WorldWideScience

Sample records for intrusion triggers hydrothermal

  1. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  2. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    DEFF Research Database (Denmark)

    Wotzlaw, Joern-Frederik; Bindeman, Ilya N.; Schaltegger, Urs

    2012-01-01

    of the most incompatible trace element rich horizon, similar to 100 m above SH. As the Skaergaard intrusion is also the most classic example of a shallow meteoric hydrothermal system, this work documents the alternating processes in a life of an intrusion with periods of hydrothermal cooling, heating by new...

  3. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  4. Effects of heat-flow and hydrothermal fluids from volcanic intrusions on authigenic mineralization in sandstone formations

    Directory of Open Access Journals (Sweden)

    Wolela Ahmed

    2002-06-01

    Full Text Available Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar overgrowths. However, clay mineral-transformation, illite-smectite to illite and chlorite was documented near the volcanic intrusions. Abundant actinolite, illite, chlorite, albite and laumontite cementation of the sand grains were also documented near the volcanic intrusions. The abundance of these cementing minerals decreases away from the volcanic intrusions.In the Hartford Basin, USA, the emplacement of the volcanic intrusions took place simultaneous with sedimentation. The heat-flow from the volcanic intrusions and hydrothermal activity related to the volcanics modified the texture of authigenic minerals. Microcrystalline mosaic albite and quartz developed rather than overgrowths and crystals near the intrusions. Chlorite clumps and masses were also documented with microcrystalline mosaic albite and quartz. These features are localized near the basaltic intrusions. Laumontite is also documented near the volcanic intrusions. The reservoir characteristics of the studied sandstone formations are highly affected by the volcanic and hydrothermal fluids in the Hartford and the Ulster Basin. The porosity dropped from 27.4 to zero percent and permeability from 1350 mD to 1 mD.

  5. Oxygen isotope mapping and evaluation of paleo-hydrothermal systems associated with synvolcanic intrusion and VMS deposits

    International Nuclear Information System (INIS)

    Taylor, B.E

    2001-01-01

    Whole-rock oxygen isotope mapping provides a useful method for the delineation and quantitative evaluation of paleo-hydrothermal systems associated with syn-volcanic intrusions and volcanic-associated massive sulfide (VMS) deposits. During the course of a four-year study of regional alteration systems associated with VMS Deposits, four syn-volcanic intrusive complexes in Canada were mapped using stable isotope techniques. The complexes included Noranda, Quebec; Clifford-Ben Nevis, Ontario; Snow Lake, Manitoba, and Sturgeon Lake, Ontario. This study was regional in extent, involving large areas and large numbers of whole-rock samples: Noranda (625 km 2 ;≥600 samples, plus others (total = 1198); Sturgeon Lake (525 km 2 ; 452 samples); Clifford-Ben Nevis (160 km 2 ; 251 samples); and Snow Lake (84 km 2 ; 575 samples). Isotopic data on whole-rock carbonates and hydrous minerals were also collected. The regional isotopic studies were carried out in concert with other studies on mineral assemblages and mineral composition, and on associated intrusive and extrusive rocks. The Clifford-Ben Nevis area was selected as a control area, in as much as it contains no known VMS deposits; all other areas are well-known, productive VMS districts. Oxygen isotope maps are, in a sense, thermal maps, illustrating the paleo-distribution of heat and fluids, and offering a potential aid to exploration. The isotopic data may be contoured to reveal zones of 18 O depletion and enrichment, relative to unaltered rocks. Zones of δ 18 O≤60% comprise rocks that have reacted with seawater at high (e.g., 300+ o C) temperatures. The volume of foot-wall rocks isotopically-depleted by water/rock interaction during the life of one or more episodes of submarine hydrothermal activity is proportional to the amount of heat available from the syn-volcanic intrusive center. These altered rocks comprise the reaction zone often inferred to have supplied metals and other constituents for the VMS deposits

  6. Hydrothermal alteration and permeability changes in granitic intrusions related to Sn-W deposits : case study of Panasqueira (Portugal)

    Science.gov (United States)

    Launay, Gaetan; Sizaret, Stanislas; Guillou-Frottier, Laurent; Gloaguen, Eric; Melleton, Jérémie; Pichavant, Michel; Champallier, Rémi; Pinto, Filipe

    2017-04-01

    The Panasqueira Sn-W deposit occurs as a dense network of flat wolframite and cassiterite-bearing quartz veins concentrated in the vicinity of a hidden greisen cupola, and to a lesser extent as disseminated cassiterites in the greisen. Previous studies (Thadeu 1951; 1979) have suggested that the Panasqueira deposit is genetically related to magmatic activity for which the most part is unexposed, and being only represented by the greisen cupola. Hydrothermal fluid circulation during the final stages of granite crystallisation has probably led to the greisenisation of the cupola followed by the deposition of the mineralization in the veins system. Mineral replacement reactions that occurred during the greisenisation could affect rock properties (porosity, density and permeability) which control fluid circulation in the granite. This study aims to investigate effects of greisenisation reactions on the dynamic (time varying) permeability that ultimately leads to fluid circulation in the greisen cupola. To do so, petrological study and experimental determinations of hydrodynamic features (porosity and permeability) for different granite alteration levels and petrographic types (unaltered granite to greisen) are combined and then integrated in coupled numerical models of fluid circulation around the granitic intrusion. Greisen occurs in the apical part of the granitic body and results in the pervasive alteration of the granite along the granite-schist contact. This greisen consists mainly of quartz and muscovite formed by the replacement of feldspars and bleaching of biotites of the initial granite. Otherwise, greisen is generally vuggy which suggests a porosity increase of the granite during hydrothermal alteration processes. This porosity increase has a positive effect on the permeability of the granitic system. Indeed, experimental measurements of permeability with the Paterson press indicate that the initial granite is impermeable (10-20 m2) whereas the greisen is

  7. The Mesozoic-Cenozoic igneous intrusions and related sediment-dominated hydrothermal activities in the South Yellow Sea Basin, the Western Pacific continental margin

    Science.gov (United States)

    Yumao, Pang; Xunhua, Zhang; Guolin, Xiao; Luning, Shang; Xingwei, Guo; Zhenhe, Wen

    2018-04-01

    Various igneous complexes were identified in multi-channel seismic reflection profiles from the South Yellow Sea Basin. It is not rare that magmatic intrusions in sedimentary basins cause strong thermal perturbations and hydrothermal activities. Some intrusion-related hydrothermal vent complexes have been identified and they are considered to originate from the deep sedimentary contact aureole around igneous intrusions and terminate in upper vents structures, and are linked by a vertical conduit system. The upper vent complexes are usually eye-shaped, dome-shaped, fault-related, crater-shaped or pock-shaped in seismic profiles. A schematic model was proposed to illustrate the structures of different types of hydrothermal vent complexes. A conceptual conduit model composed of an upper pipe-like part and a lower branching part was also derived. Hydrothermal vent complexes mainly developed during the Middle-Late Cretaceous, which is coeval with, or shortly after the intrusion. The back-arc basin evolution of the area which is related to the subduction of the Paleo-Pacific plate during the Mesozoic-Cenozoic may be the principal factor for voluminous igneous complexes and vent complexes in this area. It is significant to study the characteristics of igneous complexes and related hydrothermal vent complexes, which will have implications for the future study of this area.

  8. Linking fault permeability, fluid flow, and earthquake triggering in a hydrothermally active tectonic setting: Numerical Simulations of the hydrodynamics in the Tjörnes Fracture Zone, Iceland.

    Science.gov (United States)

    Lupi, M.; Geiger, S.; Graham, C.; Claesson, L.; Richter, B.

    2007-12-01

    A good insight into the transient fluid flow evolution within a hydrothermal system is of primary importance for the understanding of several geologic processes, for example the hydrodynamic triggering of earthquakes or the formation of mineral deposits. The strong permeability contrast between different crustal layers as well as the high geothermal gradient of these areas are elements that strongly affect the flow behaviour. In addition, the sudden and transient occurrence of joints, faults and magmatic intrusions are likely to change the hydrothermal flow paths in very short time. The Tjörnes Fracture Zone (TFZ) north of Iceland, is such a hydrothermal area where a high geothermal gradient, magmatic bodies, faults, and the strong contrast between sediments and fractured lava layers govern the large-scale fluid flow. The TFZ offsets the Kolbeinsey Ridge and the Northern Rift Zone. It is characterized by km-scale faults that link sub-seafloor sediments and lava layers with deeper crystalline rocks. These structures focus fluid flow and allow for the mixing between cold seawater and deep hydrothermal fluids. A strong seismic activity is present in the TFZ: earthquakes up to magnitude 7 have been recorded over the past years. Hydrogeochemical changes before, during and after a magnitude 5.8 earthquake suggest that the evolving stress state before the earthquake leads to (remote) permeability variations, which alter the fluid flow paths. This is in agreement with recent numerical fluid flow simulations which demonstrate that fluid flow in magmatic- hydrothermal systems is often convective and very sensitive to small variations in permeability. In order to understand the transient fluid flow behaviour in this complex geological environment, we have conducted numerical simulations of heat and mass transport in two geologically realistic cross-sectional models of the TFZ. The geologic models are discretised using finite element and finite volume methods. They hence have

  9. Immiscibility of Fluid Phases at Magmatic-hydrothermal Transition: Formation of Various PGE-sulfide Mineralization for Layered Basic Intrusions

    Science.gov (United States)

    Zhitova, L.; Borisenko, A.; Morgunov, K.; Zhukova, I.

    2007-12-01

    Fluid inclusions in quartz of the Merensky Reef (Bushveld Complex, South Africa) and the Chineisky Pluton (Transbaikal Region, Russia) were studied using cryometry, microthermometry, Raman-spectroscopy, LA ICP- MS, scanning electronic microscopy, gas-chromatography and isotopic methods. This allowed us to document some examples of fluid phase separation resulting in formation of different types of PGE-sulfide mineralization for layered basic intrusions. The results obtained show at least three generations of fluid separated from boiling residual alumosilicate intercumulus liquid of the Merensky Reef. The earliest fluid phase composed of homogenous high-dense methane and nitrogen gas mixture was identified in primary gas and co-existing anomalous fluid inclusions from symplectitic quartz. The next generation, heterophase fluid, composed of brines containing a free low-dense (mostly of carbon dioxide) gas phase, was observed in primary multiphase and coexisting gas-rich inclusions of miarolitic quartz crystals. The latest generation was also a heterophase fluid (low salinity water-salt solution and free low-dense methane gas phase) found in primary water-salt and syngenetic gas inclusions from peripheral zones of miarolitic quartz crystals. For the Chineisky Pluton reduced endocontact magmatogene fluids changed to oxidized low salinity hydrothermal fluids in exocontact zone. This resulted in formation of sulfide-PGE enrichment marginal zones of intrusion. The results obtained give us a possibility to suggest that: 1) Fluid phase separation is a typical feature of magmatogene fluids for layered basic intrusions. 2) Reduced fluids can extract and transport substantial PGE and sulfide concentrations. 3) Oxidation of reduced fluids is one of the most important geochemical barriers causing abundant PGE minerals and sulfides precipitation. This in turn results in both formation of PGE reefs or enriched contact zones of layered basic intrusions. This work was supported by

  10. Numerical simulations of hydrothermal circulation resulting from basalt intrusions in a buried spreading center

    Science.gov (United States)

    Fisher, A.T.; Narasimhan, T.N.

    1991-01-01

    A two-dimensional, one by two-kilometer section through the seafloor was simulated with a numerical model to investigate coupled fluid and heat flow resulting from basalt intrusions in a buried spreading center. Boundary and initial conditions and physical properties of both sediments and basalt were constrained by field surveys and drilling in the Guaymas Basin, central Gulf of California. Parametric variations in these studies included sediment and basalt permeability, anisotropy in sediment permeability, and the size of heat sources. Faults were introduced through new intrusions both before and after cooling.Background heat input caused fluid convection at velocities ≤ 3 cm a−1 through shallow sediments. Eighty to ninety percent of the heat introduced at the base of the simulations exited through the upper, horizontal surface, even when the vertical boundaries were made permeable to fluid flow. The simulated injection of a 25–50 m thick basalt intrusion at a depth of 250 m resulted in about 10 yr of pore-fluid expulsion through the sea-floor in all cases, leaving the sediments above the intrusions strongly underpressured. A longer period of fluid recharge followed, sometimes accompanied by reductions in total seafloor heat output of 10% in comparison to pre-intrusion values. Additional discharge-recharge events were dispersed chaotically through the duration of the cooling period. These cycles in heat and fluid flow resulted from the response of the simulated system to a thermodynamic shock, the sudden emplacement of a large heat source, and not from mechanical displacement of sediments and pore fluids, which was not simulated.Water/rock mass ratios calculated from numerical simulations are in good agreement with geochemical estimates from materials recovered from the Guaymas Basin, assuming a bulk basalt permeability value of at least 10−17 m2/(10−2 mD). The addition of faults through intrusions and sediments in these simulations did not facilitate

  11. Intrusion-Related Gold Deposits: New insights from gravity and hydrothermal integrated 3D modeling applied to the Tighza gold mineralization (Central Morocco)

    Science.gov (United States)

    Eldursi, Khalifa; Branquet, Yannick; Guillou-Frottier, Laurent; Martelet, Guillaume; Calcagno, Philippe

    2018-04-01

    The Tighza (or Jebel Aouam) district is one of the most important polymetallic districts in Morocco. It belongs to the Variscan Belt of Central Meseta, and includes W-Au, Pb-Zn-Ag, and Sb-Ba mineralization types that are spatially related to late-Carboniferous granitic stocks. One of the proposed hypotheses suggests that these granitic stocks are connected to a large intrusive body lying beneath them and that W-Au mineralization is directly related to this magmatism during a 287-285 Ma time span. A more recent model argues for a disconnection between the older barren outcropping magmatic stocks and a younger hidden magmatic complex responsible for the W-Au mineralization. Independently of the magmatic scenario, the W-Au mineralization is consensually recognized as of intrusion-related gold deposit (IRGD) type, W-rich. In addition to discrepancies between magmatic sceneries, the IRGD model does not account for published older age corresponding to a high-temperature hydrothermal event at ca. 291 Ma. Our study is based on gravity data inversion and hydro-thermal modeling, and aims to test this model of IRGD and its related magmatic geometries, with respect to subsurface geometries, favorable physical conditions for deposition and time record of hydrothermal processes. Combined inversion of geology and gravity data suggests that an intrusive body is rooted mainly at the Tighza fault in the north and that it spreads horizontally toward the south during a trans-tensional event (D2). Based on the numerical results, two types of mineralization can be distinguished: 1) the "Pre-Main" type appears during the emplacement of the magmatic body, and 2) the "Main" type appears during magma crystallization and the cooling phase. The time-lag between the two mineralization types depends on the cooling rate of magma. Although our numerical model of thermally-driven fluid flow around the Tighza pluton is simplified, as it does not take into account the chemical and deformation

  12. Geochemistry of Hydrothermal Alteration Associated with Cenozoic Intrusion-Hosted Cu-Pb-Zn Mineralization at Tavşanlı Area, Kütahya, NW Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Kumral

    2016-02-01

    Full Text Available The Miocene magmatic intrusion in the Tavşanlı zone of the Kütahya-Bolkardağ Belt (KBB in the northwestern region of Turkey is represented by the Eğrigöz granitoids. This paper studies the petrology and geochemistry of hydrothermal alterations associated with the vein-type Cu-Pb-Zn mineralization hosted by this pluton, focusing on the determination of the mass gains and losses of chemical components, which reflect the chemical exchanges between the host rocks and hydrothermal fluids. Vein-type Cu-Pb-Zn mineralization is closely associated with intense hydrothermal alterations within the brecciation, quartz stockwork veining, and brittle fracture zones that are controlled by NW-SE trending faults cutting through the Eğrigöz granitoids. Paragenetic relationships reveal three stages of mineralization: pre-ore, ore, and supergene. The ore mineralogy typically includes hypogene chalcopyrite, sphalerite, galena, and pyrite, with locally supergene covellite, malachite, and azurite. Wall-rock hypogene hydrothermal alterations include pervasive silicification, sulfidation, sericitization, and selective carbonatization and albitization. These are distributed in three main alteration zones (zone 1: silicified/iron carbonatized alterations ± albite, zone 2: argillic-silicic alterations, and zone 3: phyllic alterations. Based on the gains and losses of mass and volume (calculated by the GEOISO-Windows™ program, zone 1 has a higher mass and volume gain than zones 2 and 3. Non-systematic zonal distributions of alterations are observed in which the silicic-carbonate alterations +/− albitization appeared in zone 1 in the center and the phyllic-argillic alterations appeared in zones 2 and 3, with an increase in base metals (Cu-Pb-Zn in the zone from Cu, Cu-Pb, to Cu-Pb-Zn moving outwards.

  13. TRIGGER

    CERN Multimedia

    Wesley Smith

    Level-1 Trigger Hardware and Software The hardware of the trigger components has been mostly finished. The ECAL Endcap Trigger Concentrator Cards (TCC) are in production while Barrel TCC firmware has been upgraded, and the Trigger Primitives can now be stored by the Data Concentrator Card for readout by the DAQ. The Regional Calorimeter Trigger (RCT) system is complete, and the timing is being finalized. All 502 HCAL trigger links to RCT run without error. The HCAL muon trigger timing has been equalized with DT, RPC, CSC and ECAL. The hardware and firmware for the Global Calorimeter Trigger (GCT) jet triggers are being commissioned and data from these triggers is available for readout. The GCT energy sums from rings of trigger towers around the beam pipe beam have been changed to include two rings from both sides. The firmware for Drift Tube Track Finder, Barrel Sorter and Wedge Sorter has been upgraded, and the synchronization of the DT trigger is satisfactory. The CSC local trigger has operated flawlessly u...

  14. TRIGGER

    CERN Multimedia

    Roberta Arcidiacono

    2013-01-01

    Trigger Studies Group (TSG) The Trigger Studies Group has just concluded its third 2013 workshop, where all POGs presented the improvements to the physics object reconstruction, and all PAGs have shown their plans for Trigger development aimed at the 2015 High Level Trigger (HLT) menu. The Strategy for Trigger Evolution And Monitoring (STEAM) group is responsible for Trigger menu development, path timing, Trigger performance studies coordination, HLT offline DQM as well as HLT release, menu and conditions validation – this last task in collaboration with PdmV (Physics Data and Monte Carlo Validation group). In the last months the group has delivered several HLT rate estimates and comparisons, using the available data and Monte Carlo samples. The studies were presented at the Trigger workshops in September and December, and STEAM has contacted POGs and PAGs to understand the origin of the discrepancies observed between 8 TeV data and Monte Carlo simulations. The most recent results show what the...

