Pb/204Pb)i = 37.523-38.087, and zircon εHf(t) values varying from + 4.8 to + 9.9. These results, combined with the previous data, demonstrate that the Sankuanggou granitoids were formed by partial melting of the pre-existing juvenile crust in an extensional regime related to the post-collisional setting following the closure of the CAOB rather than previously proposed continental arc setting related to Paleo-Pacific or the Mongol-Okhotsk subduction, although their potential influence should not be dismissed.

  3. Rock in Rio: forever young

    Directory of Open Access Journals (Sweden)

    Ricardo Ferreira Freitas

    2014-12-01

    Full Text Available The purpose of this article is to discuss the role of Rock in Rio: The Musical, as herald of megafestival Rock in Rio. Driven by the success that musicals have reached in Brazil, we believe that the design of this spectacle of music, dance and staging renews the brand of the rock festival, once it adds the force of young and healthy bodies to its concept. Moreover, the musical provides Rock in Rio with some distance from the controversal trilogy of sex, drugs and rock and roll, a strong mark of past festivals around the world. Thus, the musical expands the possibilities of growth for the brand.

  4. Radiological Mapping of the Alkaline Intrusive Complex of Jombo, South Coastal Kenya by In-Situ Gamma-Ray Spectrometry

    Science.gov (United States)

    Kaniu, Ian; Darby, Iain G.; Kalambuka Angeyo, Hudson

    2016-04-01

    Carbonatites and alkaline intrusive complexes are rich in a variety of mineral deposits such as rare earth elements (REEs), including Nb, Zr and Mn. These are often associated with U and Th bearing minerals, including monazite, samarskite and pyrochlore. Mining waste resulting from mineral processing activities can be highly radioactive and therefore poses a risk to human health and environment. The Jombo complex located in Kenya's south coastal region is potentially one of the richest sources of Nb and REEs in the world. It consists of the main intrusion at Jombo hill, three associated satellite intrusions at Mrima, Kiruku and Nguluku hills, and several dykes. The complex is highly heterogeneous with regard to its geological formation as it is characterized by alkaline igneous rocks and carbonatites which also influence its radio-ecological dynamics. In-situ gamma spectrometry offers a low-cost, rapid and spatially representative radioactivity estimate across a range of landscapes compared to conventional radiometric techniques. In this work, a wide ranging radiological survey was conducted in the Jombo complex as follow up on previous studies[1,2], to determine radiation exposure levels and source distributions, and perform radiological risk assessments. The in-situ measurements were carried out using a 2.0 l NaI(Tl) PGIS-2 portable detector from Pico Envirotec Inc integrated with GPS, deployed for ground (back-pack) and vehicular gamma-ray spectrometry. Preliminary results of radiological distribution and mapping will be presented. [1] Patel, J. P. (1991). Discovery and Innovation, 3(3): 31-35. [2] Kebwaro, J. M. et. al. (2011). J. Phys. Sci., 6(13): 3105-3110.

  5. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  6. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  7. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  8. Hydrological characteristics of Japanese rock

    International Nuclear Information System (INIS)

    Ijiri, Yuji; Sawada, Atsushi; Akahori, Kuniaki

    1999-11-01

    It is crucial to evaluate the hydrogeological characteristics of rock in Japan in order to assess the performance of geosphere. This report summarizes the hydrogeological characteristics of various rock types obtained from broad literature surveys and the fields experiments at the Kamaishi mine in northern Japan and at the Tono mine in central Japan. It is found that the hydraulic conductivity of rock mass ranges from 10 -9 m/s to 10 -8 m/s, whereas the hydraulic conductivity of fault zone ranges from 10 -9 m/s to 10 -3 m/s. It is also found that the hydraulic conductivity tends to decrease with depth. Therefore, the hydraulic conductivity of rock mass at the depth of a repository will be smaller than above values. From the investigations at outcrops and galleries throughout the country, fractures are observed as potential pathways in all rock types. All kinds of crystalline rocks and pre-Neogene sedimentary rocks are classified as fractured media where fracture flow is dominant. Among these rocks, granitic rock is considered the archetype fractured media. On the other hand, andesite, tuff and Neogene sedimentary rocks are considered as intermediate between fractured media and porous media where flow in fractures as well as in rock matrix are significant. (author)

  9. Development of artificial soft rock

    International Nuclear Information System (INIS)

    Kishi, Kiyoshi

    1995-01-01

    When foundation base rocks are deeper than the level of installing structures or there exist weathered rocks and crushed rocks in a part of base rocks, often sound artificial base rocks are made by substituting the part with concrete. But in the construction of Kashiwazaki Kariwa Nuclear Power Station of Tokyo Electric Power Co., Inc., the foundation base rocks consist of mudstone, and the stiffness of concrete is large as compared with the surrounding base rocks. As the quality of the substituting material, the nearly same stiffness as that of the surrounding soft rocks and long term stability are suitable, and the excellent workability and economical efficiency are required, therefore, artificial soft rocks were developed. As the substituting material, the soil mortar that can obtain the physical property values in stable form, which are similar to those of Nishiyama mudstone, was selected. The mechanism of its hardening and the long term stability, and the manufacturing plant are reported. As for its application to the base rocks of Kashiwazaki Kariwa Nuclear Power Station, the verification test at the site and the application to the base rocks for No. 7 plant reactor building and other places are described. (K.I.)

  10. Petrological and geochemical study of doleritic intrusions of Moatize area, Tete Province, Mozambique

    Science.gov (United States)

    Ilídio Mário, Rui; Mendes, Maria Helena; Francisco Santos, Jose; Ribeiro, Sara

    2017-04-01

    The dolerite samples studied in this work are part of drilling cores, obtained during exploration campaigns by the Ncondezi Coal Company, in the prospect area 805L, located at NE of Moatize, Tete Province, Mozambique. The dolerite bodies are intrusive into sedimentary formations of the Karoo Supergroup. The intrusions have a probable Jurassic age, around 180 Ma, based on a geochronological information (GTK Consortium, 2006) from a similar body cropping out in another area of the Tete Province. The studied rocks were affected by hydrothermal alteration, testified by the pervasive occurrence of the assemblage serpentine + chlorite + sericite + sphene + calcite ± epidote ± tremolite-actinolite, and by filling of vesicles and fractures by calcite, pyrite or calcite + pyrite ± quartz. However, the selected samples preserve igneous intergranular textures. Petrographic evidence suggests that the primary mineral associations included plagioclase, titanaugite, olivine, apatite, opaques, biotite and hornblende. These assemblages are variably preserved and, in the samples most intensely altered, the igneous minerals were almost totally replaced. Whole-rock major and trace element data, with particular emphasis on immobile elements, indicate that the analysed samples are basic and that they can be seen as cogenetic, belonging to the alkaline series and showing compositions similar to present-day intraplate basalts. The Rb-Sr and Sm-Nd data seem to confirm the cogenetic nature of the studied dolerites. In fact, in the least altered samples, both [87Sr/86Sr]180Ma and ɛNd180Ma define relatively small ranges: +0.7050 ≥ [87Sr/86Sr]180Ma ≥ 0.7038 +10 ≥ ɛSr180Ma ≥ -7 and +3.6 ≥ ɛNd180Ma ≥ +1.7. In addition, this clearly indicates that parental melts were generated in a mantle source and that magmas did not undergo significant crustal contamination during their ascent and emplacement. The described isotopic compositions, besides plotting in an area common to OIB, are

  11. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non......-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results...

  12. High temperature water adsorption on The Geysers rocks

    Energy Technology Data Exchange (ETDEWEB)

    Gruszkiewicz, M.S.; Horita, J.; Simonson, J.M.; Mesmer, R.E.

    1997-08-01

    In order to measure water retention by geothermal reservoir rocks at the actual reservoir temperature, the ORNL high temperature isopiestic apparatus was adapted for adsorption measurements. The quality of water retained by rock samples taken from three different wells of The Geysers geothermal reservoir was measured at 150{sup degree}C, 200{sup degree}C, and 250{sup degree}C as a function of pressure in the range 0.00 {<=}p/p{sub degree} {<=} 0.98, where p{sub degree} is the saturated water vapor pressure. Both adsorption (increasing pressure) and desorption (decreasing pressure) runs were made in order to investigate the nature and the extent of the hysteresis. Additionally, low temperature gas adsorption analyses were performed on the same rock samples. Nitrogen or krypton adsorption and desorption isotherms at 77 K were used to obtain BET specific surface areas, pore volumes and their distributions with respect to pore sizes. Mercury intrusion porosimetry was also used to obtain similar information extending to very large pores (macropores). A correlation is sought between water adsorption, the surface properties, and the mineralogical and petrological characteristics of the solids.

  13. Elemental geochemistry of sedimentary rocks at Yellowknife Bay, Gale crater, Mars.

    Science.gov (United States)

    McLennan, S M; Anderson, R B; Bell, J F; Bridges, J C; Calef, F; Campbell, J L; Clark, B C; Clegg, S; Conrad, P; Cousin, A; Des Marais, D J; Dromart, G; Dyar, M D; Edgar, L A; Ehlmann, B L; Fabre, C; Forni, O; Gasnault, O; Gellert, R; Gordon, S; Grant, J A; Grotzinger, J P; Gupta, S; Herkenhoff, K E; Hurowitz, J A; King, P L; Le Mouélic, S; Leshin, L A; Léveillé, R; Lewis, K W; Mangold, N; Maurice, S; Ming, D W; Morris, R V; Nachon, M; Newsom, H E; Ollila, A M; Perrett, G M; Rice, M S; Schmidt, M E; Schwenzer, S P; Stack, K; Stolper, E M; Sumner, D Y; Treiman, A H; VanBommel, S; Vaniman, D T; Vasavada, A; Wiens, R C; Yingst, R A

    2014-01-24

    Sedimentary rocks examined by the Curiosity rover at Yellowknife Bay, Mars, were derived from sources that evolved from an approximately average martian crustal composition to one influenced by alkaline basalts. No evidence of chemical weathering is preserved, indicating arid, possibly cold, paleoclimates and rapid erosion and deposition. The absence of predicted geochemical variations indicates that magnetite and phyllosilicates formed by diagenesis under low-temperature, circumneutral pH, rock-dominated aqueous conditions. Analyses of diagenetic features (including concretions, raised ridges, and fractures) at high spatial resolution indicate that they are composed of iron- and halogen-rich components, magnesium-iron-chlorine-rich components, and hydrated calcium sulfates, respectively. Composition of a cross-cutting dike-like feature is consistent with sedimentary intrusion. The geochemistry of these sedimentary rocks provides further evidence for diverse depositional and diagenetic sedimentary environments during the early history of Mars.