  15. TRIGGER

    CERN Multimedia

    Wesley Smith

    Level-1 Trigger Hardware and Software The trigger synchronization procedures for running with cosmic muons and operating with the LHC were reviewed during the May electronics week. Firmware maintenance issues were also reviewed. Link tests between the new ECAL endcap trigger concentrator cards (TCC48) and the Regional Calorimeter Trigger have been performed. Firmware for the energy sum triggers and an upgraded tau trigger of the Global Calorimeter Triggers has been developed and is under test. The optical fiber receiver boards for the Track-Finder trigger theta links of the DT chambers are now all installed. The RPC trigger is being made more robust by additional chamber and cable shielding and also by firmware upgrades. For the CSC’s the front-end and trigger motherboard firmware have been updated. New RPC patterns and DT/CSC lookup tables taking into account phi asymmetries in the magnetic field configuration are under study. The motherboard for the new pipeline synchronizer of the Global Trigg...

  16. TRIGGER

    CERN Multimedia

    W. Smith

    2012-01-01

      Level-1 Trigger The Level-1 Trigger group is ready to deploy improvements to the L1 Trigger algorithms for 2012. These include new high-PT patterns for the RPC endcap, an improved CSC PT assignment, a new PT-matching algorithm for the Global Muon Trigger, and new calibrations for ECAL, HCAL, and the Regional Calorimeter Trigger. These should improve the efficiency, rate, and stability of the L1 Trigger. The L1 Trigger group also is migrating the online systems to SLC5. To make the data transfer from the Global Calorimeter Trigger to the Global Trigger more reliable and also to allow checking the data integrity online, a new optical link system has been developed by the GCT and GT groups and successfully tested at the CMS electronics integration facility in building 904. This new system is now undergoing further tests at Point 5 before being deployed for data-taking this year. New L1 trigger menus have recently been studied and proposed by Emmanuelle Perez and the L1 Detector Performance Group...

  17. TRIGGER

    CERN Multimedia

    W. Smith

    At the March meeting, the CMS trigger group reported on progress in production, tests in the Electronics Integration Center (EIC) in Prevessin 904, progress on trigger installation in the underground counting room at point 5, USC55, the program of trigger pattern tests and vertical slice tests and planning for the Global Runs starting this summer. The trigger group is engaged in the final stages of production testing, systems integration, and software and firmware development. Most systems are delivering final tested electronics to CERN. The installation in USC55 is underway and integration testing is in full swing. A program of orderly connection and checkout with subsystems and central systems has been developed. This program includes a series of vertical subsystem slice tests providing validation of a portion of each subsystem from front-end electronics through the trigger and DAQ to data captured and stored. After full checkout, trigger subsystems will be then operated in the CMS Global Runs. Continuous...

  18. TRIGGER

    CERN Multimedia

    Wesley Smith

    Level-1 Trigger Hardware and Software The production of the trigger hardware is now basically finished, and in time for the turn-on of the LHC. The last boards produced are the Trigger Concentrator Cards for the ECAL Endcaps (TCC-EE). After the recent installation of the four EE Dees, the TCC-EE prototypes were used for their commissioning. Production boards are arriving and are being tested continuously, with the last ones expected in November. The Regional Calorimeter Trigger hardware is fully integrated after installation of the last EE cables. Pattern tests from the HCAL up to the GCT have been performed successfully. The HCAL triggers are fully operational, including the connection of the HCAL-outer and forward-HCAL (HO/HF) technical triggers to the Global Trigger. The HCAL Trigger and Readout (HTR) board firmware has been updated to permit recording of the tower “feature bit” in the data. The Global Calorimeter Trigger hardware is installed, but some firmware developments are still n...

  19. TRIGGER

    CERN Multimedia

    by Wesley Smith

    2010-01-01

    Level-1 Trigger Hardware and Software The overall status of the L1 trigger has been excellent and the running efficiency has been high during physics fills. The timing is good to about 1%. The fine-tuning of the time synchronization of muon triggers is ongoing and will be completed after more than 10 nb-1 of data have been recorded. The CSC trigger primitive and RPC trigger timing have been refined. A new configuration for the CSC Track Finder featured modified beam halo cuts and improved ghost cancellation logic. More direct control was provided for the DT opto-receivers. New RPC Cosmic Trigger (RBC/TTU) trigger algorithms were enabled for collision runs. There is further work planned during the next technical stop to investigate a few of the links from the ECAL to the Regional Calorimeter Trigger (RCT). New firmware and a new configuration to handle trigger rate spikes in the ECAL barrel are also being tested. A board newly developed by the tracker group (ReTRI) has been installed and activated to block re...

  20. TRIGGER

    CERN Multimedia

    W. Smith

    2010-01-01

    Level-1 Trigger Hardware and Software The Level-1 Trigger hardware has performed well during both the recent proton-proton and heavy ion running. Efforts were made to improve the visibility and handling of alarms and warnings. The tracker ReTRI boards that prevent fixed frequencies of Level-1 Triggers are now configured through the Trigger Supervisor. The Global Calorimeter Trigger (GCT) team has introduced a buffer cleanup procedure at stops and a reset of the QPLL during configuring to ensure recalibration in case of a switch from the LHC clock to the local clock. A device to test the cables between the Regional Calorimeter Trigger and the GCT has been manufactured. A wrong charge bit was fixed in the CSC Trigger. The ECAL group is improving crystal masking and spike suppression in the trigger primitives. New firmware for the Drift Tube Track Finder (DTTF) sorters was developed to improve fake track tagging and sorting. Zero suppression was implemented in the DT Sector Collector readout. The track finder b...

  1. TRIGGER

    CERN Multimedia

    Wesley Smith

    Trigger Hardware The status of the trigger components was presented during the September CMS Week and Annual Review and at the monthly trigger meetings in October and November. Procedures for cold and warm starts (e.g. refreshing of trigger parameters stored in registers) of the trigger subsystems have been studied. Reviews of parts of the Global Calorimeter Trigger (GCT) and the Global Trigger (GT) have taken place in October and November. The CERN group summarized the status of the Trigger Timing and Control (TTC) system. All TTC crates and boards are installed in the underground counting room, USC55. The central clock system will be upgraded in December (after the Global Run at the end of November GREN) to the new RF2TTC LHC machine interface timing module. Migration of subsystem's TTC PCs to SLC4/ XDAQ 3.12 is being prepared. Work is on going to unify the access to Local Timing Control (LTC) and TTC CMS interface module (TTCci) via SOAP (Simple Object Access Protocol, a lightweight XML-based messaging ...

  2. TRIGGER

    CERN Multimedia

    W. Smith from contributions of C. Leonidopoulos

    2010-01-01

    Level-1 Trigger Hardware and Software Since nearly all of the Level-1 (L1) Trigger hardware at Point 5 has been commissioned, activities during the past months focused on the fine-tuning of synchronization, particularly for the ECAL and the CSC systems, on firmware upgrades and on improving trigger operation and monitoring. Periodic resynchronizations or hard resets and a shortened luminosity section interval of 23 seconds were implemented. For the DT sector collectors, an automatic power-off was installed in case of high temperatures, and the monitoring capabilities of the opto-receivers and the mini-crates were enhanced. The DTTF and the CSCTF now have improved memory lookup tables. The HCAL trigger primitive logic implemented a new algorithm providing better stability of the energy measurement in the presence of any phase misalignment. For the Global Calorimeter Trigger, additional Source Cards have been manufactured and tested. Testing of the new tau, missing ET and missing HT algorithms is underw...

  3. TRIGGER

    CERN Multimedia

    Wesley Smith

    Level-1 Trigger Hardware and Software The final parts of the Level-1 trigger hardware are now being put in place. For the ECAL endcaps, more than half of the Trigger Concentrator Cards for the ECAL Endcap (TCC-EE) are now available at CERN, such that one complete endcap can be covered. The Global Trigger now correctly handles ECAL calibration sequences, without being influenced by backpressure. The Regional Calorimeter Trigger (RCT) hardware is complete and working in USC55. Intra-crate tests of all 18 RCT crates and the Global Calorimeter Trigger (GCT) are regularly taking place. Pattern tests have successfully captured data from HCAL through RCT to the GCT Source Cards. HB/HE trigger data are being compared with emulator results to track down the very few remaining hardware problems. The treatment of hot and dead cells, including their recording in the database, has been defined. For the GCT, excellent agreement between the emulator and data has been achieved for jets and HF ET sums. There is still som...

  4. TRIGGER

    CERN Multimedia

    W. Smith

    Level-1 Trigger Hardware and Software The trigger system has been constantly in use in cosmic and commissioning data taking periods. During CRAFT running it delivered 300 million muon and calorimeter triggers to CMS. It has performed stably and reliably. During the abort gaps it has also provided laser and other calibration triggers. Timing issues, namely synchronization and latency issues, have been solved. About half of the Trigger Concentrator Cards for the ECAL Endcap (TCC-EE) are installed, and the firmware is being worked on. The production of the other half has started. The HCAL Trigger and Readout (HTR) card firmware has been updated, and new features such as fast parallel zero-suppression have been included. Repairs of drift tube (DT) trigger mini-crates, optical links and receivers of sector collectors are under way and have been completed on YB0. New firmware for the optical receivers of the theta links to the drift tube track finder is being installed. In parallel, tests with new eta track finde...

  5. TRIGGER

    CERN Multimedia

    R. Carlin with contributions from D. Acosta

    2012-01-01

    Level-1 Trigger Data-taking continues at cruising speed, with high availability of all components of the Level-1 trigger. We have operated the trigger up to a luminosity of 7.6E33, where we approached 100 kHz using the 7E33 prescale column.  Recently, the pause without triggers in case of an automatic "RESYNC" signal (the "settle" and "recover" time) was reduced in order to minimise the overall dead-time. This may become very important when the LHC comes back with higher energy and luminosity after LS1. We are also preparing for data-taking in the proton-lead run in early 2013. The CASTOR detector will make its comeback into CMS and triggering capabilities are being prepared for this. Steps to be taken include improved cooperation with the TOTEM trigger system and using the LHC clock during the injection and ramp phases of LHC. Studies are being finalised that will have a bearing on the Trigger Technical Design Report (TDR), which is to be rea...

  6. TRIGGER

    CERN Multimedia

    W. Smith

    At the December meeting, the CMS trigger group reported on progress in production, tests in the Electronics Integration Center (EIC) in Prevessin 904, progress on trigger installation in the underground counting room at point 5, USC55, and results from the Magnet Test and Cosmic Challenge (MTCC) phase II. The trigger group is engaged in the final stages of production testing, systems integration, and software and firmware development. Most systems are delivering final tested electronics to CERN. The installation in USC55 is underway and moving towards integration testing. A program of orderly connection and checkout with subsystems and central systems has been developed. This program includes a series of vertical subsystem slice tests providing validation of a portion of each subsystem from front-end electronics through the trigger and DAQ to data captured and stored. This is combined with operations and testing without beam that will continue until startup. The plans for start-up, pilot and early running tri...

  7. TRIGGER

    CERN Multimedia

    Wesley Smith

    2011-01-01

    Level-1 Trigger Hardware and Software New Forward Scintillating Counters (FSC) for rapidity gap measurements have been installed and integrated into the Trigger recently. For the Global Muon Trigger, tuning of quality criteria has led to improvements in muon trigger efficiencies. Several subsystems have started campaigns to increase spares by recovering boards or producing new ones. The barrel muon sector collector test system has been reactivated, new η track finder boards are in production, and φ track finder boards are under revision. In the CSC track finder, an η asymmetry problem has been corrected. New pT look-up tables have also improved efficiency. RPC patterns were changed from four out of six coincident layers to three out of six in the barrel, which led to a significant increase in efficiency. A new PAC firmware to trigger on heavy stable charged particles allows looking for chamber hit coincidences in two consecutive bunch-crossings. The redesign of the L1 Trigger Emulator...

  8. TRIGGER

    CERN Multimedia

    W. Smith, from contributions of D. Acosta

    2012-01-01

      The L1 Trigger group deployed several major improvements this year. Compared to 2011, the single-muon trigger rate has been reduced by a factor of 2 and the η coverage has been restored to 2.4, with high efficiency. During the current technical stop, a higher jet seed threshold will be applied in the Global Calorimeter Trigger in order to significantly reduce the strong pile-up dependence of the HT and multi-jet triggers. The currently deployed L1 menu, with the “6E33” prescales, has a total rate of less than 100 kHz and operates with detector readout dead time of less than 3% for luminosities up to 6.5 × 1033 cm–2s–1. Further prescale sets have been created for 7 and 8 × 1033 cm–2s–1 luminosities. The L1 DPG is evaluating the performance of the Trigger for upcoming conferences and publication. Progress on the Trigger upgrade was reviewed during the May Upgrade Week. We are investigating scenarios for stagin...

  9. TRIGGER

    CERN Multimedia

    W. Smith from contributions of C. Leonidopoulos, I. Mikulec, J. Varela and C. Wulz.

    Level-1 Trigger Hardware and Software Over the past few months, the Level-1 trigger has successfully recorded data with cosmic rays over long continuous stretches as well as LHC splash events, beam halo, and collision events. The L1 trigger hardware, firmware, synchronization, performance and readiness for beam operation were reviewed in October. All L1 trigger hardware is now installed at Point 5, and most of it is completely commissioned. While the barrel ECAL Trigger Concentrator Cards are fully operational, the recently delivered endcap ECAL TCC system is still being commissioned. For most systems there is a sufficient number of spares available, but for a few systems additional reserve modules are needed. It was decided to increase the overall L1 latency by three bunch crossings to increase the safety margin for trigger timing adjustments. In order for CMS to continue data taking during LHC frequency ramps, the clock distribution tree needs to be reset. The procedures for this have been tested. A repl...

  10. TRIGGER

    CERN Multimedia

    R. Arcidiacono

    2013-01-01

      In 2013 the Trigger Studies Group (TSG) has been restructured in three sub-groups: STEAM, for the development of new HLT menus and monitoring their performance; STORM, for the development of HLT tools, code and actual configurations; and FOG, responsible for the online operations of the High Level Trigger. The Strategy for Trigger Evolution And Monitoring (STEAM) group is responsible for Trigger Menu development, path timing, trigger performance studies coordination, HLT offline DQM as well as HLT release, menu and conditions validation – in collaboration and with the technical support of the PdmV group. Since the end of proton-proton data taking, the group has started preparing for 2015 data taking, with collisions at 13 TeV and 25 ns bunch spacing. The reliability of the extrapolation to higher energy is being evaluated comparing the trigger rates on 7 and 8 TeV Monte Carlo samples with the data taken in the past two years. The effect of 25 ns bunch spacing is being studied on the d...

  11. TRIGGER

    CERN Multimedia

    W. Smith

    Level-1 Trigger Hardware and Software The road map for the final commissioning of the level-1 trigger system has been set. The software for the trigger subsystems is being upgraded to run under CERN Scientific Linux 4 (SLC4). There is also a new release for the Trigger Supervisor (TS 1.4), which implies upgrade work by the subsystems. As reported by the CERN group, a campaign to tidy the Trigger Timing and Control (TTC) racks has begun. The machine interface was upgraded by installing the new RF2TTC module, which receives RF signals from LHC Point 4. Two Beam Synchronous Timing (BST) signals, one for each beam, can now be received in CMS. The machine group will define the exact format of the information content shortly. The margin on the locking range of the CMS QPLL is planned for study for different subsystems in the next Global Runs, using a function generator. The TTC software has been successfully tested on SLC4. Some TTC subsystems have already been upgraded to SLC4. The TTCci Trigger Supervisor ...

  12. Hydrothermal processes above the Yellowstone magma chamber: Large hydrothermal systems and large hydrothermal explosions

    Science.gov (United States)

    Morgan, L.A.; Shanks, W.C. Pat; Pierce, K.L.

    2009-01-01

    Hydrothermal explosions are violent and dramatic events resulting in the rapid ejection of boiling water, steam, mud, and rock fragments from source craters that range from a few meters up to more than 2 km in diameter; associated breccia can be emplaced as much as 3 to 4 km from the largest craters. Hydrothermal explosions occur where shallow interconnected reservoirs of steam- and liquid-saturated fluids with temperatures at or near the boiling curve underlie thermal fields. Sudden reduction in confi ning pressure causes fluids to fl ash to steam, resulting in signifi cant expansion, rock fragmentation, and debris ejection. In Yellowstone, hydrothermal explosions are a potentially signifi cant hazard for visitors and facilities and can damage or even destroy thermal features. The breccia deposits and associated craters formed from hydrothermal explosions are mapped as mostly Holocene (the Mary Bay deposit is older) units throughout Yellowstone National Park (YNP) and are spatially related to within the 0.64-Ma Yellowstone caldera and along the active Norris-Mammoth tectonic corridor. In Yellowstone, at least 20 large (>100 m in diameter) hydrothermal explosion craters have been identifi ed; the scale of the individual associated events dwarfs similar features in geothermal areas elsewhere in the world. Large hydrothermal explosions in Yellowstone have occurred over the past 16 ka averaging ??1 every 700 yr; similar events are likely in the future. Our studies of large hydrothermal explosion events indicate: (1) none are directly associated with eruptive volcanic or shallow intrusive events; (2) several historical explosions have been triggered by seismic events; (3) lithic clasts and comingled matrix material that form hydrothermal explosion deposits are extensively altered, indicating that explosions occur in areas subjected to intense hydrothermal processes; (4) many lithic clasts contained in explosion breccia deposits preserve evidence of repeated fracturing

  13. TRIGGER

    CERN Multimedia

    by Wesley Smith

    2011-01-01

    Level-1 Trigger Hardware and Software After the winter shutdown minor hardware problems in several subsystems appeared and were corrected. A reassessment of the overall latency has been made. In the TTC system shorter cables between TTCci and TTCex have been installed, which saved one bunch crossing, but which may have required an adjustment of the RPC timing. In order to tackle Pixel out-of-syncs without influencing other subsystems, a special hardware/firmware re-sync protocol has been introduced in the Global Trigger. The link between the Global Calorimeter Trigger and the Global Trigger with the new optical Global Trigger Interface and optical receiver daughterboards has been successfully tested in the Electronics Integration Centre in building 904. New firmware in the GCT now allows a setting to remove the HF towers from energy sums. The HF sleeves have been replaced, which should lead to reduced rates of anomalous signals, which may allow their inclusion after this is validated. For ECAL, improvements i...