  14. Elemental Geochemistry of Sedimentary Rocks at Yellowknife Bay, Gale Crater, Mars

    Science.gov (United States)

    McLennan, S. M.; Anderson, R. B.; Bell, J. F.; Bridges, J. C.; Calef, F.; Campbell, J. L.; Clark, B. C.; Clegg, S.; Conrad, P.; Cousin, A.; Des Marais, D. J.; Dromart, G.; Dyar, M. D.; Edgar, L. A.; Ehlmann, B. L.; Fabre, C.; Forni, O.; Gasnault, O.; Gellert, R.; Gordon, S.; Grant, J. A.; Grotzinger, J. P.; Gupta, S.; Herkenhoff, K. E.; Hurowitz, J. A.; King, P. L.; Le Mouélic, S.; Leshin, L. A.; Léveillé, R.; Lewis, K. W.; Mangold, N.; Maurice, S.; Ming, D. W.; Morris, R. V.; Nachon, M.; Newsom, H. E.; Ollila, A. M.; Perrett, G. M.; Rice, M. S.; Schmidt, M. E.; Schwenzer, S. P.; Stack, K.; Stolper, E. M.; Sumner, D. Y.; Treiman, A. H.; VanBommel, S.; Vaniman, D. T.; Vasavada, A.; Wiens, R. C.; Yingst, R. A.; Kemppinen, Osku; Bridges, Nathan; Johnson, Jeffrey R.; Minitti, Michelle; Cremers, David; Farmer, Jack; Godber, Austin; Wadhwa, Meenakshi; Wellington, Danika; McEwan, Ian; Newman, Claire; Richardson, Mark; Charpentier, Antoine; Peret, Laurent; Blank, Jennifer; Weigle, Gerald; Li, Shuai; Milliken, Ralph; Robertson, Kevin; Sun, Vivian; Baker, Michael; Edwards, Christopher; Farley, Kenneth; Griffes, Jennifer; Miller, Hayden; Newcombe, Megan; Pilorget, Cedric; Siebach, Kirsten; Brunet, Claude; Hipkin, Victoria; Marchand, Geneviève; Sánchez, Pablo Sobrón; Favot, Laurent; Cody, George; Steele, Andrew; Flückiger, Lorenzo; Lees, David; Nefian, Ara; Martin, Mildred; Gailhanou, Marc; Westall, Frances; Israël, Guy; Agard, Christophe; Baroukh, Julien; Donny, Christophe; Gaboriaud, Alain; Guillemot, Philippe; Lafaille, Vivian; Lorigny, Eric; Paillet, Alexis; Pérez, René; Saccoccio, Muriel; Yana, Charles; Armiens-Aparicio, Carlos; Rodríguez, Javier Caride; Blázquez, Isaías Carrasco; Gómez, Felipe Gómez; Gómez-Elvira, Javier; Hettrich, Sebastian; Malvitte, Alain Lepinette; Jiménez, Mercedes Marín; Martínez-Frías, Jesús; Martín-Soler, Javier; Martín-Torres, F. Javier; Jurado, Antonio Molina; Mora-Sotomayor, Luis; Caro, Guillermo Muñoz; López, Sara Navarro; Peinado-González, Verónica; Pla-García, Jorge; Manfredi, José Antonio Rodriguez; Romeral-Planelló, Julio José; Fuentes, Sara Alejandra Sans; Martinez, Eduardo Sebastian; Redondo, Josefina Torres; Urqui-O'Callaghan, Roser; Mier, María-Paz Zorzano; Chipera, Steve; Lacour, Jean-Luc; Mauchien, Patrick; Sirven, Jean-Baptiste; Manning, Heidi; Fairén, Alberto; Hayes, Alexander; Joseph, Jonathan; Squyres, Steven; Sullivan, Robert; Thomas, Peter; Dupont, Audrey; Lundberg, Angela; Melikechi, Noureddine; Mezzacappa, Alissa; DeMarines, Julia; Grinspoon, David; Reitz, Günther; Prats, Benito; Atlaskin, Evgeny; Genzer, Maria; Harri, Ari-Matti; Haukka, Harri; Kahanpää, Henrik; Kauhanen, Janne; Kemppinen, Osku; Paton, Mark; Polkko, Jouni; Schmidt, Walter; Siili, Tero; Wray, James; Wilhelm, Mary Beth; Poitrasson, Franck; Patel, Kiran; Gorevan, Stephen; Indyk, Stephen; Paulsen, Gale; Bish, David; Schieber, Juergen; Gondet, Brigitte; Langevin, Yves; Geffroy, Claude; Baratoux, David; Berger, Gilles; Cros, Alain; d'Uston, Claude; Lasue, Jérémie; Lee, Qiu-Mei; Meslin, Pierre-Yves; Pallier, Etienne; Parot, Yann; Pinet, Patrick; Schröder, Susanne; Toplis, Mike; Lewin, Éric; Brunner, Will; Heydari, Ezat; Achilles, Cherie; Oehler, Dorothy; Sutter, Brad; Cabane, Michel; Coscia, David; Israël, Guy; Szopa, Cyril; Robert, François; Sautter, Violaine; Buch, Arnaud; Stalport, Fabien; Coll, Patrice; François, Pascaline; Raulin, François; Teinturier, Samuel; Cameron, James; DeLapp, Dorothea; Dingler, Robert; Jackson, Ryan Steele; Johnstone, Stephen; Lanza, Nina; Little, Cynthia; Nelson, Tony; Williams, Richard B.; Jones, Andrea; Kirkland, Laurel; Baker, Burt; Cantor, Bruce; Caplinger, Michael; Davis, Scott; Duston, Brian; Edgett, Kenneth; Fay, Donald; Hardgrove, Craig; Harker, David; Herrera, Paul; Jensen, Elsa; Kennedy, Megan R.; Krezoski, Gillian; Krysak, Daniel; Lipkaman, Leslie; Malin, Michael; McCartney, Elaina; McNair, Sean; Nixon, Brian; Posiolova, Liliya; Ravine, Michael; Salamon, Andrew; Saper, Lee; Stoiber, Kevin; Supulver, Kimberley; Van Beek, Jason; Van Beek, Tessa; Zimdar, Robert; French, Katherine Louise; Iagnemma, Karl; Miller, Kristen; Summons, Roger; Goesmann, Fred; Goetz, Walter; Hviid, Stubbe; Johnson, Micah; Lefavor, Matthew; Lyness, Eric; Breves, Elly; Fassett, Caleb; Blake, David F.; Bristow, Thomas; Edwards, Laurence; Haberle, Robert; Hoehler, Tori; Hollingsworth, Jeff; Kahre, Melinda; Keely, Leslie; McKay, Christopher; Wilhelm, Mary Beth; Bleacher, Lora; Brinckerhoff, William; Choi, David; Dworkin, Jason P.; Eigenbrode, Jennifer; Floyd, Melissa; Freissinet, Caroline; Garvin, James; Glavin, Daniel; Harpold, Daniel; Jones, Andrea; Mahaffy, Paul; Martin, David K.; McAdam, Amy; Pavlov, Alexander; Raaen, Eric; Smith, Michael D.; Stern, Jennifer; Tan, Florence; Trainer, Melissa; Meyer, Michael; Posner, Arik; Voytek, Mary; Anderson, Robert C.; Aubrey, Andrew; Beegle, Luther W.; Behar, Alberto; Blaney, Diana; Brinza, David; Christensen, Lance; Crisp, Joy A.; DeFlores, Lauren; Ehlmann, Bethany; Feldman, Jason; Feldman, Sabrina; Flesch, Gregory; Jun, Insoo; Keymeulen, Didier; Maki, Justin; Mischna, Michael; Morookian, John Michael; Parker, Timothy; Pavri, Betina; Schoppers, Marcel; Sengstacken, Aaron; Simmonds, John J.; Spanovich, Nicole; Juarez, Manuel de la Torre; Webster, Christopher R.; Yen, Albert; Archer, Paul Douglas; Cucinotta, Francis; Jones, John H.; Niles, Paul; Rampe, Elizabeth; Nolan, Thomas; Fisk, Martin; Radziemski, Leon; Barraclough, Bruce; Bender, Steve; Berman, Daniel; Dobrea, Eldar Noe; Tokar, Robert; Williams, Rebecca M. E.; Cleghorn, Timothy; Huntress, Wesley; Manhès, Gérard; Hudgins, Judy; Olson, Timothy; Stewart, Noel; Sarrazin, Philippe; Vicenzi, Edward; Wilson, Sharon A.; Bullock, Mark; Ehresmann, Bent; Hamilton, Victoria; Hassler, Donald; Peterson, Joseph; Rafkin, Scot; Zeitlin, Cary; Fedosov, Fedor; Golovin, Dmitry; Karpushkina, Natalya; Kozyrev, Alexander; Litvak, Maxim; Malakhov, Alexey; Mitrofanov, Igor; Mokrousov, Maxim; Nikiforov, Sergey; Prokhorov, Vasily; Sanin, Anton; Tretyakov, Vladislav; Varenikov, Alexey; Vostrukhin, Andrey; Kuzmin, Ruslan; Wolff, Michael; Botta, Oliver; Drake, Darrell; Bean, Keri; Lemmon, Mark; Lee, Ella Mae; Sucharski, Robert; Hernández, Miguel Ángel de Pablo; Ávalos, Juan José Blanco; Ramos, Miguel; Kim, Myung-Hee; Malespin, Charles; Plante, Ianik; Muller, Jan-Peter; Navarro-González, Rafael; Ewing, Ryan; Boynton, William; Downs, Robert; Fitzgibbon, Mike; Harshman, Karl; Morrison, Shaunna; Dietrich, William; Kortmann, Onno; Palucis, Marisa; Williams, Amy; Lugmair, Günter; Wilson, Michael A.; Rubin, David; Jakosky, Bruce; Balic-Zunic, Tonci; Frydenvang, Jens; Jensen, Jaqueline Kløvgaard; Kinch, Kjartan; Koefoed, Asmus; Madsen, Morten Bo; Stipp, Susan Louise Svane; Boyd, Nick; Pradler, Irina; Jacob, Samantha; Owen, Tobias; Rowland, Scott; Atlaskin, Evgeny; Savijärvi, Hannu; Boehm, Eckart; Böttcher, Stephan; Burmeister, Sönke; Guo, Jingnan; Köhler, Jan; García, César Martín; Mueller-Mellin, Reinhold; Wimmer-Schweingruber, Robert; McConnochie, Timothy; Benna, Mehdi; Franz, Heather; Bower, Hannah; Brunner, Anna; Blau, Hannah; Boucher, Thomas; Carmosino, Marco; Atreya, Sushil; Elliott, Harvey; Halleaux, Douglas; Rennó, Nilton; Wong, Michael; Pepin, Robert; Elliott, Beverley; Spray, John; Thompson, Lucy; Williams, Joshua; Vasconcelos, Paulo; Bentz, Jennifer; Nealson, Kenneth; Popa, Radu; Kah, Linda C.; Moersch, Jeffrey; Tate, Christopher; Day, Mackenzie; Kocurek, Gary; Hallet, Bernard; Sletten, Ronald; Francis, Raymond; McCullough, Emily; Cloutis, Ed; ten Kate, Inge Loes; Kuzmin, Ruslan; Arvidson, Raymond; Fraeman, Abigail; Scholes, Daniel; Slavney, Susan; Stein, Thomas; Ward, Jennifer; Berger, Jeffrey; Moores, John E.

    2014-01-01

    Sedimentary rocks examined by the Curiosity rover at Yellowknife Bay, Mars, were derived from sources that evolved from an approximately average martian crustal composition to one influenced by alkaline basalts. No evidence of chemical weathering is preserved, indicating arid, possibly cold, paleoclimates and rapid erosion and deposition. The absence of predicted geochemical variations indicates that magnetite and phyllosilicates formed by diagenesis under low-temperature, circumneutral pH, rock-dominated aqueous conditions. Analyses of diagenetic features (including concretions, raised ridges, and fractures) at high spatial resolution indicate that they are composed of iron- and halogen-rich components, magnesium-iron-chlorine-rich components, and hydrated calcium sulfates, respectively. Composition of a cross-cutting dike-like feature is consistent with sedimentary intrusion. The geochemistry of these sedimentary rocks provides further evidence for diverse depositional and diagenetic sedimentary environments during the early history of Mars.

  15. A study on the U speciation in groundwater of a hard rock aquifer in South India

    International Nuclear Information System (INIS)

    Thivya, C.; Chidambaram, S.; Thilagavathi, R.; Nepolian, M.; Adithya, V.S.; Tirumalesh, K.; Prasanna, M.V.

    2015-01-01

    Speciation of uranium indicates the contribution of this ion into different species. An attempt has been made to study the spatial and temporal variations of U speciation in the hard rock aquifer of South India. The major rock types have granulite facies with high grade metamorphic rocks and younger intrusive. It also comprises of Fissile hornblende biotite gneiss, Charnockite, Quartzite, Granite and Flood Plain Alluvium. A total of 108 samples were collected from the handpumps of the study area for two seasons (Pre monsoon and South West monsoon). The groundwater samples were analysed for U and other ions like Ca 2+ , Mg 2+ , Na + and K + , HCO 3 - , Cl - , SO 4 2- , PO 4 3- , NO 3 - , F - , H 4 SiO 4 , pH, EC and TDS using standard procedures

  16. Toward a realistic deformation model of the 2008 magmatic intrusion at Etna from combined DInSAR and GPS observations

    Science.gov (United States)

    Currenti, Gilda; Napoli, Rosalba; Del Negro, Ciro

    2011-12-01

    The combination of (i) DInSAR data, capable of observing deformation pattern at a spatial resolution unachievable with other sparse geodetic measurements, (ii) continuous GPS data, able to provide temporal constraints on source evolution, and (iii) numerical modeling procedures, appropriate to consider a non-uniform opening distribution of a source embedded in a 3D heterogeneous medium, allowed us to infer a complex and realistic deformation model of the magmatic intrusion that occurred in the northern flank of Etna on 13 May 2008. Numerical modeling of ground deformation data defines a near-vertical dyke intruded for 2.5 km starting from a depth of 1400 m asl right below the summit craters and reaching shallow crust level in the northern flank. From the estimated opening distribution of the propagating magma-filled crack, which reached a maximum value of about 2 m, a volumetric expansion of crustal rocks of about 5.3 × 10 6 m 3 was obtained. Also, we clarified the temporal evolution of the northward magmatic intrusion, which lasted just over 5 h with an initial magma propagation velocity of about 1.2 km/h, and decreased to about 0.24 km/h as the driving pressure lowered due to the effusive activity started at southern vents.

  17. Rock Pore Structure as Main Reason of Rock Deterioration

    Science.gov (United States)

    Ondrášik, Martin; Kopecký, Miloslav

    2014-03-01

    Crashed or dimensional rocks have been used as natural construction material, decoration stone or as material for artistic sculptures. Especially old historical towns not only in Slovakia have had experiences with use of stones for construction purposes for centuries. The whole buildings were made from dimensional stone, like sandstone, limestone or rhyolite. Pavements were made especially from basalt, andesite, rhyolite or granite. Also the most common modern construction material - concrete includes large amounts of crashed rock, especially limestone, dolostone and andesite. However, rock as any other material if exposed to exogenous processes starts to deteriorate. Especially mechanical weathering can be very intensive if rock with unsuitable rock properties is used. For long it had been believed that repeated freezing and thawing in relation to high absorption is the main reason of the rock deterioration. In Slovakia for many years the high water absorption was set as exclusion criterion for use of rocks and stones in building industry. Only after 1989 the absorption was accepted as merely informational rock property and not exclusion. The reason of the change was not the understanding of the relationship between the porosity and rock deterioration, but more or less good experiences with some high porous rocks used in constructions exposed to severe weather conditions and proving a lack of relationship between rock freeze-thaw resistivity and water absorption. Results of the recent worldwide research suggest that understanding a resistivity of rocks against deterioration is hidden not in the absorption but in the structure of rock pores in relation to thermodynamic properties of pore water and tensile strength of rocks and rock minerals. Also this article presents some results of research on rock deterioration and pore structure performed on 88 rock samples. The results divide the rocks tested into two groups - group N in which the pore water does not freeze

  18. Repeated cortisol administration does not reduce intrusive memories - A double blind placebo controlled experimental study.

    Science.gov (United States)

    Graebener, Alexandra Heike; Michael, Tanja; Holz, Elena; Lass-Hennemann, Johanna

    2017-11-01

    PTSD is a severe mental disorder, which may develop after exposure to traumatic events and is characterized by intrusive memories. Intrusions are sudden brief sensory memories of the traumatic event, that cause immense distress and impairment in every day functioning. Thus, the reduction of intrusive memories is one of the main aims of PTSD therapy. Recently, the glucocorticoid cortisol has been proposed as a pharmacological option to reduce intrusive memories, because cortisol is known to have memory retrieval inhibiting effects. However, the research on the effects of cortisol administration on intrusive memories is not conclusive. The aim of the present study was to examine if repeated cortisol administration inhibits intrusions and recognition memory in an experimental study using the trauma film paradigm. In a randomized double-blind placebo controlled design participants were exposed to a traumatic film (known to induce intrusions in healthy participants) and received either a low dose of cortisol (20mg) or placebo on the three days following "trauma exposure". Intrusive memories were assessed with an Electronic Diary and an Intrusion Triggering Task. Furthermore, we assessed explicit memory for the traumatic film clip with a recognition test. Contrary to our predictions, the cortisol group did not report fewer intrusions than the placebo group nor did it show diminished performance on the recognition test. Our results show that sole cortisol administration after a traumatic experience cannot reduce intrusive re-experiencing. Copyright © 2017 Elsevier B.V. and ECNP. All rights reserved.

  19. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-04-19

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  20. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  1. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  2. Non-intrusive Load Disaggregation Based on Kernel Density Estimation

    Science.gov (United States)

    Sen, Wang; Dongsheng, Yang; Chuchen, Guo; Shengxian, Du

    2017-05-01

    Aiming at the problem of high cost and difficult implementation of high frequency non-intrusive load decomposition method, this paper proposes a new method based on kernel density estimation(KDE) for low frequency NILM (Non-intrusive load monitoring). The method establishes power reference model of electricity load in different working conditions and appliance’s possible combinations first, then probability distribution is calculated as appliances features by kernel density estimation. After that, target power data is divided by step changes, whose distributions will be compared with reference models, and the most similar reference model will be chosen as the decomposed consequence. The proposed approach was tested with data from the GREEND public data set, it showed better performance in terms of energy disaggregation accuracy compared with many traditional NILM approaches. Our results show good performance which can achieve more than 93% accuracy in simulation.

  3. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  4. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  5. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  6. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  7. An artificial bioindicator system for network intrusion detection.

    Science.gov (United States)

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  8. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  9. Geology, mineralization, U-Pb dating and Sr-Nd isotope geochemistry of intrusive bodies in northeast of Kashmar

    Directory of Open Access Journals (Sweden)

    Alireza Almasi

    2015-04-01

    Full Text Available Alireza Almasi1, Mohammad Hassan Karimpour1*, Khosrow Ebrahimi Nasrabadi1, Behnam Rahimi1, Urs KlÖtzli2 and Jose Francisco Santos3 Introduction The study area is located in central part of the Khaf- Kashmar-Bardeskan belt which is volcano-plutonic belt at the north of the Dorouneh fault in the north of Lut block. The north of the Lut block is affected by tectonic rotation and subduction processes which occur in the east of Iran (Tirrul et al., 1983. The magmatism of Lut block begins in Jurassic and continues in Tertiary (Aghanabati, 1995. Karimpour (Karimpour, 2006 pointed out the Khaf-Kashmar-Bardeskan belt has significant potential for IOCG type mineralization such as Kuh-e-Zar, Tannurjeh, and Sangan (Karimpour, 2006; Mazloumi, 2009. The data gathered on the I-type intrusive rocks include their field geology, petrography, U–Pb zircon dating and Sr–Nd isotope and also alteration and mineralization in the study area. Materials and methods - Preparation of 150 thin sections of rock samples for study of petrography and alteration of the intrusive rocks. - Magnetic susceptibility measuring of intrusive rocks. - U-Pb dating in zircon of I-type intrusive rocks by Laser-Ablation Multi Collector ICP-MS method. - Sr-Nd analysis on 5 samples of I-type intrusive rocks by Multi-Collector Thermal Ionization Mass Spectrometer (TIMS VG Sector 54 instrument. - Mineralography and paragenetic studies of ore-bearing quartz veins and geochemical analysis for 28 samples. - Production of the geology, alteration and mineralization maps by scale: 1:20000 in GIS. Results Oblique subduction in southern America initiated an arc-parallel fault and shear zones in the back of continental magmatic arc (Sillitoe, 2003. Because of this event, pull-apart basins were formed and high-K to shoshonitic calc-alkalineI- and A-type magmatism occur (Sillitoe, 2003. Most important deposits accompany with this magmatism are Au-Cu deposits types and Fe-Skarns (Sillitoe, 2003. We have

  10. Men’s stranger intrusions : rethinking street harassment.

    OpenAIRE

    Vera-Gray, F.

    2016-01-01

    Women's experiences of intrusive men in public space, popularly termed ‘street harassment’, are the most understudied yet commonly experienced forms of violence against women. Despite acknowledgement of its importance, an explicit debate on naming – with an exploration of how language creates both openings and restrictions of what can be said – is yet to be had in the literature. This paper begins this conversation, detailing the benefits and challenges in current terminology, and exploring t...

  11. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  12. Research on chronicles correlation based network intrusion detection techniques

    International Nuclear Information System (INIS)

    Han Zhengping; Jin Yan; Chen Taiwei; Xu Rongsheng

    2007-01-01

    According to some problems existed in network intrusion detection technique, such as alerts overwhelming, false-positives and lack of alert description, this paper introduces chronicle correlation method to alert events analysis by some correlative examples. With designed chronicle recognition language, portscan's alerts can be reduced, false-positives in buffer overflow's alerts can be detected, and NetBios DCERPC attack's alerts semantics can be improved. (authors)

  13. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  14. Animal intrusion status report for fiscal year 1989

    Energy Technology Data Exchange (ETDEWEB)

    Landeen, D.S.

    1990-08-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

  15. Intrusion of anterior teeth to improve smile esthetics.

    Science.gov (United States)

    Chandrasekharan, Deepak; Balaji, S M

    2010-03-01

    A gummy smile is probably one of the most common causes of an unaesthetic smile. Causes include overeruption of maxillary anterior teeth and maxillary vertical excess. Intrusion of maxillary anterior teeth with Orthodontics and Le forte I superior repositioning may form a part of the solution. Of late the use of micro implants have improved the smile esthetics of borderline surgical cases by allowing the Orthodontist to intrude teeth more than what was possible with conventional Orthodontics.

  16. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  17. Mechanisms of extrusion and intrusion formation in fatigued crystalline materials

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Man, Jiří

    2014-01-01

    Roč. 596, FEB (2014), s. 15-24 ISSN 0921-5093 R&D Projects: GA ČR(CZ) GAP108/10/2371; GA ČR(CZ) GA13-23652S Institutional support: RVO:68081723 Keywords : Fatigue * Extrusion * Intrusion * Persistent slip band * Fatigue crack initiation Subject RIV: JL - Materials Fatigue, Friction Mechanics Impact factor: 2.567, year: 2014

  18. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  19. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  20. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  1. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  2. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

    Directory of Open Access Journals (Sweden)

    Al Quhtani Masoud

    2017-03-01

    Full Text Available Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

  3. Intrusive imagery in people with a specific phobia of vomiting.

    Science.gov (United States)

    Price, Katy; Veale, David; Brewin, Chris R

    2012-03-01

    AND OBJECTIVES: Specific phobia of vomiting (SPOV) is a chronic, pervasive and debilitating disorder which is clinically regarded as difficult to treat. Research into its development, maintenance and treatment has been limited. This study explored the prevalence and characteristics of intrusive mental imagery in people with SPOV. It investigated the relationship between presence of imagery and severity of phobia. Thirty-six participants meeting DSM-IV criteria for SPOV were recruited from online support groups and outpatient clinics. A semi-structured quantitative interview was administered. Twenty-nine (81%) participants reported multi-sensory intrusive imagery of adult (52%) and childhood memories (31%) and worst case scenarios ("flashforwards") of vomiting (17%). Extent of imagery was significantly related to severity of phobia. Participants primarily fearing others vomiting had less severe phobic symptoms. No control group was used and a heterogeneous sample of clinical and community participants was recruited. Correlational data comparing extent of imagery with severity of SPOV symptoms were derived from as yet unvalidated measures. Intrusive mental imagery is a clinically important feature of SPOV and may contribute to its maintenance. Causality needs to be demonstrated. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Dimensionality reduction using Principal Component Analysis for network intrusion detection

    Directory of Open Access Journals (Sweden)

    K. Keerthi Vasan

    2016-09-01

    Full Text Available Intrusion detection is the identification of malicious activities in a given network by analyzing its traffic. Data mining techniques used for this analysis study the traffic traces and identify hostile flows in the traffic. Dimensionality reduction in data mining focuses on representing data with minimum number of dimensions such that its properties are not lost and hence reducing the underlying complexity in processing the data. Principal Component Analysis (PCA is one of the prominent dimensionality reduction techniques widely used in network traffic analysis. In this paper, we focus on the efficiency of PCA for intrusion detection and determine its Reduction Ratio (RR, ideal number of Principal Components needed for intrusion detection and the impact of noisy data on PCA. We carried out experiments with PCA using various classifier algorithms on two benchmark datasets namely, KDD CUP and UNB ISCX. Experiments show that the first 10 Principal Components are effective for classification. The classification accuracy for 10 Principal Components is about 99.7% and 98.8%, nearly same as the accuracy obtained using original 41 features for KDD and 28 features for ISCX, respectively.

  5. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  6. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  7. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  8. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  9. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  10. Reduction of saltwater intrusion by modifying hydraulic conductivity

    Science.gov (United States)

    Strack, O. D. L.; Stoeckl, L.; Damm, K.; Houben, G.; Ausk, B. K.; de Lange, W. J.