  14. TRIGGER

    CERN Multimedia

    W. Smith

    2011-01-01

    Level-1 Trigger Hardware and Software Overall the L1 trigger hardware has been running very smoothly during the last months of proton running. Modifications for the heavy-ion run have been made where necessary. The maximal design rate of 100 kHz can be sustained without problems. All L1 latencies have been rechecked. The recently installed Forward Scintillating Counters (FSC) are being used in the heavy ion run. The ZDC scintillators have been dismantled, but the calorimeter itself remains. We now send the L1 accept signal and other control signals to TOTEM. Trigger cables from TOTEM to CMS will be installed during the Christmas shutdown, so that the TOTEM data can be fully integrated within the CMS readout. New beam gas triggers have been developed, since the BSC-based trigger is no longer usable at high luminosities. In particular, a special BPTX signal is used after a quiet period with no collisions. There is an ongoing campaign to provide enough spare modules for the different subsystems. For example...

  15. TRIGGER

    CERN Multimedia

    J. Alimena

    2013-01-01

    Trigger Strategy Group The Strategy for Trigger Evolution And Monitoring (STEAM) group is responsible for the development of future High-Level Trigger menus, as well as of its DQM and validation, in collaboration and with the technical support of the PdmV group. Taking into account the beam energy and luminosity expected in 2015, a rough estimate of the trigger rates indicates a factor four increase with respect to 2012 conditions. Assuming that a factor two can be tolerated thanks to the increase in offline storage and processing capabilities, a toy menu has been developed using the new OpenHLT workflow to estimate the transverse energy/momentum thresholds that would halve the current trigger rates. The CPU time needed to run the HLT has been compared between data taken with 25 ns and 50 ns bunch spacing, for equivalent pile-up: no significant difference was observed on the global time per event distribution at the only available data point, corresponding to a pile-up of about 10 interactions. Using th...

  16. TRIGGER

    CERN Multimedia

    W. Smith

    Level-1 Trigger Hardware The CERN group is working on the TTC system. Seven out of nine sub-detector TTC VME crates with all fibers cabled are installed in USC55. 17 Local Trigger Controller (LTC) boards have been received from production and are in the process of being tested. The RF2TTC module replacing the TTCmi machine interface has been delivered and will replace the TTCci module used to mimic the LHC clock. 11 out of 12 crates housing the barrel ECAL off-detector electronics have been installed in USC55 after commissioning at the Electronics Integration Centre in building 904. The cabling to the Regional Calorimeter Trigger (RCT) is terminated. The Lisbon group has completed the Synchronization and Link mezzanine board (SLB) production. The Palaiseau group has fully tested and installed 33 out of 40 Trigger Concentrator Cards (TCC). The seven remaining boards are being remade. The barrel TCC boards have been tested at the H4 test beam, and good agreement with emulator predictions were found. The cons...

  17. Stress-induced comenditic trachyte effusion triggered by trachybasalt intrusion: multidisciplinary study of the AD 1761 eruption at Terceira Island (Azores)

    Science.gov (United States)

    Pimentel, A.; Zanon, V.; de Groot, L. V.; Hipólito, A.; Di Chiara, A.; Self, S.

    2016-03-01

    The AD 1761 eruption on Terceira was the only historical subaerial event on the island and one of the last recorded in the Azores. The eruption occurred along the fissure zone that crosses the island and produced a trachybasalt lava flow and scoria cones. Small comenditic trachyte lava domes (known as Mistérios Negros) were also thought by some to have formed simultaneously on the eastern flank of Santa Bárbara Volcano. Following a multidisciplinary approach, we combined geological mapping, paleomagnetic, petrographic, mineral and whole-rock geochemical and structural analyses to study this eruption. The paleomagnetic dating method compared geomagnetic vectors (directions and intensities) recorded by both the AD 1761 lava flow and Mistérios Negros domes and revealed that the two events were indeed coeval. Based on new data and interpretation of historical records, we have accordingly reconstructed the AD 1761 eruptive dynamics and distinguished three phases: (1) a precursory phase characterized by decreased degassing in the fumarolic field of Pico Alto Volcano and a gradual increase of seismic activity, which marked the intrusion of trachybasalt magma; (2) a first eruptive phase that started with phreatic explosions on the eastern flank of Santa Bárbara Volcano, followed by the inconspicuous effusion of comenditic trachyte (66 wt% SiO2), forming a WNW-ESE-oriented chain of lava domes; and (3) a second eruptive phase on the central part of the fissure zone, where a Hawaiian to Strombolian-style eruption formed small scoria cones (E-W to ENE-WSW-oriented) and a trachybasalt lava flow (50 wt% SiO2) which buried 27 houses in Biscoitos village. Petrological analyses show that the two batches of magma were emitted independently without evidence of interaction. We envisage that the dome-forming event was triggered by local stress changes induced by intrusion of the trachybasalt dyke along the fissure zone, which created tensile stress conditions that promoted ascent

  18. EFFECTS OF HEAT-FLOW AND HYDROTHERMAL FLUIDS FROM ...

    African Journals Online (AJOL)

    Volcanic intrusions and hydrothermal activity have modified the diagenetic minerals. In the Ulster Basin, UK, most of the authigenic mineralization in the Permo-Triassic sandstones pre-dated tertiary volcanic intrusions. The hydrothermal fluids and heat-flow from the volcanic intrusions did not affect quartz and feldspar ...

  19. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  20. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  1. A low-δ18O intrusive breccia from Koegel Fontein, South Africa: Remobilisation of basement that was hydrothermally altered during global glaciation?

    Science.gov (United States)

    Olianti, Camille A. E.; Harris, Chris

    2018-02-01

    The Cretaceous Koegel Fontein igneous complex is situated on the west coast of South Africa, and has a high proportion of rocks with abnormally low δ18O values. The rocks with the lowest δ18O values (- 5.2‰) belong to intrusive matrix-supported breccia pipes and dykes, containing a variety of clast types. The breccia rocks range in SiO2 from 44 to 68 wt% and their whole-rock δ18O values vary between - 5.2‰ and + 1.8‰. The major and trace element composition of the breccia rocks is consistent with them containing variable proportions of clasts of Cretaceous intrusive rocks and basement gneiss and the matrix being fluidized material derived from the same source as the clasts. Based on the nature of the clasts contained in the breccia, it was emplaced just prior to intrusion of the main Rietpoort Granite at 134 Ma. All components of the breccia have low δ18O value and, at least in the case of the gneiss clasts, this predates incorporation in the fluidized material. Although the early Cretaceous appears to have been a period of cold climate, it is unlikely that the δ18O values of ambient precipitation ( - 10‰) would have been low enough to have generated the required 18O-depletion. The basement gneiss was probably 2-3 km below the Cretaceous surface, minimizing the possibility of interaction with isotopically unmodified meteoric water, and there is no evidence for foundered blocks of cover rocks in the breccia. There is, therefore, no evidence for downwards movement of material. We favour a model where basement gneiss interacted with extremely 18O-depleted fluid during crustal reworking at 547 Ma, a time of global glaciation. Low-δ18O metamorphic fluids produced by dehydration melting of 18O-depleted gneiss became trapped and, as the fluid pressure increased, failure of the seal resulted in explosive upwards movement of fluidized breccia. Migration was along pre-existing dykes, incorporating fragments of these dykes, as well as the country rock gneiss.

  2. Historical analysis of rainfall-triggered rockfalls: the case study of the disaster of the ancient hydrothermal Sclafani Spa (Madonie Mts, northern-central Sicily, Italy) in 1851

    Science.gov (United States)

    Contino, Antonio; Bova, Patrizia; Esposito, Giuseppe; Giuffré, Ignazio; Monteleone, Salvatore

    2017-12-01

    In 1851, the region of Sicily experienced many rainstorm-induced landslides. On 13 March 1851, a rainstorm brought about a severe rockfall disaster near the small town of Sclafani (Madonie Mountains, northern-central Sicily, Italy). Rocks detached from the carbonate crest of Mt Sclafani (813 m above sea level) and fell downslope, causing the collapse of the ancient hydrothermal spa (about 430 m above sea level) and burying it. Fortunately, there were no injuries or victims. Given its geological, geomorphological and tectonic features, the calcareous-dolomitic and carbonate-siliciclastic relief of Mt Sclafani is extremely prone to landsliding. This study combines the findings of detailed geological and geomorphological field surveys and of a critical review of documentary data. A thorough analysis of documentary sources and historical maps made it possible to identify the location (previously unknown) of the ancient spa. The rockfall dynamics was reconstructed by comparing field reconnaissance data and documentary sources. The 1851 event reconstruction is an example of the application of an integrated methodological approach, which can yield a propaedeutic, yet meaningful picture of a natural disaster, paving the way for further research (e.g. slope failure susceptibility, future land-use planning, protection of thermal springs and mitigation of the impact of similar disasters in this area). Indeed, the intensification of extreme weather events, caused by global warming induced by climate change, has increased the risk of recurrence of a catastrophic event, like that of the ancient Sclafani spa, which is always a potential threat.

  3. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  4. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  5. Hydrothermal systems and volcano geochemistry

    Science.gov (United States)

    Fournier, R.O.

    2007-01-01

    The upward intrusion of magma from deeper to shallower levels beneath volcanoes obviously plays an important role in their surface deformation. This chapter will examine less obvious roles that hydrothermal processes might play in volcanic deformation. Emphasis will be placed on the effect that the transition from brittle to plastic behavior of rocks is likely to have on magma degassing and hydrothermal processes, and on the likely chemical variations in brine and gas compositions that occur as a result of movement of aqueous-rich fluids from plastic into brittle rock at different depths. To a great extent, the model of hydrothermal processes in sub-volcanic systems that is presented here is inferential, based in part on information obtained from deep drilling for geothermal resources, and in part on the study of ore deposits that are thought to have formed in volcanic and shallow plutonic environments.

  6. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  7. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  8. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  9. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  10. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  11. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  12. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  13. Hydrothermal Processes

    Science.gov (United States)

    German, C. R.; von Damm, K. L.

    2003-12-01

    What is Hydrothermal Circulation?Hydrothermal circulation occurs when seawater percolates downward through fractured ocean crust along the volcanic mid-ocean ridge (MOR) system. The seawater is first heated and then undergoes chemical modification through reaction with the host rock as it continues downward, reaching maximum temperatures that can exceed 400 °C. At these temperatures the fluids become extremely buoyant and rise rapidly back to the seafloor where they are expelled into the overlying water column. Seafloor hydrothermal circulation plays a significant role in the cycling of energy and mass between the solid earth and the oceans; the first identification of submarine hydrothermal venting and their accompanying chemosynthetically based communities in the late 1970s remains one of the most exciting discoveries in modern science. The existence of some form of hydrothermal circulation had been predicted almost as soon as the significance of ridges themselves was first recognized, with the emergence of plate tectonic theory. Magma wells up from the Earth's interior along "spreading centers" or "MORs" to produce fresh ocean crust at a rate of ˜20 km3 yr-1, forming new seafloor at a rate of ˜3.3 km2 yr-1 (Parsons, 1981; White et al., 1992). The young oceanic lithosphere formed in this way cools as it moves away from the ridge crest. Although much of this cooling occurs by upward conduction of heat through the lithosphere, early heat-flow studies quickly established that a significant proportion of the total heat flux must also occur via some additional convective process (Figure 1), i.e., through circulation of cold seawater within the upper ocean crust (Anderson and Silbeck, 1981). (2K)Figure 1. Oceanic heat flow versus age of ocean crust. Data from the Pacific, Atlantic, and Indian oceans, averaged over 2 Ma intervals (circles) depart from the theoretical cooling curve (solid line) indicating convective cooling of young ocean crust by circulating seawater

  14. Geochemical characterisation of Taal volcano-hydrothermal system and temporal evolution during continued phases of unrest (1991-2017)

    Science.gov (United States)

    Maussen, Katharine; Villacorte, Edgardo; Rebadulla, Ryan R.; Maximo, Raymond Patrick; Debaille, Vinciane; Bornas, Ma. Antonia; Bernard, Alain

    2018-02-01

    Taal volcano (Luzon Island, Philippines) has last erupted in 1977 but has known some periods of increased activity, characterised by seismic swarms, ground deformation, increased carbon dioxide flux and in some cases temperature anomalies and the opening of fissures. We studied major, trace element and sulphur and strontium isotopic composition of Taal lake waters and hot springs over a period of 25 years to investigate the geochemical evolution of Taal volcano's hydrothermal system and its response to volcanic unrest. Long-term evolution of Main Crater Lake (MCL) composition shows a slow but consistent decrease of acidity, SO4, Mg, Fe and Al concentrations and a trend from light to heavy sulphate, consistent with a general decrease of volcanic gases dissolving in the hydrothermal system. Na, K and Cl concentrations remain constant indicating a non-volcanic origin for these elements. Sulphate and strontium isotopic data suggest this neutral chloride-rich component represents input of geothermal water into Taal hydrothermal system. A significant deviation from the long-term baseline can be seen in two samples from 1995. That year, pH dropped from 2.6 to 2.2, F, Si and Fe concentrations increased and Na, K and Cl concentrations decreased. Sulphate was depleted in 34S and temperature was 4 °C above baseline level at the time of sampling. We attribute these changes to the shallow intrusion of a degassing magma body during the unrest in 1991-1994. More recent unrest periods have not caused significant changes in the geochemistry of Taal hydrothermal waters and are therefore unlikely to have been triggered by shallow magma intrusion. A more likely cause for these events is thus pressurisation of the hydrothermal reservoir by increasing degassing from a stagnant magma reservoir. Our study indicates that new magmatic intrusions that might lead to the next eruption of Taal volcano are expected to change the geochemistry of MCL in the same way as in 1994-1995, with the most

  15. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  16. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  17. Seismic and Gas Analyses Imply Magmatic Intrusion at Iliamna Volcano, Alaska in 2012

    Science.gov (United States)

    Prejean, S. G.; Werner, C. A.; Buurman, H.; Doukas, M. P.; Kelly, P. J.; Kern, C.; Ketner, D.; Stihler, S.; Thurber, C. H.; West, M. E.

    2012-12-01

    In early 2012, Iliamna Volcano, an ice-covered andesitic stratovolcano located in the Cook Inlet region of Alaska, had a vigorous earthquake swarm that included both brittle-failure earthquakes (Mvolume has otherwise been seismically quiet except during a possible magmatic intrusion at Iliamna in 1996, when it sustained a similar swarm (Roman et al., 2004, J. Volc. Geotherm. Res., v. 130, p. 265-284). Analysis of the relative amplitudes between the small low-frequency and located brittle failure events indicates that their sources are geographically separate, with the low-frequency events sourced closer to the fumarolically active summit region, ~4 km north of the brittle failure events. Airborne gas-emission measurements on March 17 revealed emission rates of up to 2000 and 580 tonnes per day (t/d) of CO2 and SO2, respectively, and a molar C/S ratio of 5. Visual observations from the flight revealed unusually vigorous fumarole activity near the summit. Subsequent measurements on June 20 and 22 showed continued high emissions of up to 1190 and 440 t/d of CO2 and SO2, respectively, with a C/S ratio of 4. These emission measurements are similar to those measured during the height of the 1996 unrest episode and are significantly above background measurements between 1998 and August 2011, which were typically below 100 and 60 t/d of CO2 and SO2. Taken together, gas and seismic data suggest that the earthquake swarm was driven by magmatic intrusion. Gas flux rates are consistent with those measured for degassing andesitic magmas in the shallow crust at other Cook Inlet volcanoes. Increased heat and degassing likely caused small low-frequency events in the shallow hydrothermal system near the volcano's summit, and/or may have destabilized the glacier, triggering shallow low-frequency glacial events. This unrest episode demonstrates how magmatic intrusions can cause spatially disparate earthquake swarms in hydrothermal systems and on pre-existing crustal structures.

  18. Argentine hydrothermal panorama

    Energy Technology Data Exchange (ETDEWEB)

    1976-12-01

    An attempt is made to give a realistic review of Argentine thermal waters. The topics discussed are the characteristics of the hydrothermal resources, classification according to their mineral content, hydrothermal flora and fauna, uses of hydrothermal resources, hydrothermal regions of Argentina, and meteorology and climate. A tabulation is presented of the principal thermal waters. (JSR)

  19. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  20. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  1. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  2. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  3. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  4. Trigger finger

    Science.gov (United States)

    ... digit; Trigger finger release; Locked finger; Digital flexor tenosynovitis ... cut or hand Yellow or green drainage from the cut Hand pain or discomfort Fever If your trigger finger returns, call your surgeon. You may need another surgery.

  5. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  6. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  7. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  8. Trigger Finger

    Science.gov (United States)

    ... in a bent position. People whose work or hobbies require repetitive gripping actions are at higher risk ... developing trigger finger include: Repeated gripping. Occupations and hobbies that involve repetitive hand use and prolonged gripping ...

  9. The hydrothermal evolution of the Kawerau geothermal system, New Zealand

    Science.gov (United States)

    Milicich, S. D.; Chambefort, I.; Wilson, C. J. N.; Charlier, B. L. A.; Tepley, F. J.

    2018-03-01

    Hydrothermal alteration zoning and processes provide insights into the evolution of heat source(s) and fluid compositions associated with geothermal systems. Traditional petrological techniques, combined with hydrothermal alteration studies, stable isotope analyses and geochronology can resolve the nature of the fluids involved in hydrothermal processes and their changes through time. We report here new findings along with previous unpublished works on alteration patterns, fluid inclusion measurements and stable isotope data to provide insights into the thermal and chemical evolution of the Kawerau geothermal system, New Zealand. These data indicate the presence of two hydrothermal events that can be coupled with chronological data. The earlier period of hydrothermal activity was initiated at 400 ka, with the heat driving the hydrothermal system inferred to be from the magmatic system that gave rise to rhyolite lavas and sills of the Caxton Formation. Isotopic data fingerprint fluids attributed to this event as meteoric, indicating that the magma primarily served as a heat source driving fluid circulation, and was not releasing magmatic fluids in sufficient quantity to affect the rock mineralogy and thus inferred fluid compositions. The modern Kawerau system was initiated at 16 ka with hydrothermal eruptions linked to shallow intrusion of magma at the onset of activity that gave rise to the Putauaki andesite cone. Likely associated with this later event was a pulse of magmatic CO2, resulting in large-scale deposition of hydrothermal calcite enriched in 18O. Meteoric water-dominated fluids subsequently overwhelmed the magmatic fluids associated with this 18O-rich signature, and both the fluid inclusion microthermometry and stable isotope data reflect a change to the present-day fluid chemistry of low salinity, meteoric-dominated waters.