    2016-09-01

    We present an approach for reducing saltwater intrusion in coastal aquifers by artificially reducing the hydraulic conductivity in the upper part of selected areas by using a precipitate. We apply a previously presented analytical approach to develop formulas useful for the design of artificial barriers. Equations for the location of the tip of the saltwater wedge are presented and verified through a sand-tank experiment. The analysis is capable of computing discharges exactly, but requires the Dupuit-Forchheimer approximation to compute points of the interface between flowing fresh and stationary saltwater. We consider a vertical coastline and boundaries in the freshwater zone of either given discharge or given head. We demonstrate in the paper that reduction of the hydraulic conductivity in the upper part of a coastal aquifer will result in a decrease of saltwater intrusion, and present analytic expressions that can be used for design purposes. The previously presented analytical approach can be applied to design systems to reduce saltwater intrusion caused by pumping inland from the zone that contains saline groundwater.

  11. Effects of recharge wells and flow barriers on seawater intrusion.

    Science.gov (United States)

    Luyun, Roger; Momii, Kazuro; Nakagawa, Kei

    2011-01-01

    The installation of recharge wells and subsurface flow barriers are among several strategies proposed to control seawater intrusion on coastal groundwater systems. In this study, we performed laboratory-scale experiments and numerical simulations to determine the effects of the location and application of recharge wells, and of the location and penetration depth of flow barriers, on controlling seawater intrusion in unconfined coastal aquifers. We also compared the experimental results with existing analytical solutions. Our results showed that more effective saltwater repulsion is achieved when the recharge water is injected at the toe of the saltwater wedge. Point injection yields about the same repulsion compared with line injection from a screened well for the same recharge rate. Results for flow barriers showed that more effective saltwater repulsion is achieved with deeper barrier penetration and with barriers located closer to the coast. When the flow barrier is installed inland from the original toe position however, saltwater intrusion increases with deeper barrier penetration. Saltwater repulsion due to flow barrier installation was found to be linearly related to horizontal barrier location and a polynomial function of the barrier penetration depth. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  12. From stones to rocks

    Science.gov (United States)

    Mortier, Marie-Astrid; Jean-Leroux, Kathleen; Cirio, Raymond

    2013-04-01

    With the Aquila earthquake in 2009, earthquake prediction is more and more necessary nowadays, and people are waiting for even more accurate data. Earthquake accuracy has increased in recent times mainly thanks to the understanding of how oceanic expansion works and significant development of numerical seismic prediction models. Despite the improvements, the location and the magnitude can't be as accurate as citizen and authorities would like. The basis of anticipating earthquakes requires the understanding of: - The composition of the earth, - The structure of the earth, - The relations and movements between the different parts of the surface of the earth. In order to answer these questions, the Alps are an interesting field for students. This study combines natural curiosity about understanding the predictable part of natural hazard in geology and scientific skills on site: observing and drawing landscape, choosing and reading a representative core drilling, replacing the facts chronologically and considering the age, the length of time and the strength needed. This experience requires students to have an approach of time and space radically different than the one they can consider in a classroom. It also limits their imagination, in a positive way, because they realize that prediction is based on real data and some of former theories have become present paradigms thanks to geologists. On each location the analyzed data include landscape, core drilling and the relation established between them by students. The data is used by the students to understand the meaning, so that the history of the formation of the rocks tells by the rocks can be explained. Until this year, the CBGA's perspective regarding the study of the Alps ground allowed students to build the story of the creation and disappearance of the ocean, which was a concept required by French educational authorities. But not long ago, the authorities changed their scientific expectations. To meet the

  13. Carbonate-silicate melt immiscibility, REE mineralising fluids, and the evolution of the Lofdal Intrusive Suite, Namibia

    Science.gov (United States)

    Bodeving, Sarah; Williams-Jones, Anthony E.; Swinden, Scott

    2017-01-01

    The Lofdal Intrusive Suite, Namibia, consists of calcio-carbonatite and silica-undersaturated alkaline intrusive rocks ranging in composition from phono-tephrite to phonolite (and nepheline syenite). The most primitive of these rocks is the phono-tephrite, which, on the basis of its Y/Ho and Nb/Ta ratios, is interpreted to have formed by partial melting of the mantle. Roughly linear trends in major and trace element contents from phono-tephrite to phonolite and nepheline syenite indicate that the latter two rock types evolved from the phono-tephrite by fractional crystallisation. The nepheline syenite, however, has a lower rare earth element (REE) content than the phonolite. The carbonatite has a primitive mantle-normalised REE profile roughly parallel to that of the silica-undersaturated alkaline igneous rocks, although the absolute REE concentrations are higher. Like the phono-tephrite, it also has a mantle Y/Ho ratio. However, the Nb/Ta and Zr/Hf ratios are significantly higher. Moreover, the carbonatite displays strong negative Ta, Zr and Hf anomalies on spidergrams, whereas the silicate rocks display positive anomalies for these elements. Significantly, this behaviour is predicted by the corresponding carbonatite-silicate melt partition coefficients, as is the behaviour of the REE. Based on these observations, we interpret the carbonatite to represent an immiscible liquid that exsolved from the phono-tephrite or possibly the phonolite melt. The result was a calcio-carbonatite that is enriched in the heavy REE (HREE) relative to most other carbonatites. Fluids released from the corresponding magma are interpreted to have been the source of the REE mineralisation that is currently the target of exploration. 2. The composition of feldspar in nepheline syenite, fenite, calcio-carbonatite and phonolite plotted on the feldspar ternary classification diagram modified after Schairer (1950) in terms of the components albite (Ab), orthoclase (Or) and anorthite (An

  14. Distribution, facies, ages, and proposed tectonic associations of regionally metamorphosed rocks in Southwestern Alaska and the Alaska Peninsula

    Science.gov (United States)

    Dusel-Bacon, Cynthia; Doyle, Elizabeth O.; Box, Stephen E.

    1996-01-01

    The oldest dated metamorphic sequence in Alaska, the fault-bounded Kilbuck Terrane, consists of continental rocks that were metamorphosed under amphibolite-facies conditions during early Proterozoic (1.77 Ga) time. Proterozoic or early Paleozoic metamorphic ages are also possible for greenschist- and amphibolite-facies continental rocks in interior Alaska (Ruby and Nixon Fork terranes). Medium-grade metamorphism on the Alaska Peninsula accompanied intrusion of a Jurassic arc. North of Bristol Bay, low-grade, locally high-pressure Mesozoic metamorphism is attributed to the progressive underthrusting of a subduction complex beneath an oceanic arc followed by underthrusting of the Kilbuck Terrane beneath the subduction complex.

  15. Physical properties and petrologic description of rock samples from an IOCG mineralized area in the northern Fennoscandian Shield, Sweden

    DEFF Research Database (Denmark)

    Sandrin, Alessandro; Edfelt, Å.; Waight, Tod Earle

    2009-01-01

    magnetization, variation of magnetic susceptibility with temperature, Curie temperature and density). The major Cu-prospect in the area has been studied by magnetic and electron microprobe analyses of four selected rock samples. The samples are from an exploration well that intersects the main Cu mineralized......, microprobe observations indicate that Fe-sulfides are present in negligible amounts in the samples from the Tjårrojåkka area. The strong spatial relationship of Cu-minerals (e.g., chalcopyrite) and the oxidation of magnetite to hematite suggest that the presence of rocks with low magnetic susceptibility......The Tjårrojåkka Fe-Cu prospect in northern Sweden is considered an example of a Fe-oxide Cu-Au (IOCG) deposit and is hosted in metamorphosed Paleoproterozoic volcanic and intrusive rocks. Rock samples from 24 outcrops were collected for petrophysical analysis (magnetic susceptibility, remanent...

  16. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  17. A smart rock

    Science.gov (United States)

    Pressel, Phil

    2014-12-01

    This project was to design and build a protective weapon for a group of associations that believed in aliens and UFO's. They collected enough contributions from societies and individuals to be able to sponsor and totally fund the design, fabrication and testing of this equipment. The location of this facility is classified. It also eventually was redesigned by the Quartus Engineering Company for use at a major amusement park as a "shoot at targets facility." The challenge of this project was to design a "smart rock," namely an infrared bullet (the size of a gallon can of paint) that could be shot from the ground to intercept a UFO or any incoming suspicious item heading towards the earth. Some of the challenges to design this weapon were to feed cryogenic helium at 5 degrees Kelvin from an inair environment through a unique rotary coupling and air-vacuum seal while spinning the bullet at 1500 rpm and maintain its dynamic stability (wobble) about its spin axis to less than 10 micro-radians (2 arc seconds) while it operated in a vacuum. Precision optics monitored the dynamic motion of the "smart rock."

  18. Rock Properties Model

    International Nuclear Information System (INIS)

    Lum, C.

    2004-01-01

    The purpose of this model report is to document the Rock Properties Model version 3.1 with regard to input data, model methods, assumptions, uncertainties and limitations of model results, and qualification status of the model. The report also documents the differences between the current and previous versions and validation of the model. The rock properties model provides mean matrix and lithophysae porosity, and the cross-correlated mean bulk density as direct input to the ''Saturated Zone Flow and Transport Model Abstraction'', MDL-NBS-HS-000021, REV 02 (BSC 2004 [DIRS 170042]). The constraints, caveats, and limitations associated with this model are discussed in Section 6.6 and 8.2. Model validation accomplished by corroboration with data not cited as direct input is discussed in Section 7. The revision of this model report was performed as part of activities being conducted under the ''Technical Work Plan for: The Integrated Site Model, Revision 05'' (BSC 2004 [DIRS 169635]). The purpose of this revision is to bring the report up to current procedural requirements and address the Regulatory Integration Team evaluation comments. The work plan describes the scope, objectives, tasks, methodology, and procedures for this process

  19. Rock critics as 'Mouldy Modernists'

    Directory of Open Access Journals (Sweden)

    Becky Shepherd

    2011-09-01

    Full Text Available Contemporary rock criticism appears to be firmly tied to the past. The specialist music press valorise rock music of the 1960s and 1970s, and new emerging artists are championed for their ‘retro’ sounding music by journalists who compare the sound of these new artists with those included in the established ‘canon’ of rock music. This article examines the narrative tropes of authenticity and nostalgia that frame the retrospective focus of this contemporary rock writing, and most significantly, the maintenance of the rock canon within contemporary popular culture. The article concludes by suggesting that while contemporary rock criticism is predominately characterised by nostalgia, this nostalgia is not simply a passive romanticism of the past. Rather, this nostalgia fuels a process of active recontextualisation within contemporary popular culture.

  20. Petrogenesis and metallogenesis of the Wajilitag and Puchang Fe-Ti oxide-rich intrusive complexes, northwestern Tarim Large Igneous Province

    Science.gov (United States)

    Zhang, Dongyang; Zhang, Zhaochong; Huang, He; Cheng, Zhiguo; Charlier, Bernard

    2018-04-01

    The Wajilitag and Puchang intrusive complexes of the Tarim large igneous province (TLIP) are associated with significant resources of Fe-Ti oxide ores. These two mafic-ultramafic intrusions show differences in lithology and mineral chemistry. Clinopyroxenite and melagabbro are the dominant rock types in the Wajilitag complex, whereas the Puchang complex is generally gabbroic and anorthositic in composition with minor plagioclase-bearing clinopyroxenites in the marginal zone. Disseminated Fe-Ti oxide ores are found in the Wajilitag complex and closely associated with clinopyroxenites, whereas the Puchang complex hosts massive to disseminated Fe-Ti oxide ores mainly within its gabbroic rocks. The Wajilitag intrusive rocks are characterized by a restricted range of initial 87Sr/86Sr ratios (0.7038-0.7048) and positive εNd(t) (+0.04 - +3.01), indicating insignificant involvement of continental crustal contamination. The slightly higher initial 87Sr/86Sr ratios (0.7039-0.7059) and lower εNd(t) values (-1.05 - +2.35) of the Puchang intrusive rocks also suggest that the isotopic characteristics was controlled primarily by their mantle source, rather than by crustal contamination. Both complexes have Sr-Nd isotopic compositions close the neighboring kimberlitic rocks and their hosted mantle xenoliths in the TLIP. This indicates that the ferrobasaltic parental magmas were most probably originated from partial melting of a metasomatized subcontinental lithospheric mantle, modified recently with subduction-related materials by the impingement of the ascending mantle plume. The recycled subduction-related materials preserved in the lithospheric mantle could play a key role in the formation of the parental Fe-rich magmas in the context of an overall LIP system. The distinct variations in mineral assemblage for each complex and modeled results indicated that the Wajilitag and Puchang complexes experienced different crystallization path. Fe-Ti oxides in Wajilitag joined the

  1. Geochemistry of a contact metamorphosed zone: implications for radwaste disposal in crystalline rocks

    International Nuclear Information System (INIS)

    Brookins, D.G.; Cohen, L.H.; Wollenberg, H.A.

    1982-01-01

    The Eldora stock (Colorado) intruded the 1.5 billion year old Idaho Springs Formation 58 million years ago. Radiogenic 40 Ar was lost from, and 89 Sr redistributed in, recrystallized minerals as a function of distance from the contract. Previous studies (1) have shown that the elemental and isotopic systematics for K, Ar, Rb, Sr, U, and Pb can be explained by heating of the intruded rocks as a function of distance from the contact. The Eldora stock is one of the best documented intrusives in terms of geochronologic, mineralogic, geochemical and heat flow interpretations (1). New studies have been undertaken to address the problem of elemental migration from the high SiO 2 stock into the more basic Idaho Springs rocks; as this allows the stock to be treated as analogue for high temperature radwaste without benefit of canister or overpack. Our data show no movement of elements from the stock into the intruded rocks except perhaps within 2 to 3 m. from the contact where magma infiltration is noted. Lanthanide and actinide variations in the intruded rocks are due to pre-stock emplacement events, and Rb-Sr whole rock and stable 0 isotopic data argue for closed system behavior of the Idaho Springs Formation. The intruded rocks are thus considered favorable for consideration for radwaste storage

  2. Mechanism and duration of plutonic processes in oceanic crust: the example of the South Rallier du Baty intrusive complex, Kerguelen Archipelago

    Science.gov (United States)

    Ponthus, Léandre; Guillaume, Damien; de Saint Blanquat, Michel; le Romancer, Marc; Pearson, Norman; Grégoire, Michel; O'Reilly, Sue Y.

    2017-04-01

    The Kerguelen plateau was initiated by a large-scale tholeiitic-transitional magmatic episode. The rocks of the Kerguelen archipelago, dominated by basalts, record an evolution from this early transitional magmatism to Kerguelen plume-related alkaline magmatism. The latter is characterised by a wide range of volcanic and plutonic rocks from basic to differentiated felsic rocks, which outcrop at different locations in the archipelago but are especially abundant in the southwest of Kerguelen archipelago. This is the location of outcrop of the South Rallier Du Baty Intrusive Center (SRDBIC) which constitutes the largest plutonic body, classically interpreted as a cauldron. The SRDBIC is an elliptical plutonic body of 13 by a minimum of 17 km with a N100-110 long axis. The rock composition range from gabbro to quartz rich-syenite and define a typical alkaline oversaturated magmatic serie. The contact is generally outward dipping but we have identified two contrasting geometries: one steeply dipping and crosscutting the basaltic lava flows, the other more shallowly dipping and concordant. At the scale of the Kerguelen archipelago, the orientation of the basaltic lava flows constituting the wall-rocks of the SRDBIC is very regular but is not strictly horizontal, showing a low dip (3-5°) toward the SE, due to recent tilting. We observe a change in this orientation when approaching the SRDBIC: all around the east and south margins of the SRDBIC, we measure a progressive tilting of the plateau basalts, reaching dips of 20-40° away from the SRDBIC. The amplitude of this tilt suggests that the thickness of the SRDIC is between 2.5 and 3.5 km, defining a total volume of 200-400 km3. The spatial coincidence between this change in basalt orientation and the intrusive centre clearly shows a causal relationship related to uplifting of the plateau basalts during the formation of the SRDBIC. Field observations and fabric studies show that the plutonic complex was formed by

  3. Scoping calculation of nuclides migration in engineering barrier system for effect of volume expansion due to overpack corrosion and intrusion of the buffer material

    Energy Technology Data Exchange (ETDEWEB)

    Yoshita, Takashi; Ishihara, Yoshinao; Ishiguro, Katsuhiko; Ohi, Takao [Waste Isolation Research Division, Waste Management and Fuel Cycle Research Center, Tokai Works, Japan Nuclear Cycle Development Inst., Tokai, Ibaraki (Japan); Nakajima, Kunihiko [Nuclear Energy System Incorporated, Tokyo (Japan)

    1999-11-01

    Corrosion of the carbon steel overpack leads to a volume expansion since the specific gravity of corrosion products is smaller than carbon steel. The buffer material is compressed due to the corrosive swelling, reducing its thickness and porosity. On the other hand, buffer material may be extruded into fractures of the surrounding rock and this may lead to a deterioration of the planned functions of the buffer, including retardation of nuclides migration and colloid filtration. In this study, the sensitivity analyses for the effect of volume expansion and intrusion of the buffer material on nuclide migration in the engineering barrier system are carried out. The sensitivity analyses were performed on the decrease in the thickness of the buffer material in the radial direction caused by the corrosive swelling, and the change in the porosity and dry density of the buffer caused by both compacting due to corrosive swelling and intrusion of buffer material. As results, it was found the maximum release rates of relatively shorter half-life nuclides from the outside of the buffer material decreased for taking into account of a volume expansion due to overpack corrosion. On the other hand, the maximum release rates increased when the intrusion of buffer material was also taking into account. It was, however, the maximum release rates of longer half-life nuclides, such as Cs-137 and Np-237, were insensitive to the change of buffer material thickness, and porosity and dry density of buffer. (author)

  4. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  5. Porosity characterization of fresh and altered stones by ultrasound velocity and mercury intrusion porosimetry

    Science.gov (United States)

    Scrivano, Simona; Gaggero, Laura; Gisbert Aguilar, Josep

    2016-04-01

    Porosity is the main physical feature dealing with rocks durability and storage capacity. The analysis of this parameter is key factor in predicting rock performances (Molina et al., 2011). There are several techniques that can be applied to acquire the widest information range possible about pores (e.g. size, shape, distribution), leading to a better understanding of decay processes and trapping capacity. The coupling of a detailed minero-petrographic analysis with physical measures such as ultrasounds and mercury intrusion porosimetry (MIP) proved to be a valid tool for understanding the porous network and its evolution during weathering processes. Both fresh and salt-weathered samples were analysed to investigate the modification triggered in the porous network by crystallization. The ageing process was induced using a Na2SO4 saturated saline solution with the partial continuous immersion method (Benavente et al., 2001). The study was addressed to four sedimentary lithotypes: 1) Arenaria Macigno, a greywacke made up of thickened clasts of quartz, plagioclase and K-feldspar cemented by micritic calcite and phyllosilicates; 2) Breccia Aurora, a calcareous breccia with nodules of compact limestone and micritic cement joints; 3) Rosso Verona, a biomicrite where the compact bio-micrite matrix is cut by clay minerals veins; and 4) Vicenza Stone, an organogenic limestone rich in micro- and macro foraminifera, algae, bryozoans and remains of echinoderms, with iron oxides. An appropriate description of the porous network variation and recognition of the origin of secondary porosity was attained. The study defined that the pore shape and distribution (anisotropy coefficient K) has a fluctuation up to the 50% after weathering treatments and pore-size distribution (defined in a range between 0,0025 - 75 μm), allowing modelling the mechanisms of water transport and evaluating decay susceptibility of these lithotypes. Molina E, Cultrone G, Sebastián E, Alonso FJ, Carrizo L

  6. An investigation of potential neural correlates of intrusive retrieval of distressing memories.

    Science.gov (United States)

    Battaglini, Eva; Liddell, Belinda J; Das, Pritha; Malhi, Gin S; Felmingham, Kim; Bryant, Richard A

    2018-03-01

    Despite the prevalence of intrusive memories across psychological disorders, little is known about the neural networks that underpin this form of memory. This study used functional magnetic resonance imaging (fMRI) to identify neural circuits associated with the retrieval of intrusive memories. Participants with moderate levels of anxiety (N = 30) underwent a cold pressor task to induce a physiological stress response, after which they viewed 10 neutral and 10 negative film clips. In a method designed to induce intrusive memories, participants then completed an fMRI scan in which they viewed short (2 s) depictions of neutral components from the original film clips. There were no significant differences in activations during intrusion and non-intrusion responses. Exploratory analyses comparing intrusive responses to neutral stimuli found the insula, inferior frontal gyrus, precuneus, right cerebellum and bilateral supplementary motor area were uniquely activated during experience of intrusions (compared to the neutral cue baseline), whereas no significant activations were in response to negative scenes that did not trigger intrusions. This study did not compare the different neural processes implicated in intrusive and intentional emotional memories. The limited intrusions that could be elicited in the scanning environment restricted the number of trials that could be employed. Although no differences in neural activations were observed between intrusive and non-intrusive responses, the observation of precuneus involvement is consistent with models that propose that intrusive memories are impacted by the extent to which there is contextual integration of the relevant memories. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Rock.XML - Towards a library of rock physics models

    Science.gov (United States)

    Jensen, Erling Hugo; Hauge, Ragnar; Ulvmoen, Marit; Johansen, Tor Arne; Drottning, Åsmund

    2016-08-01

    Rock physics modelling provides tools for correlating physical properties of rocks and their constituents to the geophysical observations we measure on a larger scale. Many different theoretical and empirical models exist, to cover the range of different types of rocks. However, upon reviewing these, we see that they are all built around a few main concepts. Based on this observation, we propose a format for digitally storing the specifications for rock physics models which we have named Rock.XML. It does not only contain data about the various constituents, but also the theories and how they are used to combine these building blocks to make a representative model for a particular rock. The format is based on the Extensible Markup Language XML, making it flexible enough to handle complex models as well as scalable towards extending it with new theories and models. This technology has great advantages as far as documenting and exchanging models in an unambiguous way between people and between software. Rock.XML can become a platform for creating a library of rock physics models; making them more accessible to everyone.

  8. Rock and soil rheology

    International Nuclear Information System (INIS)

    Cristescu, N.; Ene, H.I.

    1988-01-01

    The aim of the Euromech Colloquium 196 devoted to Rock and Soil Rheology is to review some of the main results obtained in the last years in this field of research and also to formulate some of the major not yet solved problems which are now under consideration. Exchange of opinions and scientific discussions are quite helpful mainly in those areas where some approaches are controversial and the progress made is quite fast. That is especially true for the rheology of geomaterials, domain of great interest for mining and petroleum engineers, engineering geology, seismology, geophysics, civil engineering, nuclear and industrial waste storage, geothermal energy storage, caverns for sports, culture, telecommunications, storage of goods and foodstuffs (cold, hot and refrigerated storages), underground oil and natural gas reservoirs etc. Some of the last obtained results are mentioned in the present volume. (orig./HP)

  9. Rock the Globe

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    Created in 2005, the Swiss rock band "Wind of Change" is now candidate for the Eurovision Song Contest 2011 with a new song " Night & Light " with the music video filmed at CERN.   With over 20 gigs under their belt and two albums already released, the five members of the band (Alex Büchi, vocals; Arthur Spierer, drums; David Gantner, bass; Romain Mage and Yannick Gaudy, guitar) continue to excite audiences. For their latest composition "Night & Light", the group filmed their music video in the Globe of Science and Innovation. Winning the Eurovision contest would be a springboard in their artistic career for these young musicians. The selection results will be available December 11, 2010.      

  10. Geochemistry and origin of metamorphosed mafic rocks from the Lower Paleozoic Moretown and Cram Hill Formations of North-Central Vermont: Delamination magmatism in the western New England appalachians

    Science.gov (United States)

    Coish, Raymond; Kim, Jonathan; Twelker, Evan; Zolkos, Scott P.; Walsh, Gregory J.