  10. Triggering Artefacts

    DEFF Research Database (Denmark)

    Mogensen, Preben Holst; Robinson, Mike

    1995-01-01

    and adapting them to specific situations need not be ad hoc.Triggering artefacts are a way of systematically challenging both designers' preunderstandings and the conservatism of work practice. Experiences from the Great Belt tunnel and bridge project are used to illustrate howtriggering artefacts change...

  11. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  12. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  13. Hydrothermal liquefaction of biomass

    DEFF Research Database (Denmark)

    Toor, Saqib; Rosendahl, Lasse; Rudolf, Andreas

    2011-01-01

    This article reviews the hydrothermal liquefaction of biomass with the aim of describing the current status of the technology. Hydrothermal liquefaction is a medium-temperature, high-pressure thermochemical process, which produces a liquid product, often called bio-oil or bi-crude. During...... the hydrothermal liquefaction process, the macromolecules of the biomass are first hydrolyzed and/or degraded into smaller molecules. Many of the produced molecules are unstable and reactive and can recombine into larger ones. During this process, a substantial part of the oxygen in the biomass is removed...... by dehydration or decarboxylation. The chemical properties of bio-oil are highly dependent of the biomass substrate composition. Biomass constitutes of various components such as protein; carbohydrates, lignin and fat, and each of them produce distinct spectra of compounds during hydrothermal liquefaction...

  14. Geophysical characterization of subaerial hydrothermal manifestations in Punta Banda, Baja California, Mexico.

    Science.gov (United States)

    Flores-Marquez, L.; Prol-Ledesma, R. M.; Arango, C.; Canet, C.

    2009-04-01

    Important growth of population in Baja California Peninsula has triggered the need for energy and fresh water. The most sustainable possibility for increasing the availability of fresh water is the use of renewable energy sources in desalination plants. The abundance of geothermal manifestations in the peninsula provides a reliable energy source for desalination purposes. Geothermal development of the Baja California Peninsula dates from the 70's, when the Cerro Prieto geothermal field started producing electricity. Two important cities, Tijuana and Ensenada, are located in the north-western area of Baja California. The city of Ensenada has a desalination plant that is due to be replaced and the geothermal resources of the area could be an option for the new desalination plant. Punta Banda, a region near Ensenada, was specially investigated to determine its geothermal potential. Subaerial springs and the submarine vents were sampled and studied in this work, also geological and geochemical studies were performed, moreover geoelectrical surveys were accomplished to characterize the hydrothermal system at depth. Even though saline intrusion is a severe problem in Ensenada (TDS higher than 3000), thermal springs away from the coast and coastal springs have salinities lower than sea water. According to the geoelectrical models obtained from profiles, the inferred conductive features can be related to thermal anomalies. The existence of hot springs located along a trend suggests that the dynamic of the thermal fluid is restricted by secondary faults.

  15. Geochemistry and geochronology of ore-bearing and barren intrusions in the Luanchuan ore fields of East Qinling metallogenic belt, China: Diverse tectonic evolution and implications for mineral exploration

    Science.gov (United States)

    Xue, Fei; Wang, Gongwen; Santosh, M.; Yang, Fan; Shen, Zhiwei; Kong, Liang; Guo, Nana; Zhang, Xuhuang; Jia, Wenjuan

    2018-05-01

    The Luanchuan ore fields form part of the East Qinling metallogenic belt in central China. In this study, we compare two ore-bearing intrusions, the Shibaogou granitic pluton (SBG) and the Zhongyuku granitic pluton (ZYK), with the ore-barren Laojunshan intrusion (LJS) from the Luanchuan ore field. Geochemically, all the three intrusions are characterized by high-Si, high-K, and alkalis, together with moderate-ASI, exhibiting I-type granite features. The rocks, especially the ore-related plutons also show enrichment in LREEs. Mineral chemistry of biotite from the intrusions exhibits similar features of high Si and Mg, and low Al and Fe. Zircon grains from the ZYK intrusion yielded a U-Pb age of 149.6 ± 2.4 Ma. The zircon grains show εHf (t) values and two stage model ages (TDM2) in the range of -16.8 to -19.7 and 1998-2156 Ma respectively. The biotite composition and Hf isotopic data indicate that the magma was derived by re-melting of deep crustal material with minor input of mantle components. We evaluate the results to understand the physico-chemical conditions, petrogenesis, and tectonic setting, and their implications for mineral exploration. The ore-bearing plutons show wide ranges of temperature and oxygen fugacity, favoring Mo-W mineralization. In addition, estimates on pressure and depth of emplacement suggest that lower solidification pressure in a decompressional setting contributed to the evolution of magmatic hydrothermal deposits. Our data suggest that the ZYK has the highest potential for Mo-W mineralization. The ore-bearing plutons of ZYK and SBG were formed in a transitional tectonic setting from compression to extension, with the large-scale metallogeny triggered by slab melts at ca. 145 Ma. However, the ore-barren LJS batholith formed in an extension-related geodynamic setting at ∼115 Ma. Our study shows that different tectonic settings and consequent physico-chemical conditions dictated the ore potential of the intrusions in the Luanchuan ore

  16. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  17. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  18. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  19. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  20. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  1. Complexing and hydrothermal ore deposition

    CERN Document Server

    Helgeson, Harold C

    1964-01-01

    Complexing and Hydrothermal Ore Deposition provides a synthesis of fact, theory, and interpretative speculation on hydrothermal ore-forming solutions. This book summarizes information and theory of the internal chemistry of aqueous electrolyte solutions accumulated in previous years. The scope of the discussion is limited to those aspects of particular interest to the geologist working on the problem of hydrothermal ore genesis. Wherever feasible, fundamental principles are reviewed. Portions of this text are devoted to calculations of specific hydrothermal equilibriums in multicompone

  2. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  3. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  4. Hydrothermal conversion of biomass

    NARCIS (Netherlands)

    Knezevic, D.

    2009-01-01

    This thesis presents research of hydrothermal conversion of biomass (HTC). In this process, hot compressed water (subcritical water) is used as the reaction medium. Therefore this technique is suitable for conversion of wet biomass/ waste streams. By working at high pressures, the evaporation of

  5. Trigger circuit

    International Nuclear Information System (INIS)

    Verity, P.R.; Chaplain, M.D.; Turner, G.D.J.

    1984-01-01

    A monostable trigger circuit comprises transistors TR2 and TR3 arranged with their collectors and bases interconnected. The collector of the transistor TR2 is connected to the base of transistor TR3 via a capacitor C2 the main current path of a grounded base transistor TR1 and resistive means R2,R3. The collector of transistor TR3 is connected to the base of transistor TR2 via resistive means R6, R7. In the stable state all the transistors are OFF, the capacitor C2 is charged, and the output is LOW. A positive pulse input to the base of TR2 switches it ON, which in turn lowers the voltage at points A and B and so switches TR1 ON so that C2 can discharge via R2, R3, which in turn switches TR3 ON making the output high. Thus all three transistors are latched ON. When C2 has discharged sufficiently TR1 switches OFF, followed by TR3 (making the output low again) and TR2. The components C1, C3 and R4 serve to reduce noise, and the diode D1 is optional. (author)

  6. Pore Pressure Distribution and Flank Instability in Hydrothermally Altered Stratovolcanoes

    Science.gov (United States)

    Ball, J. L.; Taron, J.; Hurwitz, S.; Reid, M. E.

    2015-12-01

    Field and geophysical investigations of stratovolcanoes with long-lived hydrothermal systems commonly reveal that initially permeable regions (such as brecciated layers of pyroclastic material) can become both altered and water-bearing. Hydrothermal alteration in these regions, including clay formation, can turn them into low-permeability barriers to fluid flow, which could increase pore fluid pressures resulting in flank slope instability. We examined elevated pore pressure conditions using numerical models of hydrothermal flow in stratovolcanoes, informed by geophysical data about internal structures and deposits. Idealized radially symmetric meshes were developed based on cross-sectional profiles and alteration/permeability structures of Cascade Range stratovolcanoes. We used the OpenGeoSys model to simulate variably saturated conditions in volcanoes heated only by regional heat fluxes, as well as 650°C intrusions at two km depth below the surface. Meteoric recharge was estimated from precipitation rates in the Cascade Range. Preliminary results indicate zones of elevated pore pressures form: 1) where slopes are underlain by continuous low-permeability altered layers, or 2) when the edifice has an altered core with saturated, less permeable limbs. The first scenario might control shallow collapses on the slopes above the altered layers. The second could promote deeper flank collapses that are initially limited to the summit and upper slopes, but could progress to the core of an edifice. In both scenarios, pore pressures can be further elevated by shallow intrusions, or evolve over longer time scales under forcing from regional heat flux. Geometries without confining low-permeability layers do not show these pressure effects. Our initial scenarios use radially symmetric models, but we are also simulating hydrothermal flow under real 3D geometries with asymmetric subsurface structures (Mount Adams). Simulation results will be used to inform 3D slope

  7. Hydrothermal signature in the axial-sediments from the Carlsberg Ridge in the northwest Indian Ocean

    Science.gov (United States)

    Yu, Zenghui; Li, Huaiming; Li, Mengxing; Zhai, Shikui

    2018-04-01

    30 sediments grabbed from 24 sites between the equator and 10°N along the Carlsberg Ridge (CR) in the northwest Indian Ocean has been analyzed for bulk chemical compositions. Hydrothermal components in the sediments are identified and characterized. They mainly occur at 6.3°N as sulfide debris and at 3.6°N as both sulfide and high temperature water-rock interaction products. The enrichment of chalcophile elements such as Zn, Cu, Pb and the depletion of alkalis metals such as K and Rb are the typical features of hydrothermal components. High U/Fe, low (Nd/Yb)N and negative Ce anomaly infer the uptake of seawater in the hydrothermal deposits by oxidizing after deposition. However, the general enrichment of Mn in hydrothermal plumed-derived materials is not found in the sediments, which may indicate the limited diffusion of fluids or plumes, at least in the direction along the Carlsberg spreading center. The hydrothermal components show their similarity to the hydrothermal deposits from the Indian Ocean Ridge. At 3.6°N ultramafic rocks or gabbroic intrusions, may be involved in the hydrothermal system.

  8. Hydrothermal liquefaction of biomass

    DEFF Research Database (Denmark)

    Toor, Saqib; Rosendahl, Lasse; Hoffmann, Jessica

    2014-01-01

    Biomass is one of the most abundant sources of renewable energy, and will be an important part of a more sustainable future energy system. In addition to direct combustion, there is growing attention on conversion of biomass into liquid en-ergy carriers. These conversion methods are divided...... into biochemical/biotechnical methods and thermochemical methods; such as direct combustion, pyrolysis, gasification, liquefaction etc. This chapter will focus on hydrothermal liquefaction, where high pressures and intermediate temperatures together with the presence of water are used to convert biomass...... into liquid biofuels, with the aim of describing the current status and development challenges of the technology. During the hydrothermal liquefaction process, the biomass macromolecules are first hydrolyzed and/or degraded into smaller molecules. Many of the produced molecules are unstable and reactive...

  9. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  10. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  11. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  12. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  14. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  15. Hydrothermal plume anomalies over the southwest Indian ridge: magmatic control

    Science.gov (United States)

    Yue, X.; Li, H.; Tao, C.; Ren, J.; Zhou, J.; Chen, J.; Chen, S.; Wang, Y.

    2017-12-01

    Here we firstly reported the extensive survey results of the hydrothermal activity along the ultra-slow spreading southwest Indian ridge (SWIR). The study area is located at segment 27, between the Indomed and Gallieni transform faults, SWIR. The seismic crustal thickness reaches 9.5km in this segment (Li et al., 2015), which is much thicker than normal crustal. The anomaly thickened crust could be affected by the Crozet hotspot or highly focused melt delivery from the mantle. The Duanqiao hydrothermal field was reported at the ridge valley of the segment by Tao et al (2009). The Deep-towed Hydrothermal Detection System (DHDS) was used to collect information related with hydrothermal activity, like temperature, turbidity, oxidation-reduction potential (ORP) and seabed types. There are 15 survey lines at the interval of 2 to 3 km which are occupied about 1300 km2 in segment 27. After processing the raw data, including wiping out random noise points, 5-points moving average processing and subtracting the ambient, we got anomalous Nephelometric Turbidity Units values (ΔNTU). And dE/dt was used to identify the ORP anomalous as the raw data is easily influenced by electrode potentials drifting (Baker et al., 2016). According to the results of water column turbidity and ORP distributions, we confirmed three hydrothermal anomaly fields named A1, A2 and A3. The three fields are all located in the western part of the segment. The A1 field lies on the ridge valley, west side of Duanqiao field. The A2 and A3 field lie on the northern and southern of the ridge valley, respectively. We propose that recent magmatic activity probably focus on the western part of segment 27.And the extensive distribution of hydrothermal plume in the segment is the result of the discrete magma intrusion. References Baker E T, et al. How many vent fields? New estimates of vent field populations on ocean ridges from precise mapping of hydrothermal discharge locations. EPSL, 2016, 449:186-196. Li J

  16. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  17. Geomathematical characterisation of the mineralization indicators: a case study from Tincova magmatic intrusion (Romania

    Directory of Open Access Journals (Sweden)

    George Tudor

    2011-10-01

    Full Text Available Indicators of the hydrothermal mineralization in the Tincova Laramian intrusion were tested at the contact zone between the intrusive body and the metamorphic host rocks. The mineralization consists of Cu, Pb and Zn sulfides, arsenopyrite, pyrrhotite and pyrite in gangue of quartz, carbonates, feldspar, sericite or clay minerals, and includes areas of hydrothermal alteration or oxidation. Seventy-nine samples were analyzed and processed as two distinct populations. Geomathematical methods highlight the importance of factors such as the shape, sizes of the mineralized zones and geological processes involved in the ore genesis. Trend maps for Cu, Pb + Zn, and Ag interpolated by kriging method, show anomalous values of Cu along the edge of the intrusive body with the metamorphic country rocks, and Pb + Zn in a marginal area. Departing from the study of correlations between different variables, the factor analysis (R-mode highlights five factors that represent a sequence of geological processes: pneumatolytic phase (Sn, deposition of the association with arsenopyrite, pyrrhotite, pyrite, molybdenite (Ni, Co, Mo, formation of the Cu ± Ag + Bi sulfide mineralization, galena mineralization ± Au, hydrothermal alteration processes (addition of Ba, Sr, V. The dependence of Cu on other elements is performed by multiple linear regression, resulting an equation statistically tested by F-test, and interpreted as originating in a phase of the metallogenetic processes. The shape of the Cu-Mo mineralized stockwork from Vălişor Valley area has been studied on the basis of samples from drillings, Cu trend maps at three depth levels, and a three-dimensional model.

  18. Hydrothermal Liquefaction of Biomass

    Energy Technology Data Exchange (ETDEWEB)

    Elliott, Douglas C.

    2010-12-10

    Hydrothermal liquefaction technology is describes in its relationship to fast pyrolysis of biomass. The scope of work at PNNL is discussed and some intial results are presented. HydroThermal Liquefaction (HTL), called high-pressure liquefaction in earlier years, is an alternative process for conversion of biomass into liquid products. Some experts consider it to be pyrolysis in solvent phase. It is typically performed at about 350 C and 200 atm pressure such that the water carrier for biomass slurry is maintained in a liquid phase, i.e. below super-critical conditions. In some applications catalysts and/or reducing gases have been added to the system with the expectation of producing higher yields of higher quality products. Slurry agents ('carriers') evaluated have included water, various hydrocarbon oils and recycled bio-oil. High-pressure pumping of biomass slurry has been a major limitation in the process development. Process research in this field faded away in the 1990s except for the HydroThermal Upgrading (HTU) effort in the Netherlands, but has new resurgence with other renewable fuels in light of the increased oil prices and climate change concerns. Research restarted at Pacific Northwest National Laboratory (PNNL) in 2007 with a project, 'HydroThermal Liquefaction of Agricultural and Biorefinery Residues' with partners Archer-Daniels-Midland Company and ConocoPhillips. Through bench-scale experimentation in a continuous-flow system this project investigated the bio-oil yield and quality that could be achieved from a range of biomass feedstocks and derivatives. The project was completed earlier this year with the issuance of the final report. HydroThermal Liquefaction research continues within the National Advanced Biofuels Consortium with the effort focused at PNNL. The bench-scale reactor is being used for conversion of lignocellulosic biomass including pine forest residue and corn stover. A complementary project is an international

  19. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  20. Hydrothermally grown zeolite crystals

    International Nuclear Information System (INIS)

    Durrani, S.K.; Qureshi, A.H.; Hussain, M.A.; Qazi, N.K.

    2009-01-01

    The aluminium-deficient and ferrosilicate zeolite-type materials were synthesized by hydrothermal process at 150-170 degree C for various periods of time from the mixtures containing colloidal reactive silica, sodium aluminate, sodium hydroxide, iron nitrate and organic templates. Organic polycation templates were used as zeolite crystal shape modifiers to enhance relative growth rates. The template was almost completely removed from the zeolite specimens by calcination at 550 degree C for 8h in air. Simultaneous thermogravimetric (TG) and differential thermal analysis (DTA) was performed to study the removal of water molecules and the amount of organic template cations occluded inside the crystal pore of zeolite framework. The 12-13% weight loss in the range of (140-560 degree C) was associated with removal of the (C/sub 3/H/sub 7/)/sub 4/ N+ cation and water molecules. X-ray diffraction (XRD) analysis and scanning electron microscope (SEM) techniques were employed to study the structure, morphology and surface features of hydrothermally grown aluminium-deficient and ferrosilicate zeolite-type crystals. In order to elucidate the mode of zeolite crystallization the crystallinity and unit cell parameters of the materials were determined by XRD, which are the function of Al and Fe contents of zeolites. (author)

  1. Hydrothermal effects on montmorillonite

    International Nuclear Information System (INIS)

    Pusch, R.; Karnland, O.

    1988-06-01

    Hydrothermal effects on montmorillonite clay are usually taken to have the form of conversion of this clay mineral to other species, such as illite, disregarding microstructural alteration and cementation caused by precipitation of silica and other compounds. The report is focussed on identification of the primary processes that are involved in such alteration, the release of silica and the microstructural changes associated with heating being of major interest. In the first test phase, Na montmorillonite in distilled water was investigated by XRD, rheology tests and electron microscopy after heating to 60-225 0 C for 0.01 to 1 year. The preliminary conclusions are that heating produces contraction of the particle network to form dense 'branches', the effect being most obvious at the highest temperature but of significance even at 60-100 0 C. Release of substantial amounts of silica gas been documented for temperatures exceeding 150 0 and precipitation of silica was observed on cooling after the hydrothermal testing under the closed conditions that prevailed throughout the tests. The precipitates, which appeared to be amorphous and probably consisted of hydrous silica gels, were concluded to have increased the mechanical strength and caused some brittleness, particularly of the dense clays. The nature of the silica release, which is assumed to be associated with beidellitization, may be closely related to an unstable state of a certain fraction of tetrahedral silica at heat-inducted transfer between two different crystal modes of montmorillonite. (orig.)

  2. The LHCb trigger

    International Nuclear Information System (INIS)

    Korolko, I.

    1998-01-01

    This paper describes progress in the development of the LHCb trigger system since the letter of intent. The trigger philosophy has significantly changed, resulting in an increase of trigger efficiency for signal B events. It is proposed to implement a level-1 vertex topology trigger in specialised hardware. (orig.)

  3. Porosity evolution in Icelandic hydrothermal systems

    Science.gov (United States)

    Thien, B.; Kosakowski, G.; Kulik, D. A.

    2014-12-01

    Mineralogical alteration of reservoir rocks, driven by fluid circulation in natural or enhanced hydrothermal systems, is likely to influence the long-term performance of geothermal power generation. A key factor is the change of porosity due to dissolution of primary minerals and precipitation of secondary phases. Porosity changes will affect fluid circulation and solute transport, which, in turn, influence mineralogical alteration. This study is part of the Sinergia COTHERM project (COmbined hydrological, geochemical and geophysical modeling of geotTHERMal systems, grant number CRSII2_141843/1) that is an integrative research project aimed at improving our understanding of the sub-surface processes in magmatically-driven natural geothermal systems. These are typically high enthalphy systems where a magmatic pluton is located at a few kilometers depth. These shallow plutons increase the geothermal gradient and trigger the circulation of hydrothermal waters with a steam cap forming at shallow depth. Field observations suggest that active and fossil Icelandic hydrothermal systems are built from a superposition of completely altered and completely unaltered layers. With help of 1D and 2D reactive transport models (OpenGeoSys-GEM code), we investigate the reasons for this finding, by studying the mineralogical evolution of protoliths with different initial porosities at different temperatures and pressures, different leaching water composition and gas content, and different porosity geometries (i.e. porous medium versus fractured medium). From this study, we believe that the initial porosity of protoliths and volume changes due to their transformation into secondary minerals are key factors to explain the different alteration extents observed in field studies. We also discuss how precipitation and dissolution kinetics can influence the alteration time scales.

  4. Hydrothermal activity in the Tulancingo-Acoculco Caldera Complex, central Mexico. Exploratory studies

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Hernandez, Aida [Gerencia de Proyectos Geotermoelectricos, CFE, Alejandro Volta 655, 58290 Morelia, Michoacan (Mexico); Centro de Geociencias, Universidad Nacional Autonoma de Mexico, Campus Juriquilla, Queretaro, Qro., 76230 (Mexico); Garcia-Estrada, Gerardo; Palma-Guzman, Hugo; Quijano-Leon, Jose L. [Gerencia de Proyectos Geotermoelectricos, CFE, Alejandro Volta 655, 58290 Morelia, Michoacan (Mexico); Aguirre-Diaz, Gerardo; Gonzalez-Partida, Eduardo [Centro de Geociencias, Universidad Nacional Autonoma de Mexico, Campus Juriquilla, Queretaro, Qro., 76230 (Mexico)

    2009-09-15

    Mineral alteration and fluid inclusion studies of drill cuttings and core samples indicate that the sedimentary basement rocks and the volcanic rocks associated with Tulancingo-Acoculco Caldera Complex have been the site of two distinct and major hydrothermal events. The complex, located in the eastern portion of the Trans-Mexican Volcanic Belt, is formed by the Pliocene Tulancingo Caldera and the younger (Pleistocene) Acoculco Caldera, which developed within the older depression. The volcanic rocks are underlain by Cretaceous sedimentary rocks of the Sierra Madre Oriental. The earliest important hydrothermal event occurred during the emplacement of Mid-Tertiary granitic intrusions that metamorphosed the sedimentary rocks; these intrusives are not exposed at the surface. However, granitic rocks were encountered at the bottom of exploratory borehole EAC-1, drilled within the Caldera Complex. The second main event occurred during the formation of the Tulancingo and Acoculco Calderas. Both episodes lead to secondary mineralization that reduced the permeability of the reservoir rocks. A possible third hydrothermal event may be associated with the recent magmatic activity within the Acoculco Caldera.Thermal logs from well EAC-1 display a conductive thermal gradient with maximum temperatures exceeding 300 C at 2000 m depth. Although there are no active thermal springs in the area, there is extensive fossil surface hydrothermal alteration and cold gas discharges with high He{sup 3}/He{sup 4} ratios. (author)

  5. Hydrothermal alteration in Dumoga Barat, Bolaang Mongondow area North Sulawesi

    International Nuclear Information System (INIS)

    Agus Harjanto' Sutanto; Sutarto; Achmad Subandrio; I Made Suasta; Juanito Salamat; Giri Hartono; Putu Suputra; I Gde Basten; Muhammad Fauzi; Rosdiana

    2016-01-01

    Bolaang Mongondow is located in central north Sulawesi arm, which is composed of Neogen magmatic arc and potentially contain economic minerals. This condition is behind the research purpose to study the mineral resources potencies. Research aim is to study alteration caused by hydrothermal process and its relation with gold (Au) deposit based on field study and laboratory analysis. Methodologies used for the research are literature study, geological survey, rocks sampling, laboratory analysis, and data processing. Research area is a multiply diorite intrusion complex. Andesite, volcaniclastic rocks, and dacite, the older rocks, were intruded by this complex. Later, dacitic tuff, volcanic sandstone, and alluvium deposited above them. There are three measured and mapped major faults heading NE-SW crossed by E-W fault and NW-SE fault lately crossed all the older faults. Early stage hydrothermal alteration related to the existence of young quartz diorite, showing alteration stage from the potassic center to distal prophylatic. Final stage hydrothermal alteration consist of argilic, advanced argilic, and silica-clay mineral±magnetite±chlorite alteration overlapping the earlier alteration. Mineralization of Cu-Au±Ag in central part of research area or Tayap-Kinomaligan area is mostly associated with potassic altered young quartz diorite and crossed by parallel and stock worked quartz-magnetite-chalcopyrite±bornite vein. (author)

  6. Nanogeochemistry of hydrothermal magnetite

    Science.gov (United States)

    Deditius, Artur P.; Reich, Martin; Simon, Adam C.; Suvorova, Alexandra; Knipping, Jaayke; Roberts, Malcolm P.; Rubanov, Sergey; Dodd, Aaron; Saunders, Martin

    2018-06-01

    Magnetite from hydrothermal ore deposits can contain up to tens of thousands of parts per million (ppm) of elements such as Ti, Si, V, Al, Ca, Mg, Na, which tend to either structurally incorporate into growth and sector zones or form mineral micro- to nano-sized particles. Here, we report micro- to nano-structural and chemical data of hydrothermal magnetite from the Los Colorados iron oxide-apatite deposit in Chile, where magnetite displays both types of trace element incorporation. Three generations of magnetites (X-Z) were identified with concentrations of minor and trace elements that vary significantly: SiO2, from below detection limit (bdl) to 3.1 wt%; Al2O3, 0.3-2.3 wt%; CaO, bdl-0.9 wt%; MgO, 0.02-2.5 wt%; TiO2, 0.1-0.4 wt%; MnO, 0.04-0.2 wt%; Na2O, bdl-0.4 wt%; and K2O, bdl-0.4 wt%. An exception is V2O3, which is remarkably constant, ranging from 0.3 to 0.4 wt%. Six types of crystalline nanoparticles (NPs) were identified by means of transmission electron microscopy in the trace element-rich zones, which are each a few micrometres wide: (1) diopside, (2) clinoenstatite; (3) amphibole, (4) mica, (5) ulvöspinel, and (6) Ti-rich magnetite. In addition, Al-rich nanodomains, which contain 2-3 wt% of Al, occur within a single crystal of magnetite. The accumulation of NPs in the trace element-rich zones suggest that they form owing to supersaturation from a hydrothermal fluid, followed by entrapment during continuous growth of the magnetite surface. It is also concluded that mineral NPs promote exsolution of new phases from the mineral host, otherwise preserved as structurally bound trace elements. The presence of abundant mineral NPs in magnetite points to a complex incorporation of trace elements during growth, and provides a cautionary note on the interpretation of micron-scale chemical data of magnetite.

  7. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  8. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  9. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  10. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  11. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  12. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  13. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  14. The Central Trigger Processor (CTP)

    CERN Multimedia

    Franchini, Matteo

    2016-01-01

    The Central Trigger Processor (CTP) receives trigger information from the calorimeter and muon trigger processors, as well as from other sources of trigger. It makes the Level-1 decision (L1A) based on a trigger menu.

  15. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  16. Hydrothermal Growth of Polyscale Crystals

    Science.gov (United States)

    Byrappa, Kullaiah

    In this chapter, the importance of the hydrothermal technique for growth of polyscale crystals is discussed with reference to its efficiency in synthesizing high-quality crystals of various sizes for modern technological applications. The historical development of the hydrothermal technique is briefly discussed, to show its evolution over time. Also some of the important types of apparatus used in routine hydrothermal research, including the continuous production of nanosize crystals, are discussed. The latest trends in the hydrothermal growth of crystals, such as thermodynamic modeling and understanding of the solution chemistry, are elucidated with appropriate examples. The growth of some selected bulk, fine, and nanosized crystals of current technological significance, such as quartz, aluminum and gallium berlinites, calcite, gemstones, rare-earth vanadates, electroceramic titanates, and carbon polymorphs, is discussed in detail. Future trends in the hydrothermal technique, required to meet the challenges of fast-growing demand for materials in various technological fields, are described. At the end of this chapter, an Appendix 18.A containing a more or less complete list of the characteristic families of crystals synthesized by the hydrothermal technique is given with the solvent and pressure-temperature (PT) conditions used in their synthesis.

  17. Hydrothermal response to a volcano-tectonic earthquake swarm, Lassen, California

    Science.gov (United States)

    Ingebritsen, Steven E.; Shelly, David R.; Hsieh, Paul A.; Clor, Laura; P.H. Seward,; Evans, William C.

    2015-01-01

    The increasing capability of seismic, geodetic, and hydrothermal observation networks allows recognition of volcanic unrest that could previously have gone undetected, creating an imperative to diagnose and interpret unrest episodes. A November 2014 earthquake swarm near Lassen Volcanic National Park, California, which included the largest earthquake in the area in more than 60 years, was accompanied by a rarely observed outburst of hydrothermal fluids. Although the earthquake swarm likely reflects upward migration of endogenous H2O-CO2 fluids in the source region, there is no evidence that such fluids emerged at the surface. Instead, shaking from the modest sized (moment magnitude 3.85) but proximal earthquake caused near-vent permeability increases that triggered increased outflow of hydrothermal fluids already present and equilibrated in a local hydrothermal aquifer. Long-term, multiparametric monitoring at Lassen and other well-instrumented volcanoes enhances interpretation of unrest and can provide a basis for detailed physical modeling.

  18. Hydrothermal Conversion in Near-Critical Water – A Sustainable Way of Producing Renewable Fuels

    DEFF Research Database (Denmark)

    Hoffmann, Jessica; Pedersen, Thomas Helmer; Rosendahl, Lasse

    2014-01-01

    Liquid fuels from biomass will form an essential part of meeting the grand challenges within energy. The need for renewable and sustainable energy sources is triggered by a number of factors; like increase in global energy demand, depletion of conventional resources, climate issues and the desire...... hydrothermal conversion of lignocellulosic biomass and upgrading pathways of bio-crude components with focus on hydrodeoxygenation reactions....

  19. Perceptual processing during trauma, priming and the development of intrusive memories

    Science.gov (United States)

    Sündermann, Oliver; Hauschildt, Marit; Ehlers, Anke

    2013-01-01

    Background Intrusive reexperiencing in posttraumatic stress disorder (PTSD) is commonly triggered by stimuli with perceptual similarity to those present during the trauma. Information processing theories suggest that perceptual processing during the trauma and enhanced perceptual priming contribute to the easy triggering of intrusive memories by these cues. Methods Healthy volunteers (N = 51) watched neutral and trauma picture stories on a computer screen. Neutral objects that were unrelated to the content of the stories briefly appeared in the interval between the pictures. Dissociation and data-driven processing (as indicators of perceptual processing) and state anxiety during the stories were assessed with self-report questionnaires. After filler tasks, participants completed a blurred object identification task to assess priming and a recognition memory task. Intrusive memories were assessed with telephone interviews 2 weeks and 3 months later. Results Neutral objects were more strongly primed if they occurred in the context of trauma stories than if they occurred during neutral stories, although the effect size was only moderate (ηp2=.08) and only significant when trauma stories were presented first. Regardless of story order, enhanced perceptual priming predicted intrusive memories at 2-week follow-up (N = 51), but not at 3 months (n = 40). Data-driven processing, dissociation and anxiety increases during the trauma stories also predicted intrusive memories. Enhanced perceptual priming and data-driven processing were associated with lower verbal intelligence. Limitations It is unclear to what extent these findings generalize to real-life traumatic events and whether they are specific to negative emotional events. Conclusions The results provide some support for the role of perceptual processing and perceptual priming in reexperiencing symptoms. PMID:23207970

  20. Mineral types of hydrothermal alteration zones in the Dukat ore field and their relationships to leucogranite and epithermal gold-silver ore, northeastern Russia

    Science.gov (United States)

    Filimonova, L. G.; Trubkin, N. V.; Chugaev, A. V.

    2014-05-01

    The paper considers the localization of potassic and propylitic hydrothermal alteration zones in the domal volcanic-plutonic structure controlling the position of the Dukat ore field with the eponymous unique epithermal Au-Ag deposit. Comprehensive mineralogical and geochemical data on rocks and minerals in hydrothermal alteration zones and associated intrusions have shown that quartz-jarosite-sericite, quartz-pyrite-sericite, and quartz-adularia-chlorite alterations were formed with the participation of fluid flows related to a fingerlike projection of a high-K leucogranite porphyry intrusion with large phenocrysts. These hydrothermal alterations developed in the rifted graben under conditions of divergent plate boundaries, whereas quartz-clinozoisite-calcite, epidote-chlorite, and garnet-calcite-chlorite alterations were linked to K-Na leucogranite intrusive bodies and developed under conditions of convergent plate boundaries reactivated as a result of formation of the marginal Okhotsk-Chukotka volcanic belt. Phase separation and coagulation of specific portions of ascending fluids resulted in the formation and stabilization of small-sized particles of native silver and other ore components, which enabled involvement in flows of secondary geothermal solutions and ore-forming fluids. The Sr, Nd, and Pb isotopic compositions of rocks and minerals from the hydrothermal alteration zones, associated intrusions, and economic orebodies at the Dukat deposit indicate that their components have been derived from the juvenile continental crust, which was altered in pre-Cretaceous periods of endogenic activity. The components of gangue minerals of potassic and propylitic hydrothertmal alterations and associated intrusions have been taken from deep sources differing in 87Sr/86Sr and 143Nd/144Nd at similar U/Pb and Th/Pb ratios. Chalcophile lead in products of hydrothermal activity and melanocratic inclusions in leucogranite has been taken from regions with elevated U/Pb and

  1. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  2. Geological influence of andesite intrusion on diatomite. Pt. 2. Physical property changes of diatomite and self-sealing mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Chigira, Masahiro; Nakata, Eiji [Central Research Inst. of Electric Power Industry, Abiko, Chiba (Japan). Abiko Research Lab.

    1996-03-01

    Diatomite alteration by andesite intrusion was studied especially on their physical property changes and the dynamic alteration processes for the diatomite of the Miocene Iwaya Formation in the Akita Prefecture, northern Japan. Diatomite is altered in different ways according to the extent of infiltration of hydrothermal solution into diatomite from dike. When the solution infiltrates into diatomite in large amount, smectite is formed in diatomite which is subsequently compacted to the most, and amorphous silica and poorly crystallized opal-CT precipitate in the compacted zone to form impermeable opaline chert. The chert zone becomes a hydraulic barrier against the infiltration of hydrothermal solution to make a closed system around the heat source, where opal-A transforms into opal-CT. When hydrothermal solution does not infiltrate into diatomite, diatomite is altered only by the heat from the andesitic dike: diatomite is compacted under higher temperatures near the dike, and consequently permeability is lowered. In both cases, diatomite is altered so as to mitigate the influence of magma intrusion. (author). 66 refs.

  3. Geological influence of andesite intrusion on diatomite. Pt. 2. Physical property changes of diatomite and self-sealing mechanism

    International Nuclear Information System (INIS)

    Chigira, Masahiro; Nakata, Eiji

    1996-01-01

    Diatomite alteration by andesite intrusion was studied especially on their physical property changes and the dynamic alteration processes for the diatomite of the Miocene Iwaya Formation in the Akita Prefecture, northern Japan. Diatomite is altered in different ways according to the extent of infiltration of hydrothermal solution into diatomite from dike. When the solution infiltrates into diatomite in large amount, smectite is formed in diatomite which is subsequently compacted to the most, and amorphous silica and poorly crystallized opal-CT precipitate in the compacted zone to form impermeable opaline chert. The chert zone becomes a hydraulic barrier against the infiltration of hydrothermal solution to make a closed system around the heat source, where opal-A transforms into opal-CT. When hydrothermal solution does not infiltrate into diatomite, diatomite is altered only by the heat from the andesitic dike: diatomite is compacted under higher temperatures near the dike, and consequently permeability is lowered. In both cases, diatomite is altered so as to mitigate the influence of magma intrusion. (author). 66 refs

  4. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  5. Thermochemical convection in porous media : an application to hydrothermal systems and magmetic intrusions

    NARCIS (Netherlands)

    Schoofs, C.A.