    2015-01-01

    The Moretown Formation, exposed as a north-trending unit that extends from northern Vermont to Connecticut, is located along a critical Appalachian litho-tectonic zone between the paleomargin of Laurentia and accreted oceanic terranes. Remnants of magmatic activity, in part preserved as metamorphosed mafic rocks in the Moretown Formation and the overlying Cram Hill Formation, are a key to further understanding the tectonic history of the northern Appalachians. Field relationships suggest that the metamorphosed mafic rocks might have formed during and after Taconian deformation, which occurred at ca. 470 to 460 Ma. Geochemistry indicates that the sampled metamorphosed mafic rocks were mostly basalts or basaltic andesites. The rocks have moderate TiO2 contents (1–2.5 wt %), are slightly enriched in the light-rare earth elements relative to the heavy rare earths, and have negative Nb-Ta anomalies in MORB-normalized extended rare earth element diagrams. Their chemistry is similar to compositions of basalts from western Pacific extensional basins near volcanic arcs. The metamorphosed mafic rocks of this study are similar in chemistry to both the pre-Silurian Mount Norris Intrusive Suite of northern Vermont, and also to some of Late Silurian rocks within the Lake Memphremagog Intrusive Suite, particularly the Comerford Intrusive Complex of Vermont and New Hampshire. Both suites may be represented among the samples of this study. The geochemistry of all samples indicates that parental magmas were generated in supra-subduction extensional environments during lithospheric delamination.

  11. Geochemical Data for Stream-Sediment, Surface-Water, Rock, and Vegetation Samples from Red Mountain (Dry Creek), an Unmined Volcanogenic Massive Sulfide Deposit in the Bonnifield District, Alaska Range, East-Central Alaska

    Science.gov (United States)

    Giles, Stuart A.; Eppinger, Robert G.; Granitto, Matthew; Zelenak, Philip P.; Adams, Monique G.; Anthony, Michael W.; Briggs, Paul H.; Gough, Larry P.; Hageman, Philip L.; Hammarstrom, Jane M.; Horton, John D.; Sutley, Stephan J.; Theodorakos, Peter M.; Wolf, Ruth E.

    2007-01-01

    North-central and northeast Nevada contains numerous large plutons and smaller stocks but also contains many small, shallowly emplaced intrusive bodies, including dikes, sills, and intrusive lava dome complexes. Decades of geologic investigations in the study area demonstrate that many ore deposits, representing diverse ore deposit types, are spatially, and probably temporally and genetically, associated with these igneous intrusions. However, despite the number and importance of igneous instrusions in the study area, no synthesis of geochemical data available for these rocks has been completed. This report presents a synthesis of composition and age data for these rocks. The product represents the first phases of an effort to evaluate the time-space-compositional evolution of Mesozoic and Cenozoic magmatism in the study area and identify genetic associations between magmatism and mineralizing processes in this region.

  12. Clumped isotopes complement petrological data in the investigation of contact metamorphic aureoles: a case study from the Middle Triassic Monzoni intrusion (Northern Italy)

    Science.gov (United States)

    Müller, Inigo Andreas; Storck, Julian-Christopher; Brack, Peter; Bernasconi, Stefano M.

    2017-04-01

    Carbonate clumped isotope thermometry is a technique which measures the abundance of the 13C-18O-16O2 isotopologue in carbonate rocks. Its abundance is solely dependent on the formation temperature of the carbonate minerals, which makes this still novel method very attractive for research on paleoclimate or low temperature diagenetic processes. If carbonate rocks are exposed to high temperatures as during contact metamorphism or deep burial, the clumped isotope thermometer suffers from solid state reordering, destroying the primary temperature signal. However, this does not mean clumped isotopes cannot be applied on carbonates that were heated in high temperature regimes. In contrast it offers a great tool to track the extent a carbonate was heated and reveal secondary carbonate precipitation due to alteration by circulating fluids. We used carbonates from the contact aureole of the Monzoni intrusion in northern Italy to test the application of clumped isotopes in such an extreme environment. Our measurements show that solid state reordering of the clumped isotope signature and thus an increased temperature signal occurred already 3 km distal from the contact. In contrast, mineral paragenesis studies can only reconstruct the strong temperature decrease within 1.5 km from the contact, whereas carbonates exposed to temperatures below 300 °C do not form mineral assemblages allowing the reconstruction of temperatures. Towards the contact of the Monzoni intrusion clumped isotope data showed again decreasing temperatures and a change in their oxygen isotope composition. This probably reflects the later stage alteration of circulating fluids and subsequent precipitation of secondary carbonates. Our findings show that clumped isotopes are a powerful tool to estimate the extent of contact metamorphism in the cooler part of the aureole at temperatures up to 300 °C. Clumped isotope studies can complement petrological data in the low temperature range to improve thermal

  13. Rock Art in Kurdistan Iran

    Directory of Open Access Journals (Sweden)

    Jamal Lahafian

    2013-12-01

    Full Text Available Kurdistan, with great potential and prehistoric resources, has numerous petroglyphs in different areas of the province. During the last 14 years of extensive field study, more than 30 sites of rock art have been identified and introduced by the author. In this article, we summarize these rock art areas in Iranian Kurdistan.

  14. Beach rock from Goa Coast

    Digital Repository Service at National Institute of Oceanography (India)

    Setty, M.G.A.P.; Wagle, B.G.

    Beach rock is a common rock type in many parts of the southern hemisphere and also some areas north of the equator. Its distribution particularly in the Indian Ocean islands and atolls and coasts of India is reviewed. The mineralogic and faunal...

  15. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  16. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  17. Rock strength under explosive loading

    International Nuclear Information System (INIS)

    Rimer, N.; Proffer, W.

    1993-01-01

    This presentation emphasizes the importance of a detailed description of the nonlinear deviatoric (strength) response of the surrounding rock in the numerical simulation of underground nuclear explosion phenomenology to the late times needed for test ban monitoring applications. We will show how numerical simulations which match ground motion measurements in volcanic tuffs and in granite use the strength values obtained from laboratory measurements on small core samples of these rocks but also require much lower strength values after the ground motion has interacted with the rock. The underlying physical mechanisms for the implied strength reduction are not yet well understood, and in fact may depend on the particular rock type. However, constitutive models for shock damage and/or effective stress have been used successfully at S-Cubed in both the Geophysics Program (primarily for DARPA) and the Containment Support Program (for DNA) to simulate late time ground motions measured at NTS in many different rock types

  18. Rock suitability classification RSC 2012

    Energy Technology Data Exchange (ETDEWEB)

    McEwen, T. (ed.) [McEwen Consulting, Leicester (United Kingdom); Kapyaho, A. [Geological Survey of Finland, Espoo (Finland); Hella, P. [Saanio and Riekkola, Helsinki (Finland); Aro, S.; Kosunen, P.; Mattila, J.; Pere, T.

    2012-12-15

    This report presents Posiva's Rock Suitability Classification (RSC) system, developed for locating suitable rock volumes for repository design and construction. The RSC system comprises both the revised rock suitability criteria and the procedure for the suitability classification during the construction of the repository. The aim of the classification is to avoid such features of the host rock that may be detrimental to the favourable conditions within the repository, either initially or in the long term. This report also discusses the implications of applying the RSC system for the fulfilment of the regulatory requirements concerning the host rock as a natural barrier and the site's overall suitability for hosting a final repository of spent nuclear fuel.

  19. ROCK inhibitors in ocular disease

    Directory of Open Access Journals (Sweden)

    Eva Halasz

    2016-12-01

    Full Text Available Rho kinases (ROCKs have a crucial role in actin-cytoskeletal reorganization and thus are involved in broad aspects of cell motility, from smooth muscle contraction to neurite outgrowth. The first marketed ROCK inhibitor, called fasudil, has been used safely for treatment of cerebral vasospasm since 1995 in Japan. During the succeeding decades ROCK inhibitors have been applied in many pathological conditions from central nervous system disorders to cardiovascular disease as potential therapeutic agents or experimental tools to help understand the underlying (pathomechanisms. In 2014, a fasudil derivate named ripasudil was accepted for clinical use in glaucoma and ocular hypertension. Since ROCK kinases are widely expressed in ocular tissues, they have been implicated in the pathology of many ocular conditions such as corneal dysfunction, glaucoma, cataract, diabetic retinopathy, age-related macular degeneration, and retinal detachment. This paper aims to provide an overview of the most recent status/application of ROCK inhibitors in the field of eye disease.

  20. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  1. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  2. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  3. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  4. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  5. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  6. A graphical feature generation approach for intrusion detection

    OpenAIRE

    Chen Shi; Zuo Zhen; Huang Zhi Ping; Guo Xiao Jun

    2016-01-01

    In order to develop a novel effective and efficient intrusion detection system, a novel hybrid method based on a graphical features-based k-nearest neighbor approach, namely GFNN, is proposed in this paper. In GFNN, k-means clustering algorithm is used to extract cluster centre of each class in the given dataset. Then, the distance between a specific data sample and each cluster centre is calculated, and a radar chart is plotted based on the new data composed of distance based features. The s...

  7. Characterization of crystalline rocks in the Lake Superior region, USA: implications for nuclear waste isolation. [Wisconsin, Upper Peninsula of Michigan and Minnesota

    Energy Technology Data Exchange (ETDEWEB)

    Sood, M.K.; Flower, M.F.J.; Edgar, D.E.

    1984-01-01

    The Lake Superior region (Wisconsin, the Upper Peninsula of Michigan, and Minnesota) contains 41 Precambrian crystalline rock complexes comprising 64 individual but related rock bodies with known surface exposures. Each complex has a map area greater than 78 km/sup 2/. About 54% of the rock complexes have areas of up to 500 km/sup 2/, 15% fall between 500 km/sup 2/ and 1000 km/sup 2/, 19% lie between 1000 km/sup 2/ and 2500 km/sup 2/, and 12% are over 2500 km/sup 2/. Crystalline rocks of the region vary widely in composition, but they are predominantly granitic. Repeated thermo-tectonic events have produced early Archean gneisses, migmatites, and amphibolites with highly tectonized fabrics that impart a heterogeneous and anisotropic character to the rocks. Late Archean rocks are usually but not invariably gneissose and migmatitic. Proterozoic rocks of the region include synorogenic (foliated) granitic rocks, anorogenic (non-foliated) granites, and the layered gabbro-anorthosite-troctolite intrusives of the rift-related Keweenawan igneous activity. Compared with the Archean rocks of the region, the Proterozoic bodies generally lack highly tectonized fabrics and have more definable contacts where visible. Anorogenic intrusions are relatively homogeneous and isotropic. On the basis of observed geologic characteristics, postorogenic and anorogenic crystalline rock bodies located away from recognized tectonic systems have attributes that make them relatively more desirable as a possible site for a nuclear waste repository in the region. This study was conducted at Argonne National Laboratory under the sponsorship of the US Department of Energy through the Office of Crystalline Repository Development at Battelle Memorial Institute, Columbus, Ohio. 84 references, 4 figures, 3 tables.

  8. The role of compassion, suffering, and intrusive thoughts in dementia caregiver depression.

    Science.gov (United States)

    Schulz, Richard; Savla, Jyoti; Czaja, Sara J; Monin, Joan

    2017-09-01

    Exposure to suffering of a relative or friend increases the risk for psychological and physical morbidity. However, little is known about the mechanisms that account for this effect. We test a theoretical model that identifies intrusive thoughts as a mediator of the relation between perceived physical and psychological suffering of the care recipient and caregiver depression. We also assess the role of compassion as a moderator of the relation between perceived suffering and intrusive thoughts. Hispanic and African American caregivers (N = 108) of persons with dementia were assessed three times within a one-year period. Using multilevel modeling, we assessed the mediating role of intrusive thoughts in the relation between perceived physical and psychological suffering and CG depression, and we tested moderated mediation to assess the role of caregiver compassion in the relation between perceived suffering and intrusive thoughts. The effects of perceived physical suffering on depression were completely mediated through intrusive thoughts, and compassion moderated the relation between physical suffering and intrusive thoughts. Caregivers who had greater compassion reported more intrusive thoughts even when perceived physical suffering of the CR was low. For perceived psychological suffering, the effects of suffering on depression were partially mediated through intrusive thoughts. Understanding the role of intrusive thoughts and compassion in familial relationships provides new insights into mechanisms driving caregiver well-being and presents new opportunities for intervention.

  9. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  10. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Directory of Open Access Journals (Sweden)

    Laura Jobson

    Full Text Available Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1. In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed. The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  11. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  12. Lead isotopic study of aplites from the Precambrian basement rocks near Ibadan, southwestern Nigeria

    International Nuclear Information System (INIS)

    Oversby, V.M.