    1999-01-01

    The motion of aqueous and magmatic liquids has a large influence on the evolution of the cooling and chemically differentiating Earth. In many geological environments, these fluids percolate through the pores and fractures of a solid matrix, which is composed of (un)conso-lidated rocks or

  6. Apatite formation behaviour during metasomatism in the Bathtub Intrusion (Babbitt deposit, Duluth Complex, USA)

    Science.gov (United States)

    Raič, Sara; Mogessie, Aberra; Krenn, Kurt; Hauzenberger, Christoph A.; Tropper, Peter

    2016-04-01

    The mineralized troctolitic Bathtub intrusion (Duluth Complex, NE-Minnesota) is known for its famous Cu-Ni-Sulfide±PGM Babbitt deposit, where platinum group minerals (PGMs) are either hosted by primary magmatic sulfides (base metal sulfides) or associated with hydrothermally altered portions. This secondary generation of PGMs is present in alteration patches and suggests the involvement of hydrothermal fluids in the mobilization of platinum-group elements (PGEs). Accessory fluorapatite in these samples reveals besides H2O- and CO2-rich primary fluid inclusions, textural and compositional variations that also record magmatic and metasomatic events. Based on detailed back-scattered electron imaging (BSE) and laser ablation-inductively coupled plasma-mass spectrometry (LA-ICPMS), a primary magmatic origin is reflected by homogeneous or zoned grains, where zoning patterns are either concentric or oscillatory, with respect to LREE. Late magmatic to hydrothermal processes are indicated by grains with bright LREE-enriched rims or conversion textures with REE-enriched patches in the interior of the apatite. A metasomatic formation of monazite from apatite is documented by the presence of monazite inclusions in apatite and newly grown monazite at altered apatite rims. They formed by the release of REEs from the apatite during a fluid-induced alteration, based on the coupled substitution Ca2+ + P5+ = REE3+ + Si4+ (Rønsbo 1989; Rønsbo 2008). Samples with monazite inclusions in apatite further display occurrences of PGMs associated with hydrothermal alteration patches (chlorite + amphibole). The presence of H2O- and CO2-rich fluid inclusions in apatite, the metasomatically induced monazite growth, as well as the occurrence of PGMs in hydrothermally alteration zones, also suggest the involvement of aqueous chloride complexes in a H2O dominated fluid in the transportation of LREE and redistribution of the second generation of PGEs. Rønsbo, J.G. (1989): Coupled substitutions

  7. Hydrothermal pretreatment of coal

    Energy Technology Data Exchange (ETDEWEB)

    Ross, D.S.

    1989-12-21

    We have examined changes in Argonne Premium samples of Wyodak coal following 30 min treatment in liquid water at autogenous pressures at 150{degrees}, 250{degrees}, and 350{degrees}C. In most runs the coal was initially dried at 60{degrees}C/1 torr/20 hr. The changes were monitored by pyrolysis field ionization mass spectrometry (py-FIMS) operating at 2.5{degrees}C/min from ambient to 500{degrees}C. We recorded the volatility patterns of the coal tars evolved over that temperature range, and in all cases the tar yields were 25%--30% of the starting coal on mass basis. There was essentially no change after the 150{degrees}C treatment. Small increases in volatility were seen following the 250{degrees}C treatment, but major effects were seen in the 350{degrees} work. The tar quantity remained unchanged; however, the volatility increased so the temperature of half volatility for the as-received coal of 400{degrees}C was reduced to 340{degrees}C. Control runs with no water showed some thermal effect, but the net effect from the presence of liquid water was clearly evident. The composition was unchanged after the 150{degrees} and 250{degrees}C treatments, but the 350{degrees} treatment brought about a 30% loss of oxygen. The change corresponded to loss of the elements of water, although loss of OH'' seemed to fit the analysis data somewhat better. The water loss takes place both in the presence and in the absence of added water, but it is noteworthy that the loss in the hydrothermal runs occurs at p(H{sub 2}O) = 160 atm. We conclude that the process must involve the dehydration solely of chemically bound elements of water, the dehydration of catechol is a specific, likely candidate.

  8. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  9. BAT Triggering Performance

    Science.gov (United States)

    McLean, Kassandra M.; Fenimore, E. E.; Palmer, D. M.; BAT Team

    2006-09-01

    The Burst Alert Telescope (BAT) onboard Swift has detected and located about 160 gamma-ray bursts (GRBs) in its first twenty months of operation. BAT employs two triggering systems to find GRBs: image triggering, which looks for a new point source in the field of view, and rate triggering, which looks for a significant increase in the observed counts. The image triggering system looks at 1 minute, 5 minute, and full pointing accumulations of counts in the detector plane in the energy range of 15-50 keV, with about 50 evaluations per pointing (about 40 minutes). The rate triggering system looks through 13 different time scales (from 4ms to 32s), 4 overlapping energy bins (covering 15-350 keV), 9 regions of the detector plane (from the full plane to individual quarters), and two background sampling models to search for GRBs. It evaluates 27000 trigger criteria in a second, for close to 1000 criteria. The image triggering system looks at 1, 5, and 40 minute accumulations of counts in the detector plane in the energy range of 15-50 keV. Both triggering systems are working very well with the settings from before launch and after we turned on BAT. However, we now have more than a year and a half of data to evaluate these triggering systems and tweak them for optimal performance, as well as lessons learned from these triggering systems.

  10. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  11. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  12. Geochemistry and tectonic implications of the Early Carboniferous Keketuobie intrusion in the West Junggar foldbelt, NW China

    Science.gov (United States)

    Deng, Yu-Feng; Yuan, Feng; Zhou, Taofa; Hollings, Pete; Zhang, Dayu

    2018-06-01

    The Keketuobie intrusion is situated in the northern part of the West Junggar foldbelt at the southern margin of the Central Asian Orogeic Belt. The intrusion consists of medium- to coarse-grained gabbro, fine-grained gabbro and diorite. Igneous zircons from the medium- to coarse-grained gabbro yielded a LA-ICP-MS U-Pb age of 320.8 ± 5.7 Ma, indicating that the intrusion was emplaced in the Early Carboniferous. The intrusive contact between the medium- to coarse-grained gabbro and the fine-grained gabbro indicates they formed from distinct magma pulses. Magnetite crystals from the fine-grained gabbro have lower V2O3 but higher TiO2 and Al2O3 contents than those of the medium- to coarse-grained gabbro, suggesting that the fine-grained gabbro crystallized in a relatively higher fO2 and temperature magma than the medium- to coarse-grained gabbro. The Keketuobie intrusive rocks are characterized by enriched large ion lithophile elements and depleted high field strength elements relative to N-MORB with restricted (87Sr/86Sr)t ratios (0.70370-0.70400) and εNd(t) values (+5.85 to +6.97). The petrography and geochemistry are comparable to those of subduction-related volcanic rocks. The trace elements and isotopic compositions of the mafic intrusive rocks suggest that the primary magmas were derived from mixing of metasomatized lithospheric mantle and depleted asthenospheric melts, perhaps triggered by slab break-off. The Keketuobie intrusion is younger than adjacent ophiolite sequences, island arc volcanic rocks and porphyry deposits, but predates the post-collisional A-type granites and bimodal volcanic rocks in the district, suggesting that the Keketuobie intrusion likely formed in a syn-collisional setting.

  13. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  14. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  15. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  16. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  17. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  18. Stay away from asthma triggers

    Science.gov (United States)

    Asthma triggers - stay away from; Asthma triggers - avoiding; Reactive airway disease - triggers; Bronchial asthma - triggers ... clothes. They should leave the coat outside or away from your child. Ask people who work at ...

  19. Source and Enrichment of Toxic Elements in Coal Seams around Mafic Intrusions: Constraints from Pyrites in the Yuandian Coal Mine in Anhui, Eastern China

    Directory of Open Access Journals (Sweden)

    Yanfei An

    2018-04-01

    Full Text Available Pyrite, a mineral that can cause potential environmental issues in coal mining, is commonly found in coal seams around intrusions. In this paper, pyrites from the Yuandian Coal Mine (Huaibei Coalfield, Anhui, Eastern China were studied using SEM, Raman and LA-ICP-MS. The pyrite morphologic and geochemical data suggest that (1 four pyrite generations are present (framboidal sedimentary pyrites (Py I in the original coal, coarse-grained magmatic pyrites (Py II in the intruding diabase, fine-grained metamorphic pyrites (Py III in the intrusive contact aureole, and spheroid/vein hydrothermal pyrites (Py IV in the cokeite; and (2 concentrations of cobalt, nickel, arsenic, selenium, lead and copper in the metamorphic pyrites are much higher than the other pyrite generations. We propose that mafic magmatism is the main contributor of the toxic elements to the intrusion-related cokeite at Yuandian.

  20. Characterization of hydrothermal green quartz produced by gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Enokihara, Cyro T.; Rela, Paulo R., E-mail: cteiti@ipen.br, E-mail: prela06@yahoo.com.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Schultz-Güttler, Rainer A., E-mail: rainersgut@gmail.com [Universidade de Sao Paulo (USP), Sao Paulo, SP (Brazil). Instituto de Geociencias

    2015-07-01

    A specific variety of quartz showing a green color in nature or induced artificially by radiation gamma ({sup 60}Co) is quite rare. Only two occurrences are known today, where this type of quartz can be found: Canada, at the Thunder Bay Amethyst Mine, Ontario and Brazil, at widely scattered geode occurrences along a 600 km stretch from Quarai at Brazils southern most tip to Uberlandia in Minas Gerais. These two occurrences have been formed by strong hydrothermal activities.That way much quartz crystals showed a very fast growth history facilitating the formation of growth defects (twinning, small angle tilting, mosaic growth, striations) and the uptake of water in form of micro inclusions, molecular water, silanol (Si-OH) and OH. In the present work the material analyzed is from hydrothermal regimes found in intrusions of basaltic rocks located in the Rio Grande do Sul state. To characterize these materials, colored green by gamma rays, analyses by ICP, electron microscopy, water loss techniques and UV-VIS or NIR-FTIR spectroscopic measurements have been made. Silanol complexes are formed, which by radiation due to gamma rays form the color center NBOHC (Non-bonding Oxygen Hole Center), showing absorption between 590 to 620 nm, responsible for the green color. The water content with up to 3200 ppm by weight exceeds the amount of charge balancing cations (Fe, Al, Li). There is no correlation between water content and cations as in other color varieties. (author)

  1. Hydrothermal Cold Sintering

    Science.gov (United States)

    Kang, Xiaoyu

    Solid state sintering transforms particle compact to a physically robust and dense polycrystalline monolith driven by reduction of surface energy and curvature. Since bulk diffusion is required for neck formation and pore elimination, sintering temperature about 2/3 of melting point is needed. It thus places limitations for materials synthesis and integration, and contributes to significant energy consumption in ceramic processing. Furthermore, since surface transport requires lower temperature than bulk processes, grain growth is often rapid and can be undesired for physical properties. For these reasons, several techniques have been developed including Liquid Phase Sintering (LPS), Hot Pressing (HP) and Field Assisted Sintering Technique (FAST), which introduce either viscous melt, external pressure or electric field to speed up densification rates at lower temperature. However, because of their inherent reliability on bulk diffusion, temperatures required are often too high for integrating polymers and non-noble metals. Reduction of sintering temperature below 400 °C would require a different densification mechanism that is based on surface transport with external forces to drive volume shrinkage. Densification method combining uniaxial pressure and solution under hydrothermal condition was first demonstrated by Kanahara's group at Kochi University in 1986 and was brought to our attention by the work of Kahari, etc, from University of Oulu on densification of Li2MoO 4 in 2015. This relatively new process showed promising ultra-low densification temperature below 300 °C, however little was known about its fundamental mechanism and scope of applications, which became the main focus of this dissertation. In this work, a uniaxial hydraulic press, a standard stainless steel 1/2 inch diameter die with heating band were utilized in densifying metal oxides. Applied pressure and sintering temperature were between 100 MPa and 700 MPa and from room temperature to 300

  2. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  3. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  4. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  5. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  6. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  7. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  8. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  9. Lessons from (triggered) tremor

    Science.gov (United States)

    Gomberg, Joan

    2010-01-01

    I test a “clock-advance” model that implies triggered tremor is ambient tremor that occurs at a sped-up rate as a result of loading from passing seismic waves. This proposed model predicts that triggering probability is proportional to the product of the ambient tremor rate and a function describing the efficacy of the triggering wave to initiate a tremor event. Using data mostly from Cascadia, I have compared qualitatively a suite of teleseismic waves that did and did not trigger tremor with ambient tremor rates. Many of the observations are consistent with the model if the efficacy of the triggering wave depends on wave amplitude. One triggered tremor observation clearly violates the clock-advance model. The model prediction that larger triggering waves result in larger triggered tremor signals also appears inconsistent with the measurements. I conclude that the tremor source process is a more complex system than that described by the clock-advance model predictions tested. Results of this and previous studies also demonstrate that (1) conditions suitable for tremor generation exist in many tectonic environments, but, within each, only occur at particular spots whose locations change with time; (2) any fluid flow must be restricted to less than a meter; (3) the degree to which delayed failure and secondary triggering occurs is likely insignificant; and 4) both shear and dilatational deformations may trigger tremor. Triggered and ambient tremor rates correlate more strongly with stress than stressing rate, suggesting tremor sources result from time-dependent weakening processes rather than simple Coulomb failure.

  10. Modelling of hydrothermal characteristics of centrifugal nozzles

    International Nuclear Information System (INIS)

    Yarkho, A.A.; Omelchenko, M.P.; Borshchev, V.A.

    1990-01-01

    Presented for the first time is a method of recalculating the hydrothermal characteristics of centrifugal nozzles obtained in laboratory conditions for full-scale nozzles. From the experimental hydrothermal characteristics of nozzles observed in the laboratory it is allowed to calculate the hydrothermal characteristics of any other centrifugal nozzle whose diameter and dimensionless geometric characteristic are known

  11. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Youssef, Tarek [Florida Intl Univ., Miami, FL (United States); El Hariri, Mohammad [Florida Intl Univ., Miami, FL (United States); Habib, Hani [Florida Intl Univ., Miami, FL (United States); Mohammed, Osama [Florida Intl Univ., Miami, FL (United States); Harmon, E [Florida Intl Univ., Miami, FL (United States)

    2017-02-28

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware to trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.

  12. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  13. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  14. A study of the hydrothermal alteration in Paleoproterozoic volcanic centers, São Félix do Xingu region, Amazonian Craton, Brazil, using short-wave infrared spectroscopy

    Science.gov (United States)

    da Cruz, Raquel Souza; Fernandes, Carlos Marcello Dias; Villas, Raimundo Netuno Nobre; Juliani, Caetano; Monteiro, Lena Virgínia Soares; de Almeida, Teodoro Isnard Ribeiro; Lagler, Bruno; de Carvalho Carneiro, Cleyton; Misas, Carlos Mario Echeverri

    2015-10-01

    Hypogene hydrothermal minerals have been identified by short-wave infrared spectroscopy in hydrothermally altered rocks from the Sobreiro and Santa Rosa formations, which belong to a Paleoproterozoic volcano-plutonic system in Amazonian craton. Three clay minerals are spectrally recognized: montmorillonite, kaolinite, and illite. The integration of these data with those available in the literature, including gold occurrences, suggests that those rocks are hydrothermal products of both volcanic thermal sources and later crustal intrusions, as evidenced by variable styles of propylitic, sericitic, potassic, and intermediate argillic alteration. The influence of meteoric fluids is emphasized. This low cost exploratory technique, which can be applied to hand samples, seems to be promising in the separation of hydrothermally altered volcano-plutonic centers in regions submitted to severe weathering conditions, in addition to aid elaborating models for prospecting mineral deposits.

  15. Triggering trigeminal neuralgia

    DEFF Research Database (Denmark)

    Di Stefano, Giulia; Maarbjerg, Stine; Nurmikko, Turo

    2018-01-01

    Introduction Although it is widely accepted that facial pain paroxysms triggered by innocuous stimuli constitute a hallmark sign of trigeminal neuralgia, very few studies to date have systematically investigated the role of the triggers involved. In the recently published diagnostic classification...

  16. Triggering the GRANDE array

    International Nuclear Information System (INIS)

    Wilson, C.L.; Bratton, C.B.; Gurr, J.; Kropp, W.; Nelson, M.; Sobel, H.; Svoboda, R.; Yodh, G.; Burnett, T.; Chaloupka, V.; Wilkes, R.J.; Cherry, M.; Ellison, S.B.; Guzik, T.G.; Wefel, J.; Gaidos, J.; Loeffler, F.; Sembroski, G.; Goodman, J.; Haines, T.J.; Kielczewska, D.; Lane, C.; Steinberg, R.; Lieber, M.; Nagle, D.; Potter, M.; Tripp, R.

    1990-01-01

    A brief description of the Gamma Ray And Neutrino Detector Experiment (GRANDE) is presented. The detector elements and electronics are described. The trigger logic for the array is then examined. The triggers for the Gamma Ray and the Neutrino portions of the array are treated separately. (orig.)

  17. Trigger Menu in 2017

    CERN Document Server

    The ATLAS collaboration

    2018-01-01

    This document summarises the trigger menu deployed by the ATLAS experiment during 2017 data taking at proton-proton collision centre-of-mass energies of $\\sqrt{s}=13$ TeV and $\\sqrt{s}=5$ TeV at the LHC and describes the improvements with respect to the trigger system and menu used in 2016 data taking.

  18. Causality and headache triggers

    Science.gov (United States)

    Turner, Dana P.; Smitherman, Todd A.; Martin, Vincent T.; Penzien, Donald B.; Houle, Timothy T.

    2013-01-01

    Objective The objective of this study was to explore the conditions necessary to assign causal status to headache triggers. Background The term “headache trigger” is commonly used to label any stimulus that is assumed to cause headaches. However, the assumptions required for determining if a given stimulus in fact has a causal-type relationship in eliciting headaches have not been explicated. Methods A synthesis and application of Rubin’s Causal Model is applied to the context of headache causes. From this application the conditions necessary to infer that one event (trigger) causes another (headache) are outlined using basic assumptions and examples from relevant literature. Results Although many conditions must be satisfied for a causal attribution, three basic assumptions are identified for determining causality in headache triggers: 1) constancy of the sufferer; 2) constancy of the trigger effect; and 3) constancy of the trigger presentation. A valid evaluation of a potential trigger’s effect can only be undertaken once these three basic assumptions are satisfied during formal or informal studies of headache triggers. Conclusions Evaluating these assumptions is extremely difficult or infeasible in clinical practice, and satisfying them during natural experimentation is unlikely. Researchers, practitioners, and headache sufferers are encouraged to avoid natural experimentation to determine the causal effects of headache triggers. Instead, formal experimental designs or retrospective diary studies using advanced statistical modeling techniques provide the best approaches to satisfy the required assumptions and inform causal statements about headache triggers. PMID:23534872

  19. The LHCb trigger

    CERN Document Server

    Hernando Morata, Jose Angel

    2006-01-01

    The LHCb experiment relies on an efficient trigger to select a rate up to 2 kHz of events useful for physics analysis from an initial rate of 10 MHz of visible collisions. In this contribution, we describe the different LHCb trigger algorithms and present their expected performance.