    1975-01-01

    Pb isotopic compositions for three total-rock samples of aplite and their constituent K-feldspars from the Nigerian basement assemblage near Ibadan show lead homogenization during the Pan-African thermo-tectonic event. A secondary isochron formed by the K-feldspars data points is used to calculate a primary age of about 2750 m.y. for the aplites. The aplites do not register any Pb isotopic effect from the intrusion of granite gneiss in the area at 2330m.y. (Auth.)

  13. Long-term landscape evolution of the southeast Brazilian highlands: comparison of two alkaline intrusions areas

    Science.gov (United States)

    Doranti Tiritan, Carolina; Hackspacher, Peter Christian; Glasmacher, Ulrich Anton

    2016-04-01

    The southeast Brazilian highlands records a long history of tectonic and magmatic events that were consequence of the South Atlantic Ocean opening. After the rifting process has ceased, an epeirogenic uplift of the continental crust has started in response to the drifting of the South American Platform over a thermal anomaly that accompanied an intense alkaline and basaltic magmatism. Related Late Cretaceous alkaline intrusions are distributed from the southeast Brazilian coast to the interior of the South American Platform. The landscape evolution is associated with several distinct exhumation events at the South American passive continental margin (Hackspacher 2004; Doranti et al, 2014). The present study intent providing insights on the behaviour of the coupled magmatic tectonic-erosional system, comparing thermochronological data from two alkaline intrusions, Poços de Caldas Alkaline Massif (PCAM) and São Sebastião Island (SSI). The PCAM is the biggest alkaline structure located in the interior of the continent, 300km from the coastline (Rio de Janeiro). The structure is formed as a caldera, covering over 800km2, intruding Precambrian basement around 83Ma, nepheline syenites, phonolites and tinguaites intruded in a continuous and rapid sequence lasting between 1 to 2 Ma. Meanwhile, the SSI (236km²) is located at the coast, 200 km southeast of the city of São Paulo and is characterized by an intrusion in Precambrian granitic-gnaissic rocks affected by the Panafrican/Brazilian Orogen. This crystalline basement is intruded by Early Cretaceous subalkaline basic and acid dykes, as well as by Late Cretaceous alkaline stocks (syenites) and dykes (basanite to phonolite). The Apatite Fission-Track ages for PCAM range from 333.3±27.6 to 94.0±13.7 Ma at the surrounded metamorphic basement area, and 76.8±10.9 to 48.7±10.7 Ma in the alkaline Massif. The older ages, are concentrated on the lower topography region (700 until 1200m) in the north side alkaline massif

  14. Revisiting Emplacement Depths of the Fine Gold Intrusive Suite, West-Central Sierra Nevada

    Science.gov (United States)

    Head, D.; Lackey, J.

    2013-12-01

    generally show only slight variations: they generally decrease from about 3 to 3.5 kbar in the northeastern regions to closer to 2.5 to 3.0 kbar in the southwestern regions. Pressures less than 3.5 kbar are consistent with the widespread occurrence of andalusite and cordierite in contact metamorphosed schists throughout the region. The slight trend toward lower pressures in the southwest, where the FGIS abuts the Foothills belt metamorphic rocks, is consistent with the general westward tilting of the batholith exposing deeper levels eastward in the FGIS. We find no evidence for major changes in emplacement levels of the FGIS associated with structural breaks or with major differences of intrusive age.

  15. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  16. Nuclear-power-plant perimeter-intrusion alarm systems

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  17. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  18. A Retroactive-Burst Framework for Automated Intrusion Response System

    Directory of Open Access Journals (Sweden)

    Alireza Shameli-Sendi

    2013-01-01

    Full Text Available The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

  19. ESTIMATION OF INTRUSION DETECTION PROBABILITY BY PASSIVE INFRARED DETECTORS

    Directory of Open Access Journals (Sweden)

    V. V. Volkhonskiy

    2015-07-01

    Full Text Available Subject of Research. The paper deals with estimation of detection probability of intruder by passive infrared detector in different conditions of velocity and direction for automated analyses of physical protection systems effectiveness. Method. Analytic formulas for detection distance distribution laws obtained by means of experimental histogram approximation are used. Main Results. Applicability of different distribution laws has been studied, such as Rayleigh, Gauss, Gamma, Maxwell and Weibull distribution. Based on walk tests results, approximation of experimental histograms of detection distance probability distribution laws by passive infrared detectors was done. Conformity of the histograms to the mentioned analytical laws according to fitting criterion 2 has been checked for different conditions of velocity and direction of intruder movement. Mean and variance of approximate distribution laws were equal to the same parameters of experimental histograms for corresponding intruder movement parameters. Approximation accuracy evaluation for above mentioned laws was done with significance level of 0.05. According to fitting criterion 2, the Rayleigh and Gamma laws are corresponded mostly close to the histograms for different velocity and direction of intruder movement. Dependences of approximation accuracy for different conditions of intrusion have been got. They are usable for choosing an approximation law in the certain condition. Practical Relevance. Analytic formulas for detection probability are usable for modeling of intrusion process and objective effectiveness estimation of physical protection systems by both developers and users.

  20. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  1. Features extraction algorithm about typical railway perimeter intrusion event

    Science.gov (United States)

    Zhou, Jieyun; Wang, Chaodong; Liu, Lihai

    2017-10-01

    Research purposes: Optical fiber vibration sensing system has been widely used in the oil, gas, frontier defence, prison and power industries. But, there are few reports about the application in railway defence. That is because the surrounding environment is complicated and there are many challenges to be overcomed in the optical fiber vibration sensing system application. For example, how to eliminate the effects of vibration caused by train, the natural environments such as wind and rain and how to identify and classify the intrusion events. In order to solve these problems, the feature signals of these events should be extracted firstly. Research conclusions: (1) In optical fiber vibration sensing system based on Sagnac interferometer, the peak-to-peak value, peak-to-average ratio, standard deviation, zero-crossing rate, short-term energy and kurtosis may serve as feature signals. (2) The feature signals of resting state, climbing concrete fence, breaking barbed wire, knocking concrete fence and rainstorm have been extracted, which shows significant difference among each other. (3) The research conclusions can be used in the identification and classification of intrusion events.

  2. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  3. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  4. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  5. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  6. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  7. Uranium series, volcanic rocks

    Science.gov (United States)

    Vazquez, Jorge A.

    2014-01-01

    Application of U-series dating to volcanic rocks provides unique and valuable information about the absolute timing of crystallization and differentiation of magmas prior to eruption. The 238U–230Th and 230Th-226Ra methods are the most commonly employed for dating the crystallization of mafic to silicic magmas that erupt at volcanoes. Dates derived from the U–Th and Ra–Th methods reflect crystallization because diffusion of these elements at magmatic temperatures is sluggish (Cherniak 2010) and diffusive re-equilibration is insignificant over the timescales (less than or equal to 10^5 years) typically associated with pre-eruptive storage of nearly all magma compositions (Cooper and Reid 2008). Other dating methods based on elements that diffuse rapidly at magmatic temperatures, such as the 40Ar/39Ar and (U–Th)/He methods, yield dates for the cooling of magma at the time of eruption. Disequilibrium of some short-lived daughters of the uranium series such as 210Po may be fractionated by saturation of a volatile phase and can be employed to date magmatic gas loss that is synchronous with volcanic eruption (e.g., Rubin et al. 1994).

  8. They will rock you!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    On 30 September, CERN will be the venue for one of the most prestigious events of the year: the concert for the Bosons&More event, the Organization’s celebration of the remarkable performance of the LHC and all its technical systems, as well as the recent fundamental discoveries. Topping the bill will be the Orchestre de la Suisse Romande, the CERN Choir, the Zürcher Sing-Akademie and the Alan Parsons Live Project rock group, who have joined forces to create an unforgettable evening’s entertainment.   The Orchestre de la Suisse Romande, directed by Maestro Neeme Järvi, artistic and musical director of the OSR. (Image: Grégory Maillot). >>> From the Orchestre de la Suisse Romande… Henk Swinnen, General Manager of the Orchestre de la Suisse Romande (OSR), answers some questions for the CERN Bulletin, just a few days before the event. How did this project come about? When CERN invited us to take part in the B...

  9. Taxonomic and chemical assessment of exceptionally abundant rock mine biofilm

    Directory of Open Access Journals (Sweden)

    Karolina Tomczyk-Żak

    2017-08-01

    Full Text Available Background An exceptionally thick biofilm covers walls of ancient gold and arsenic Złoty Stok mine (Poland in the apparent absence of organic sources of energy. Methods and Results We have characterized this microbial community using culture-dependent and independent methods. We sequenced amplicons of the 16S rRNA gene obtained using generic primers and additional primers targeted at Archaea and Actinobacteria separately. Also, we have cultured numerous isolates from the biofilm on different media under aerobic and anaerobic conditions. We discovered very high biodiversity, and no single taxonomic group was dominant. The majority of almost 4,000 OTUs were classified above genus level indicating presence of novel species. Elemental analysis, performed using SEM-EDS and X-ray, of biofilm samples showed that carbon, sulphur and oxygen were not evenly distributed in the biofilm and that their presence is highly correlated. However, the distribution of arsenic and iron was more flat, and numerous intrusions of elemental silver and platinum were noted, indicating that microorganisms play a key role in releasing these elements from the rock. Conclusions Altogether, the picture obtained throughout this study shows a very rich, complex and interdependent system of rock biofilm. The chemical heterogeneity of biofilm is a likely explanation as to why this oligotrophic environment is capable of supporting such high microbial diversity.

  10. Application of NURE data to the study of crystalline rocks in the Wyoming uranium province

    International Nuclear Information System (INIS)

    Rush, S.M.; Anderson, J.R.; Bennett, J.E.

    1983-03-01

    The Wyoming uranium province study is a part of the National Uranium Resource Evaluation (NURE) program conducted by Bendix Field Engineering Corporation for the US Department of Energy. The ultimate objective of the entire project is the integration of NURE and other data sources to develop a model for a uranium province centered in Wyoming. This paper presents results of the first phase of the Wyoming uranium province study, which comprises characterization of the crystalline rocks of the study area using NURE hydrogeochemical and stream-sediment data, aerial radiometric and magnetic data, and new data generated for zircons from intrusive rocks in the study area. The results of this study indicate that the stream-sediment, aerial radiometric, aerial magnetic, and zircon data are useful in characterization of the crystalline rocks of the uranium province. The methods used in this project can be applied in two ways toward the recognition of a uranium province: (1) to locate major uranium deposits and occurrences, and (2) to generally identify different crystalline rock types, particularly those that could represent significant uranium source rocks. 14 figures, 8 tables

  11. A survey of lunar rock types and comparison of the crusts of earth and moon

    Science.gov (United States)

    Wood, J. A.

    1977-01-01

    The principal known types of lunar rocks are briefly reviewed, and their chemical relationships discussed. In the suite of low-KREEP highland rocks, Fe/(Fe + Mg) in the normative mafic minerals increases and the albite content of normative plagio-clase decreases as the total amount of normative plagioclase increases, the opposite of the trend predicted by the Bowen reaction principle. The distribution of compositions of rocks from terrestrial layered mafic intrusives is substantially different: here the analyses fall in several discrete clusters (anorthositic rocks, norites, granophyres and ferrogabbros, ultramafics), and the chemical trends noted above are not reproduced. It is suggested that the observed trends in lunar highland rocks could be produced by crystal fractionation in a deep global surface magma system if (1) plagiociase tended to float, upon crystallization, and (2) the magma was kept agitated and well mixed (probably by thermal convection) until crystallization was far advanced and relatively little residual liquid was left. After the crustal system solidified, but before extensive cooling had developed a thick, strong lithosphere, mantle convection was able to draw portions of the lunar anorthositic crust down into the mantle.

  12. Petrography and mineral chemistry of wehrlites in contact zone of gabbro intrusions and mantle peridotites of the Naein ophiolite

    Directory of Open Access Journals (Sweden)

    Farhad Ghaseminejad

    2014-10-01

    Full Text Available Introduction Geological background Ophiolites have played a major role in our understanding of Earth’s processes ranging from seafloor spreading, melt evolution and magma transport in oceanic spreading centers, and hydrothermal alteration and mineralization of oceanic crust to collision tectonics, mountain building processes, and orogeny. They provide the essential structural, petrological, geochemical, and geochronological evidence to document the evolutionary history of ancient continental margins and ocean basin. Ophiolites include a peridotitic mantle sequence, generally characterized by high-temperature plastic deformation and residual chemistry, and a comagmatic crustal sequence (gabbros, diabase dikes, and submarine basalts, weakly or not deformed. According to this interpretation, ophiolites were allochthonous with respect to their country rocks. They were assembled during a primary accretion stage at an oceanic spreading center, and later tectonically emplaced on a continental margin or island arc (Dilek, 2003. The indigenous dikes of pyroxenites and gabbros that were injected into a melting peridotite, or intrusive dikes of pyroxenite and gabbro that injected when the peridotite was fresh and well below its solidus, are discussed in different ophiolite papers. Pyroxenite formation and contact of gabbro and mantle peridotite are discussed in different articles (Dilek, 2003. When a gabbro intrude a fresh mantle peridotite could not significantly react with it, but if intrusion occurs during the serpentinization, the gabbro will change to rodingite. Geological setting The Naein ophiolitic melanges comprise the following rock units: mantle peridotites (harzburgite, lherzolite, dunite, with associated chromitite, gabbro, pyroxenite, sheeted and swarm dikes, massive basalts, pillow lava, plagiogranite, radiolarian chert, glaubotruncana limestone, rodingite, listvenite, and metamorphic rocks (foliated amphibolitic dike, amphibolite, skarn

  13. Dynamics of rock varnish formation

    Energy Technology Data Exchange (ETDEWEB)

    Raymond, R. Jr.; Reneau, S.L.; Guthrie, G.D. Jr.; Bish, D.L.; Harrington, C.D.

    1991-01-01

    Our studies of rock varnish from the southwestern United States suggest that the Mn-phase in rock varnish has neither the chemistry nor the crystal structure of birnessite. Rather, the Mn-rich phase is non-crystalline and contains Ba, Ca, Fe, Al, and P. Unknowns concerning the formation of this non-crystalline Mn phase must be resolved before researchers are able to define chemical parameters of rock varnish formation based upon conditions of formation of the Mn phase. 6 refs., 9 figs.

  14. Space Weathering of Lunar Rocks

    Science.gov (United States)

    Noble, S. K.; Keller, L. P.; Christoffersen, R.; Rahman, Z.

    2012-01-01

    All materials exposed at the lunar surface undergo space weathering processes. On the Moon, boulders make up only a small percentage of the exposed surface, and areas where such rocks are exposed, like central peaks, are often among the least space weathered regions identified from remote sensing data. Yet space weathered surfaces (patina) are relatively common on returned rock samples, some of which directly sample the surface of larger boulders. Because, as witness plates to lunar space weathering, rocks and boulders experience longer exposure times compared to lunar soil grains, they allow us to develop a deeper perspective on the relative importance of various weathering processes as a function of time.

  15. Multiverso: Rock'n'Astronomy

    Science.gov (United States)

    Caballero, J. A.

    2012-05-01

    In the last few years, there have been several projects involving astronomy and classical music. But have a rock band ever appeared at a science conference or an astronomer at a rock concert? We present a project, Multiverso, in which we mix rock and astronomy, together with poetry and video art (Caballero, 2010). The project started in late 2009 and has already reached tens of thousands people in Spain through the release of an album, several concert-talks, television, radio, newspapers and the internet.

  16. Mineral Detector for Igneous Rocks

    Science.gov (United States)

    Ishikawa, S. T.; Hart, S. D.; Gulick, V. C.

    2010-12-01

    We present a Raman spectral analysis tool that uses machine learning algorithms to classify pure minerals in igneous rocks. Experiments show greater than 90% accuracy classifying a test set of pure minerals against a database of similar reference minerals using an artificial neural network. Efforts are currently underway to improve this tool for use as a mineral detector in rock samples, an important milestone toward autonomously classifying rocks based on spectral, and previous imaging work. Although pure mineral classification has been widely successful, applying the same methods to rocks is difficult because the spectra may represent a combination of multiple, and often competing, mineral signatures. In such cases some minerals may appear with more intensity than others resulting in masking of weaker minerals. Furthermore, with our particular spectrometer (852 nm excitation, ~50 micron spot size), minerals such as potassium feldspar fluoresce, both obscuring its characteristic Raman features and suppressing those of weaker minerals. For example, plagioclase and quartz, two key minerals for determining the composition of igneous rocks, are often hidden by minerals such as potassium feldspar and pyroxene, and are consequently underrepresented in the spectral analysis. These technicalities tend to skew the perceived composition of a rock from its actual composition. Despite these obstacles, an experiment involving a training set of 26 minerals (plagioclase, potassium feldspar, pyroxene, olivine, quartz) and a test set of 57 igneous rocks (basalt, gabbro, andesite, diorite, dacite, granodiorite, rhyolite, granite) shows that generalizations derived from their spectral data are consistent with expected trends: as rock composition goes from felsic to mafic there is a marked increase in the detection of minerals such as plagioclase and pyroxene along with a decrease in the detection of minerals such as quartz and potassium feldspar. The results suggest that phaneritic

  17. Fault rocks and uranium mineralization

    International Nuclear Information System (INIS)

    Tong Hangshou.

    1991-01-01

    The types of fault rocks, microstructural characteristics of fault tectonite and their relationship with uranium mineralization in the uranium-productive granite area are discussed. According to the synthetic analysis on nature of stress, extent of crack and microstructural characteristics of fault rocks, they can be classified into five groups and sixteen subgroups. The author especially emphasizes the control of cataclasite group and fault breccia group over uranium mineralization in the uranium-productive granite area. It is considered that more effective study should be made on the macrostructure and microstructure of fault rocks. It is of an important practical significance in uranium exploration

  18. Syntectonic emplacement of the Triassic biotite-syenogranite intrusions in the Taili area, western Liaoning, NE China: Insights from petrogenesis, rheology and geochronology

    Science.gov (United States)

    Li, Weimin; Liu, Yongjiang; Jin, Wei; Neubauer, Franz; Zhao, Yingli; Liang, Chenyue; Wen, Quanbo; Feng, Zhiqiang; Li, Jing; Liu, Qing

    2017-05-01

    The North China Craton (NCC) is one of the oldest cratons in the world, and it recently becomes a hot study area because of large volumes of Mesozoic intrusions associated with lithospheric thinning contributing to cratonic destruction in late Mesozoic times. However, the timing of initial thinning and destruction is still controversial. The Taili area, western Liaoning Province, in the northeastern part of the NCC well exposes the Archean basement rocks and the Mesozoic magmatic rocks with variable plastic deformation. This study focuses on the syntectonic emplacement of the Triassic biotite-syenogranite intrusions, in order to understand their petrogenesis, timing as well as the geological significance. Zircon LA-ICP-MS U-Pb ages reveal that the biotite-syenogranites formed between 246 and 191 Ma, and contain many ancient (2564-2317 Ma) zircon xenocrysts. Geochemical data suggests that the biotite-syenogranites display an adakitic affinity with high Sr/Y = 135-167 and (La/Yb)N = 48-69, as well as negligible Eu anomalies (δEu = 0.87-0.94), high negative zircon εHf(t) values (-15.5 to -21.5) and ancient TDM2 ages (2246-2598 Ma). This data suggests that the parent magmas were generated from partial melting of thickened Archean lower crustal rocks probably due to the bidirectional amalgamation of the NCC with the NE China micro-blocks and the Yangtze Craton in its north and south, respectively. In the middle part of the Taili area, magmatic fabrics are well preserved in the biotite-syenogranite intrusion characterized by the strong preferred orientation of biotite and hornblende crystals, which parallel to the intrusion margin and are slightly oblique to the gneissosity of the sheared host Neoarchean granitic gneisses. The quartz grain size piezometer suggests that the paleo-differential stresses weaken toward to the central part of the intrusion, ranging from 21.40-22.22 MPa to 16.74-19.34 MPa, during quartz crystallization in the emplacement stage. This allow

  19. Zinc Isotopes as Tracers of Crust-Mantle Interactions and Mineralization Processes in Layered Intrusions

    Science.gov (United States)

    Day, J. M.; Moynier, F.

    2016-12-01

    Zinc isotopes are a powerful tool for studying igneous processes and may be useful for distinguishing between mantle or crustal origins for mineralization and for examining crystallization processes. Restricted ranges in δ66Zn for mantle-derived rocks (δ66Zn = 0.28±0.05‰; [{66Zn/64Znsample/66Zn/64ZnJMC-Lyon-1} × 1000] all uncertainties reported are 2SD) contrast the large δ66Zn variations in sedimentary rocks ( 0 to 1‰), or in volcanic and sedimentary hosted ore deposits (e.g., SEDEX; VHMS; MVT = -0.6 to 1.3‰). Here, we use Zn isotopes to investigate magmatic processes in the 1.27 Ga Muskox Intrusion (Canada) and 2.7 Ga Stillwater Intrusion (Montana). The Muskox main chromitite horizon has between 270-330 ppm Zn with δ66Zn ranging from 0.16 to 0.31‰. Zinc isotope compositions negatively correlate with Os isotopes. Chromitite (40a) with the lowest 187Os/188Os (0.132) has δ66Zn of 0.31±0.03‰; indistinguishable from the mantle value. CM19 glass from the co-eval Coppermine Volcanics, which has crust-like O and Nd isotopes but low 187Os/188Os (0.131), has been interpreted as the extrusive manifestation of chromitite genesis. The value of δ66Zn (0.27±0.07‰) for CM19 is within uncertainty of 40A, and permissive of formation during silicic-mafic melt mixing and large-scale chromitite crystallization. Stillwater chromitite seams exhibit a larger range in Zn (166-448 ppm), but generally lower δ66Zn (0.13±0.04‰) than Muskox chromitites, or to a JM Reef bulk sample (69 ppm Zn, δ66Zn = 0.22±0.03‰). These results suggest different sources of Zn for Ultramafic series chromitites versus the JM Reef (Banded series). Correspondingly, variations occur in Os isotopes for PGE poor chromitites (γOs = -2 to +4) versus the PGE-rich JM Reef (γOs = +12 to +34). Zinc isotope variations may be explained by either a mantle source with low δ66Zn that was subsequently contaminated by high δ66Zn crust, or from contamination of the ultramafic series by low δ66Zn

  20. Palaeomagnetism of the Early Permian Mount Leyshon Intrusive Complex and Tuckers Igneous Complex, North Queensland, Australia

    Science.gov (United States)

    Clark, D. A.; Lackie, M. A.

    2003-06-01

    This study provides reliable, precisely defined and well-dated Early Permian (286 +/- 6 Ma) palaeomagnetic poles for Australia from the Mount Leyshon Intrusive Complex (MLIC) and the Tuckers Igneous Complex (TIC). Both complexes are associated with prominent negative magnetic anomalies, indicating the presence of rocks carrying stable remanence of reverse polarity, with a Koenigsberger ratio greater than unity. The characteristic remanence carried by the intrusive phases and by locally remagnetized, contact-metamorphosed host rocks is always of reverse polarity, consistent with acquisition during the Permo-Carboniferous (Kiaman) Reverse Superchron. The corresponding palaeopoles confirm that Australia occupied high latitudes in the Early Permian. The pole positions are: MLIC: lat. = 43.2 °S, long. = 137.3 °E dp = 6.0°, dm = 6.4° Q= 6; TIC: lat. = 47.5 °S, long. = 143.0 °E, dp = 6.0°, dm = 6.6° Q= 6. Permian palaeomagnetic overprinting is detectable at considerable distances from the MLIC (2-3 km), well beyond the zone of visible alteration. The primary nature of the Early Permian palaeomagnetic signature is established by full baked contact/aureole tests at both localities. Other new data from Australia are consistent with the poles reported here. Comparison of the Australian, African and South American Apparent Polar Wander Paths (APWP) suggests that mean Permian and Triassic poles from West Gondwana, particularly from South America, are biased by remagnetization in the Jurassic-Cretaceous and that the Late Palaeozoic-Mesozoic APWP for Gondwana is best defined by Australian data. The Australian APWP exhibits substantial movement through the Mesozoic. Provided only that the time-averaged palaeofield was zonal, the Early Triassic palaeomagnetic data from Australia provide an important palaeogeographic constraint that the south geographic pole was within, or very close to, SE Australia around 240 Ma. The new Early Permian poles are apparently more consistent