  20. Resistivity structure and geochemistry of the Jigokudani Valley hydrothermal system, Mt. Tateyama, Japan

    Science.gov (United States)

    Seki, Kaori; Kanda, Wataru; Tanbo, Toshiya; Ohba, Takeshi; Ogawa, Yasuo; Takakura, Shinichi; Nogami, Kenji; Ushioda, Masashi; Suzuki, Atsushi; Saito, Zenshiro; Matsunaga, Yasuo

    2016-10-01

    This study clarifies the hydrothermal system of Jigokudani Valley near Mt. Tateyama volcano in Japan by using a combination of audio-frequency magnetotelluric (AMT) survey and hot-spring water analysis in order to assess the potential of future phreatic eruptions in the area. Repeated phreatic eruptions in the area about 40,000 years ago produced the current valley morphology, which is now an active solfatara field dotted with hot springs and fumaroles indicative of a well-developed hydrothermal system. The three-dimensional (3D) resistivity structure of the hydrothermal system was modeled by using the results of an AMT survey conducted at 25 locations across the valley in 2013-2014. The model suggests the presence of a near-surface highly conductive layer of falling largely on a mixing line between magmatic fluids and local meteoric water (LMW). The geochemical analysis suggests that the hydrothermal system includes a two-phase zone of vapor-liquid. A comparison of the resistivity structure and the geochemically inferred structure suggests that a hydrothermal reservoir is present at a depth of approximately 500 m, from which hot-spring water differentiates into the three observed types. The two-phase zone appears to be located immediately beneath the cap rock structure. These findings suggest that the hydrothermal system of Jigokudani Valley exhibits a number of factors that could trigger a future phreatic eruption.

  1. The NA27 trigger

    International Nuclear Information System (INIS)

    Bizzarri, R.; Di Capua, E.; Falciano, S.; Iori, M.; Marel, G.; Piredda, G.; Zanello, L.; Haupt, L.; Hellman, S.; Holmgren, S.O.; Johansson, K.E.

    1985-05-01

    We have designed and implemented a minimum bias trigger together with a fiducial volume trigger for the experiment NA27, performed at the CERN SPS. A total of more than 3 million bubble chamber pictures have been taken with a triggered cross section smaller than 75% of the total inelastic cross section. Events containing charm particles were triggered with an efficiency of 98 +2 sub(-3)%. With the fiducial volume trigger, the probability for a picture to contain an interaction in the visible hydrogen increased from 47.3% to 59.5%, reducing film cost and processing effort with about 20%. The improvement in data taking rate is shown to be negligible. (author)

  2. Hydrothermal synthesis, characterization and luminescent ...

    Indian Academy of Sciences (India)

    Home; Journals; Bulletin of Materials Science; Volume 39; Issue 4. Hydrothermal synthesis, characterization and luminescent properties of lanthanide-doped NaLaF 4 nanoparticles. JIGMET LADOL HEENA KHAJURIA SONIKA KHAJURIA ... Keywords. Citric acid; X-ray diffraction; down-conversion emission; energy transfer.

  3. Hydrothermal precipitation of artificial violarite

    DEFF Research Database (Denmark)

    Jørgensen, W. H.; Toftlund, H.; Warner, T. E.

    2012-01-01

    The nonstoichiometric nickel-ore mineral, violarite, (Ni,Fe)3S4 was prepared as a phase-pure fine powder by a comparatively quick hydrothermal method from an aqueous solution of iron(II) acetate, nickel(II) acetate and DL-penicillamine in an autoclave at 130 °C for 45 h. Powder-XRD showed that th...

  4. On stages of hydrothermal mineralization of molybdenum-uranium ore manifestation in volcanic edifice

    International Nuclear Information System (INIS)

    Yakovlev, P.D.; Mamotin, S.A.

    1976-01-01

    Volcanogenic-intrusive complex of the ore manifestation region is represented by various facies of liparite and granitoid formation rocks. Numerous dislocations with breaks in continuity and the corresponding feathering fissures relate to 3 stages of hydrothermal mineralization of rocks. Quartz-sericite-kaolin metasomatites were formed at the earlier (volcanic) stage. Tourmalinization was associated with the middle stage which accompanied the granitoid intrusive formation. The later mineralization stage was accompanied by formation of beresites and molibdenum-uranium ores. Identification was controlled by the dislocation, ore bodies had the shape of lens, vein or small nest. 7 stages separated by shores were identified at the ore stage: quartz-sericite pyritic; quartz-pyrite-arsenopyritic; sulfide-pitchblendic; chalcedonic; ankeritic; quartz-calcitic and pyrite-ankeritic

  5. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  6. Genesis of hydrothermal alterations using stable isotope geochemistry in Takestan area (Tarom zone

    Directory of Open Access Journals (Sweden)

    Batool Taghipou

    2015-12-01

    Full Text Available Hydrothermal alteration processes are extensively took place on volcanic and pyroclstics of Takestan area. Existence of abundant, deep fracturing and subvolcanic intrusions are enhanced extend hydrothermal alteration zones. The following alteration zones are determined: propylitic, argillic, advanced argillic and sillicic. There are outcropped and widespread in different size and limit. Formation of siliceous sinter, silicified tuffs with preserved primary sedimentary layering including pure mineralized alunite patches are most outstanding. Quartz, sussoritic plagioclase, chlorite, sericite and alunite are main mineral constituents in the volcanics. On the basis of geochemical data volcanic rocks are rhyolite, dacite, andesite, andesitic-basalt and basalt in composition. Acid-sulfate zone is the type of alteration in Tarom area and alunite is an index mineral of this zone. Results of 18O, D and 34S stable isotope geochemistry on altered minerals (muscovite, kaolinite and alunite, revealed that alteration fluids are magmatic in origin.

  7. LHCb Topological Trigger Reoptimization

    International Nuclear Information System (INIS)

    Likhomanenko, Tatiana; Khairullin, Egor; Rogozhnikov, Alex; Ustyuzhanin, Andrey; Ilten, Philip; Williams, Michael

    2015-01-01

    The main b-physics trigger algorithm used by the LHCb experiment is the so- called topological trigger. The topological trigger selects vertices which are a) detached from the primary proton-proton collision and b) compatible with coming from the decay of a b-hadron. In the LHC Run 1, this trigger, which utilized a custom boosted decision tree algorithm, selected a nearly 100% pure sample of b-hadrons with a typical efficiency of 60-70%; its output was used in about 60% of LHCb papers. This talk presents studies carried out to optimize the topological trigger for LHC Run 2. In particular, we have carried out a detailed comparison of various machine learning classifier algorithms, e.g., AdaBoost, MatrixNet and neural networks. The topological trigger algorithm is designed to select all ’interesting” decays of b-hadrons, but cannot be trained on every such decay. Studies have therefore been performed to determine how to optimize the performance of the classification algorithm on decays not used in the training. Methods studied include cascading, ensembling and blending techniques. Furthermore, novel boosting techniques have been implemented that will help reduce systematic uncertainties in Run 2 measurements. We demonstrate that the reoptimized topological trigger is expected to significantly improve on the Run 1 performance for a wide range of b-hadron decays. (paper)

  8. NOMAD Trigger Studies

    International Nuclear Information System (INIS)

    Varvell, K.

    1995-01-01

    The author reports on the status of an offline study of the NOMAD triggers, which has several motivations. Of primary importance is to demonstrate, using offline information recorded by the individual subdetectors comprising NOMAD, that the online trigger system is functioning as expected. Such an investigation serves to complement the extensive monitoring which is already carried out online. More specific to the needs of the offline software and analysis, the reconstruction of tracks and vertices in the detector requires some knowledge of the time at which the trigger has occurred, in order to locate relevant hits in the drift chambers and muon chambers in particular. The fact that the different triggers allowed by the MIOTRINO board take varying times to form complicates this task. An offline trigger algorithm may serve as a tool to shed light on situations where the online trigger status bits have not been recorded correctly, as happens in a small number of cases, or as an aid to studies with the aim of further refinement of the online triggers themselves

  9. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  10. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  11. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  12. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  13. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  14. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  15. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  16. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  17. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  18. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  19. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  20. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  1. Calo trigger acquisition system

    CERN Multimedia

    Franchini, Matteo

    2016-01-01

    Calo trigger acquisition system - Evolution of the acquisition system from a multiple boards system (upper, orange cables) to a single board one (below, light blue cables) where all the channels are collected in a single board.

  2. Calorimetry triggering in ATLAS

    CERN Document Server

    Igonkina, O; Adragna, P; Aharrouche, M; Alexandre, G; Andrei, V; Anduaga, X; Aracena, I; Backlund, S; Baines, J; Barnett, B M; Bauss, B; Bee, C; Behera, P; Bell, P; Bendel, M; Benslama, K; Berry, T; Bogaerts, A; Bohm, C; Bold, T; Booth, J R A; Bosman, M; Boyd, J; Bracinik, J; Brawn, I, P; Brelier, B; Brooks, W; Brunet, S; Bucci, F; Casadei, D; Casado, P; Cerri, A; Charlton, D G; Childers, J T; Collins, N J; Conde Muino, P; Coura Torres, R; Cranmer, K; Curtis, C J; Czyczula, Z; Dam, M; Damazio, D; Davis, A O; De Santo, A; Degenhardt, J; Delsart, P A; Demers, S; Demirkoz, B; Di Mattia, A; Diaz, M; Djilkibaev, R; Dobson, E; Dova, M, T; Dufour, M A; Eckweiler, S; Ehrenfeld, W; Eifert, T; Eisenhandler, E; Ellis, N; Emeliyanov, D; Enoque Ferreira de Lima, D; Faulkner, P J W; Ferland, J; Flacher, H; Fleckner, J E; Flowerdew, M; Fonseca-Martin, T; Fratina, S; Fhlisch, F; Gadomski, S; Gallacher, M P; Garitaonandia Elejabarrieta, H; Gee, C N P; George, S; Gillman, A R; Goncalo, R; Grabowska-Bold, I; Groll, M; Gringer, C; Hadley, D R; Haller, J; Hamilton, A; Hanke, P; Hauser, R; Hellman, S; Hidvgi, A; Hillier, S J; Hryn'ova, T; Idarraga, J; Johansen, M; Johns, K; Kalinowski, A; Khoriauli, G; Kirk, J; Klous, S; Kluge, E-E; Koeneke, K; Konoplich, R; Konstantinidis, N; Kwee, R; Landon, M; LeCompte, T; Ledroit, F; Lei, X; Lendermann, V; Lilley, J N; Losada, M; Maettig, S; Mahboubi, K; Mahout, G; Maltrana, D; Marino, C; Masik, J; Meier, K; Middleton, R P; Mincer, A; Moa, T; Monticelli, F; Moreno, D; Morris, J D; Mller, F; Navarro, G A; Negri, A; Nemethy, P; Neusiedl, A; Oltmann, B; Olvito, D; Osuna, C; Padilla, C; Panes, B; Parodi, F; Perera, V J O; Perez, E; Perez Reale, V; Petersen, B; Pinzon, G; Potter, C; Prieur, D P F; Prokishin, F; Qian, W; Quinonez, F; Rajagopalan, S; Reinsch, A; Rieke, S; Riu, I; Robertson, S; Rodriguez, D; Rogriquez, Y; Rhr, F; Saavedra, A; Sankey, D P C; Santamarina, C; Santamarina Rios, C; Scannicchio, D; Schiavi, C; Schmitt, K; Schultz-Coulon, H C; Schfer, U; Segura, E; Silverstein, D; Silverstein, S; Sivoklokov, S; Sjlin, J; Staley, R J; Stamen, R; Stelzer, J; Stockton, M C; Straessner, A; Strom, D; Sushkov, S; Sutton, M; Tamsett, M; Tan, C L A; Tapprogge, S; Thomas, J P; Thompson, P D; Torrence, E; Tripiana, M; Urquijo, P; Urrejola, P; Vachon, B; Vercesi, V; Vorwerk, V; Wang, M; Watkins, P M; Watson, A; Weber, P; Weidberg, T; Werner, P; Wessels, M; Wheeler-Ellis, S; Whiteson, D; Wiedenmann, W; Wielers, M; Wildt, M; Winklmeier, F; Wu, X; Xella, S; Zhao, L; Zobernig, H; de Seixas, J M; dos Anjos, A; Asman, B; Özcan, E

    2009-01-01

    The ATLAS experiment is preparing for data taking at 14 TeV collision energy. A rich discovery physics program is being prepared in addition to the detailed study of Standard Model processes which will be produced in abundance. The ATLAS multi-level trigger system is designed to accept one event in 2 105 to enable the selection of rare and unusual physics events. The ATLAS calorimeter system is a precise instrument, which includes liquid Argon electro-magnetic and hadronic components as well as a scintillator-tile hadronic calorimeter. All these components are used in the various levels of the trigger system. A wide physics coverage is ensured by inclusively selecting events with candidate electrons, photons, taus, jets or those with large missing transverse energy. The commissioning of the trigger system is being performed with cosmic ray events and by replaying simulated Monte Carlo events through the trigger and data acquisition system.

  3. BTeV Trigger

    International Nuclear Information System (INIS)

    Gottschalk, Erik E.

    2006-01-01

    BTeV was designed to conduct precision studies of CP violation in BB-bar events using a forward-geometry detector in a hadron collider. The detector was optimized for high-rate detection of beauty and charm particles produced in collisions between protons and antiprotons. The trigger was designed to take advantage of the main difference between events with beauty and charm particles and more typical hadronic events-the presence of detached beauty and charm decay vertices. The first stage of the BTeV trigger was to receive data from a pixel vertex detector, reconstruct tracks and vertices for every beam crossing, reject at least 98% of beam crossings in which neither beauty nor charm particles were produced, and trigger on beauty events with high efficiency. An overview of the trigger design and its evolution to include commodity networking and computing components is presented

  4. Calorimetry triggering in ATLAS

    International Nuclear Information System (INIS)

    Igonkina, O; Achenbach, R; Andrei, V; Adragna, P; Aharrouche, M; Bauss, B; Bendel, M; Alexandre, G; Anduaga, X; Aracena, I; Backlund, S; Bogaerts, A; Baines, J; Barnett, B M; Bee, C; P, Behera; Bell, P; Benslama, K; Berry, T; Bohm, C

    2009-01-01

    The ATLAS experiment is preparing for data taking at 14 TeV collision energy. A rich discovery physics program is being prepared in addition to the detailed study of Standard Model processes which will be produced in abundance. The ATLAS multi-level trigger system is designed to accept one event in 2 | 10 5 to enable the selection of rare and unusual physics events. The ATLAS calorimeter system is a precise instrument, which includes liquid Argon electro-magnetic and hadronic components as well as a scintillator-tile hadronic calorimeter. All these components are used in the various levels of the trigger system. A wide physics coverage is ensured by inclusively selecting events with candidate electrons, photons, taus, jets or those with large missing transverse energy. The commissioning of the trigger system is being performed with cosmic ray events and by replaying simulated Monte Carlo events through the trigger and data acquisition system.

  5. Calorimetry Triggering in ATLAS

    International Nuclear Information System (INIS)

    Igonkina, O.; Achenbach, R.; Adragna, P.; Aharrouche, M.; Alexandre, G.; Andrei, V.; Anduaga, X.; Aracena, I.; Backlund, S.; Baines, J.; Barnett, B.M.; Bauss, B.; Bee, C.; Behera, P.; Bell, P.; Bendel, M.; Benslama, K.; Berry, T.; Bogaerts, A.; Bohm, C.; Bold, T.; Booth, J.R.A.; Bosman, M.; Boyd, J.; Bracinik, J.; Brawn, I.P.; Brelier, B.; Brooks, W.; Brunet, S.; Bucci, F.; Casadei, D.; Casado, P.; Cerri, A.; Charlton, D.G.; Childers, J.T.; Collins, N.J.; Conde Muino, P.; Coura Torres, R.; Cranmer, K.; Curtis, C.J.; Czyczula, Z.; Dam, M.; Damazio, D.; Davis, A.O.; De Santo, A.; Degenhardt, J.

    2011-01-01

    The ATLAS experiment is preparing for data taking at 14 TeV collision energy. A rich discovery physics program is being prepared in addition to the detailed study of Standard Model processes which will be produced in abundance. The ATLAS multi-level trigger system is designed to accept one event in 2/10 5 to enable the selection of rare and unusual physics events. The ATLAS calorimeter system is a precise instrument, which includes liquid Argon electro-magnetic and hadronic components as well as a scintillator-tile hadronic calorimeter. All these components are used in the various levels of the trigger system. A wide physics coverage is ensured by inclusively selecting events with candidate electrons, photons, taus, jets or those with large missing transverse energy. The commissioning of the trigger system is being performed with cosmic ray events and by replaying simulated Monte Carlo events through the trigger and data acquisition system.

  6. Calorimetry triggering in ATLAS

    Energy Technology Data Exchange (ETDEWEB)

    Igonkina, O [Nikhef National Institute for Subatomic Physics, Amsterdam (Netherlands); Achenbach, R; Andrei, V [Kirchhoff Institut fuer Physik, Universitaet Heidelberg, Heidelberg (Germany); Adragna, P [Physics Department, Queen Mary, University of London, London (United Kingdom); Aharrouche, M; Bauss, B; Bendel, M [Institut fr Physik, Universitt Mainz, Mainz (Germany); Alexandre, G [Section de Physique, Universite de Geneve, Geneva (Switzerland); Anduaga, X [Universidad Nacional de La Plata, La Plata (Argentina); Aracena, I [Stanford Linear Accelerator Center (SLAC), Stanford (United States); Backlund, S; Bogaerts, A [European Laboratory for Particle Physics (CERN), Geneva (Switzerland); Baines, J; Barnett, B M [STFC Rutherford Appleton Laboratory, Harwell Science and Innovation Campus, Didcot, Oxon (United Kingdom); Bee, C [Centre de Physique des Particules de Marseille, IN2P3-CNRS, Marseille (France); P, Behera [Iowa State University, Ames, Iowa (United States); Bell, P [School of Physics and Astronomy, University of Manchester, Manchester (United Kingdom); Benslama, K [University of Regina, Regina (Canada); Berry, T [Department of Physics, Royal Holloway and Bedford New College, Egham (United Kingdom); Bohm, C [Fysikum, Stockholm University, Stockholm (Sweden)

    2009-04-01

    The ATLAS experiment is preparing for data taking at 14 TeV collision energy. A rich discovery physics program is being prepared in addition to the detailed study of Standard Model processes which will be produced in abundance. The ATLAS multi-level trigger system is designed to accept one event in 2 | 10{sup 5} to enable the selection of rare and unusual physics events. The ATLAS calorimeter system is a precise instrument, which includes liquid Argon electro-magnetic and hadronic components as well as a scintillator-tile hadronic calorimeter. All these components are used in the various levels of the trigger system. A wide physics coverage is ensured by inclusively selecting events with candidate electrons, photons, taus, jets or those with large missing transverse energy. The commissioning of the trigger system is being performed with cosmic ray events and by replaying simulated Monte Carlo events through the trigger and data acquisition system.

  7. LHCb Topological Trigger Reoptimization

    CERN Document Server

    INSPIRE-00400931; Ilten, Philip; Khairullin, Egor; Rogozhnikov, Alex; Ustyuzhanin, Andrey; Williams, Michael

    2015-12-23

    The main b-physics trigger algorithm used by the LHCb experiment is the so-called topological trigger. The topological trigger selects vertices which are a) detached from the primary proton-proton collision and b) compatible with coming from the decay of a b-hadron. In the LHC Run 1, this trigger, which utilized a custom boosted decision tree algorithm, selected a nearly 100% pure sample of b-hadrons with a typical efficiency of 60-70%; its output was used in about 60% of LHCb papers. This talk presents studies carried out to optimize the topological trigger for LHC Run 2. In particular, we have carried out a detailed comparison of various machine learning classifier algorithms, e.g., AdaBoost, MatrixNet and neural networks. The topological trigger algorithm is designed to select all "interesting" decays of b-hadrons, but cannot be trained on every such decay. Studies have therefore been performed to determine how to optimize the performance of the classification algorithm on decays not used in the training. ...

  8. Topological Trigger Developments

    CERN Multimedia

    Likhomanenko, Tatiana

    2015-01-01

    The main b-physics trigger algorithm used by the LHCb experiment is the so-called topological trigger. The topological trigger selects vertices which are a) detached from the primary proton-proton collision and b) compatible with coming from the decay of a b-hadron. In the LHC Run 1, this trigger utilized a custom boosted decision tree algorithm, selected an almost 100% pure sample of b-hadrons with a typical efficiency of 60-70%, and its output was used in about 60% of LHCb papers. This talk presents studies carried out to optimize the topological trigger for LHC Run 2. In particular, we have carried out a detailed comparison of various machine learning classifier algorithms, e.g., AdaBoost, MatrixNet and uBoost. The topological trigger algorithm is designed to select all "interesting" decays of b-hadrons, but cannot be trained on every such decay. Studies have therefore been performed to determine how to optimize the performance of the classification algorithm on decays not used in the training. These inclu...

  9. Hydrothermal synthesis of nanostructured titania

    International Nuclear Information System (INIS)

    Yoshito, Walter Kenji; Ferreira, Nildemar A.M.; Rumbao, Ana Carolina S. Coutinho; Lazar, Dolores R.R.; Ussui, Valter

    2009-01-01

    Titania ceramics have many applications due to its surface properties and, recently, its nanostructured compounds, prepared by hydrothermal treatments, have been described to improve these properties. In this work, commercial titanium dioxide was treated with 10% sodium hydroxide solution in a pressurized reactor at 150°C for 24 hours under vigorous stirring and then washed following two different procedures. The first one consisted of washing with water and ethanol and the second with water and hydrochloric acid solution (1%). Resulting powders were characterized by X-ray diffraction, N 2 gas adsorption and field emission gun scanning and transmission electronic microscopy. Results showed that from an original starting material with mainly rutile phase, both anatase and H 2 Ti 3 O 7 phase could be identified after the hydrothermal treatment. Surface area of powders presented a notable increase of one order of magnitude and micrographs showed a rearrangement on the microstructure of powders. (author)

  10. Zinc stannate nanostructures: hydrothermal synthesis

    International Nuclear Information System (INIS)

    Baruah, Sunandan; Dutta, Joydeep

    2011-01-01

    Nanostructured binary semiconducting metal oxides have received much attention in the last decade owing to their unique properties rendering them suitable for a wide range of applications. In the quest to further improve the physical and chemical properties, an interest in ternary complex oxides has become noticeable in recent times. Zinc stannate or zinc tin oxide (ZTO) is a class of ternary oxides that are known for their stable properties under extreme conditions, higher electron mobility compared to its binary counterparts and other interesting optical properties. The material is thus ideal for applications from solar cells and sensors to photocatalysts. Among the different methods of synthesizing ZTO nanostructures, the hydrothermal method is an attractive green process that is carried out at low temperatures. In this review, we summarize the conditions leading to the growth of different ZTO nanostructures using the hydrothermal method and delve into a few of its applications reported in the literature. (topical review)

  11. Hydrothermal synthesis of nanostructured titania

    International Nuclear Information System (INIS)

    Yoshito, W.K.; Ferreira, N.A.M.; Lazar, D.R.R.; Ussui, V.; Rumbao, A.C.S.

    2011-01-01

    Titania ceramics have many applications due to its surface properties and, recently, its nanostructured compounds, prepared by hydrothermal treatments, have been described to improve these properties. In this work, commercial titanium dioxide was treated with 10% sodium hydroxide solution in a pressurized reactor at 150 deg C for 24 hours under vigorous stirring and then washed following two different procedures. The first one consisted of washing with water and ethanol and the second with water and hydrochloric acid solution (1%). Resulting powders were characterized by X-ray diffraction, N 2 gas adsorption and field emission gun scanning and transmission electronic microscopy. Results showed that from an original starting material with mainly rutile phase, both anatase and H 2 Ti 3 O 7 phase could be identified after the hydrothermal treatment. Surface area of powders presented a notable increase of one order of magnitude and micrographs showed a rearrangement on the microstructure of powders. (author)

  12. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  13. Vision in hydrothermal vent shrimp.

    OpenAIRE

    Chamberlain, S C

    2000-01-01

    Bresiliid shrimp from hydrothermal vents on the Mid-Atlantic Ridge have non-imaging eyes adapted for photodetection in light environments of very low intensity. Comparison of retinal structures between both vent shrimp and surface-dwelling shrimp with imaging eyes, and between juvenile and adult vent shrimp, suggests that vent shrimp have evolved from ancestors that lived in a light environment with bright cyclic lighting. Whether the vent shrimp live in swarms and have large dorsal eyes or l...

  14. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  15. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  16. Politically-focused intrusive thoughts and associated ritualistic behaviors in a community sample.

    Science.gov (United States)

    Cepeda, Sandra L; McKay, Dean; Schneider, Sophie C; La Buissonnière-Ariza, Valérie; Egberts, Jolenthe T N E; McIngvale, Elizabeth; Goodman, Wayne K; Storch, Eric A

    2018-05-01

    A significant proportion of the U.S. population report increased stress attributed to the political climate following the controversial 2016 United States (U.S.) Presidential election. The political stressors paired with the growth in news consumption and social media-use could be a potential trigger for obsessive-compulsive-like symptoms specific to politics in some individuals. This study aimed to elucidate the rate of Politically-focused Intrusive Thoughts and associated Ritualistic Behaviors (PITRB), their demographic and clinical correlates, and the degree of association with political ideology. Survey data were collected using the crowdsourcing platform Mechanical Turk. A total of N = 484 individuals completed the survey. Measures of politically-focused intrusive thoughts and ritualistic behaviors, general obsessive-compulsive symptoms, depression, anxiety, anxiety control, worry, and disability were administered, as well as a measure of social and economic conservative affiliation. Results showed that a quarter of the sample (25.2%) had at least one PITRB more than once a day. PITRB was associated with all measures of psychopathology and disability. Finally, anxiety control moderated the relationship between PITRB and both anxiety and depression. No differences in psychopathology were found between major party affiliations. The findings suggest that politically-focused intrusive thoughts and ritualistic behaviors are associated with psychopathology domains in a manner comparable to general obsessive-compulsive symptoms. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Carbonate reservoirs modified by magmatic intrusions in the Bachu area, Tarim Basin, NW China

    Directory of Open Access Journals (Sweden)

    Kang Xu

    2015-09-01

    Full Text Available Oil and gas exploration in carbonate rocks was extremely successful in recent years in the Ordovician in Tarim Basin, NW China. Here, we investigate the carbonate reservoirs in the Bachu area of the Tarim Basin through petrological and geochemical studies combined with oil and gas exploration data. Geochemical analysis included the major, trace, and rare earth elements; fluid inclusion thermometry; clay mineral characterization; and carbon and oxygen isotopes of the carbonate rocks. Homogenization temperatures of the fluid inclusions of Well He-3 in the Bachu area indicate three groups, 60–80 °C, 90–130 °C, and 140–170 °C, and suggest that the carbonate rocks experienced modification due to heating events. The porosity in the reservoir is defined by fractures and secondary pores, and there is a notable increase in the porosity of the carbonate reservoirs in proximity to magmatic intrusion, particularly approximately 8–10 m from the intrusive rocks. The development of secondary pores was controlled by lithofacies and corrosion by various fluids. We identify supercritical fluids with high density (138.12–143.97 mg/cm3 in the Bachu area. The negative correlations of δ13C (−2.76‰ to −0.97‰ and δ18O (−7.91‰ to −5.07‰ suggest that the carbonate rocks in the study area were modified by high-salinity hydrothermal fluid. The formation of clay minerals, such as illite and montmorillonite, caused a decrease in porosity. Our study demonstrates the effect of magmatic intrusions in modifying the reservoir characteristics of carbonate rocks and has important implications for oil and gas exploration.

  18. CMS Trigger Performance

    CERN Document Server

    Donato, Silvio

    2017-01-01

    During its second run of operation (Run 2) which started in 2015, the LHC will deliver a peak instantaneous luminosity that may reach $2 \\cdot 10^{34}$ cm$^{-2}$s$^{-1}$ with an average pile-up of about 55, far larger than the design value. Under these conditions, the online event selection is a very challenging task. In CMS, it is realized by a two-level trigger system the Level-1 (L1) Trigger, implemented in custom-designed electronics, and the High Level Trigger (HLT), a streamlined version of the offline reconstruction software running on a computer farm. In order to face this challenge, the L1 trigger has been through a major upgrade compared to Run 1, whereby all electronic boards of the system have been replaced, allowing more sophisticated algorithms to be run online. Its last stage, the global trigger, is now able to perform complex selections and to compute high-level quantities, like invariant masses. Likewise, the algorithms that run in the HLT go through big improvements; in particular, new appr...

  19. The ATLAS Tau Trigger

    CERN Document Server

    Dam, M; The ATLAS collaboration

    2009-01-01

    The ATLAS experiment at CERN’s LHC has implemented a dedicated tau trigger system to select hadronically decaying tau leptons from the enormous background of QCD jets. This promises a significant increase in the discovery potential to the Higgs boson and in searches for physics beyond the Standard Model. The three level trigger system has been optimised for effciency and good background rejection. The first level uses information from the calorimeters only, while the two higher levels include also information from the tracking detectors. Shower shape variables and the track multiplicity are important variables to distinguish taus from QCD jets. At the initial lumonosity of 10^31 cm^−2 s^−1, single tau triggers with a transverse energy threshold of 50 GeV or higher can be run standalone. Below this level, the tau signatures will be combined with other event signature

  20. The ATLAS Tau Trigger

    CERN Document Server

    Rados, PK; The ATLAS collaboration

    2014-01-01

    Physics processes involving tau leptons play a crucial role in understanding particle physics at the high energy frontier. The ability to efficiently trigger on events containing hadronic tau decays is therefore of particular importance to the ATLAS experiment. During the 2012 run, the Large Hadronic Collder (LHC) reached instantaneous luminosities of nearly $10^{34} cm^{-2}s^{-1}$ with bunch crossings occurring every $50 ns$. This resulted in a huge event rate and a high probability of overlapping interactions per bunch crossing (pile-up). With this in mind it was necessary to design an ATLAS tau trigger system that could reduce the event rate to a manageable level, while efficiently extracting the most interesting physics events in a pile-up robust manner. In this poster the ATLAS tau trigger is described, its performance during 2012 is presented, and the outlook for the LHC Run II is briefly summarized.

  1. ALICE High Level Trigger

    CERN Multimedia

    Alt, T

    2013-01-01

    The ALICE High Level Trigger (HLT) is a computing farm designed and build for the real-time, online processing of the raw data produced by the ALICE detectors. Events are fully reconstructed from the raw data, analyzed and compressed. The analysis summary together with the compressed data and a trigger decision is sent to the DAQ. In addition the reconstruction of the events allows for on-line monitoring of physical observables and this information is provided to the Data Quality Monitor (DQM). The HLT can process event rates of up to 2 kHz for proton-proton and 200 Hz for Pb-Pb central collisions.

  2. Trigger and decision processors

    International Nuclear Information System (INIS)

    Franke, G.

    1980-11-01

    In recent years there have been many attempts in high energy physics to make trigger and decision processes faster and more sophisticated. This became necessary due to a permanent increase of the number of sensitive detector elements in wire chambers and calorimeters, and in fact it was possible because of the fast developments in integrated circuits technique. In this paper the present situation will be reviewed. The discussion will be mainly focussed upon event filtering by pure software methods and - rather hardware related - microprogrammable processors as well as random access memory triggers. (orig.)

  3. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  4. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  5. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  6. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  7. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  8. Carbon dioxide in magmas and implications for hydrothermal systems

    Science.gov (United States)

    Lowenstern, J. B.

    2001-01-01

    This review focuses on the solubility, origin, abundance, and degassing of carbon dioxide (CO2) in magma-hydrothermal systems, with applications for those workers interested in intrusion-related deposits of gold and other metals. The solubility of CO2 increases with pressure and magma alkalinity. Its solubility is low relative to that of H2O, so that fluids exsolved deep in the crust tend to have high CO2/H2O compared with fluids evolved closer to the surface. Similarly, CO2/H2O will typically decrease during progressive decompression- or crystallization-induced degassing. The temperature dependence of solubility is a function of the speciation of CO2, which dissolves in molecular form in rhyolites (retrograde temperature solubility), but exists as dissolved carbonate groups in basalts (prograde). Magnesite and dolomite are stable under a relatively wide range of mantle conditions, but melt just above the solidus, thereby contributing CO2 to mantle magmas. Graphite, diamond, and a free CO2-bearing fluid may be the primary carbon-bearing phases in other mantle source regions. Growing evidence suggests that most CO2 is contributed to arc magmas via recycling of subducted oceanic crust and its overlying sediment blanket. Additional carbon can be added to magmas during magma-wallrock interactions in the crust. Studies of fluid and melt inclusions from intrusive and extrusive igneous rocks yield ample evidence that many magmas are vapor saturated as deep as the mid crust (10-15 km) and that CO2 is an appreciable part of the exsolved vapor. Such is the case in both basaltic and some silicic magmas. Under most conditions, the presence of a CO2-bearing vapor does not hinder, and in fact may promote, the ascent and eruption of the host magma. Carbonic fluids are poorly miscible with aqueous fluids, particularly at high temperature and low pressure, so that the presence of CO2 can induce immiscibility both within the magmatic volatile phase and in hydrothermal systems

  9. Differences in clinical intrusive thoughts between obsessive-compulsive disorder, generalized anxiety disorder, and hypochondria.

    Science.gov (United States)

    Romero-Sanchiz, Pablo; Nogueira-Arjona, Raquel; Godoy-Ávila, Antonio; Gavino-Lázaro, Aurora; Freeston, Mark H

    2017-11-01

    Differences and similarities between intrusive thoughts typical of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis are relevant for their differential diagnosis, formulation, and psychological treatment. Previous research in non-clinical samples pointed out the relevance of some process variables, such as responsibility, guilt, or neutralization strategies. This research is aimed to investigate the differences and similarities between clinical obsessions, worries, and illness intrusions in some of these process variables. A second aim is to identify models based on these variables that could reliably differentiate between them. Three groups of patients with obsessive-compulsive disorder (n = 35; 60% women, mean age 38.57), generalized anxiety disorder (n = 36; 61.1% women, mean age 41.50), and hypochondriasis (n = 34; 70.6% women, mean age 31.59) were evaluated using the Cognitive Intrusions Questionnaire-Transdiagnostic Version (Romero-Sanchiz, Nogueira-Arjona, Godoy-Ávila, Gavino-Lázaro, & Freeston, ). The results showed that some appraisals (e.g., responsibility or egodystonicity), emotions (e.g., guilt or insecurity), neutralization strategies, and other variables (e.g., verbal content or trigger from body sensation) are relevant for the discrimination between obsessions, worries, and illness intrusions. The results also showed 3 stable models based on these variables for the discrimination between these thoughts. The implication of these results in the diagnosis, formulation, and psychological treatment of obsessive-compulsive disorder, generalized anxiety disorder, and hypochondriasis is discussed. Copyright © 2017 John Wiley & Sons, Ltd.

  10. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  11. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  12. Hydrothermal uranium vein deposits in Marysvale volcanic field, Utah

    International Nuclear Information System (INIS)

    Rasmussen, J.D.; Cunningham, C.G.; Steven, T.A.; Rye, R.O.; Romberger, S.B.

    1984-01-01

    Hydrothermal uranium veins are exposed over a 300 m (980 ft) vertical range in mines of the Central Mining area, near Marysvale, Utah. They cut 23 Ma quartz monzonite, 21 Ma granite, and 19 Ma rhyolite ash-flow tuff. The veins formed 18-19 Ma, in an area 1 km (0.6 mi) across, above the center of a composite magma chamber at least 12 x 6 km across that fed a sequence of 21-14 Ma hypabyssal granitic stocks, and rhyolitic lava flows, ash-flow tuffs, and volcanic domes. Intrusive pressure uplifted and fractured the roof; molybdenite-bearing, uranium-rich glassy dikes were intruded; and a breccia pipe and uranium-bearing veins were formed. The veins appear to have been deposited near the surface above a concealed rhyolite stock, where they filled high-angle fault zones and flat-lying to concave-downward pull-apart fractures. Low pH and fO 2 hydrothermal fluids at temperatures near 200 0 C (392 0 F) permeated the fractured rocks; these fluids were rich in fluorine and potassium, and contained uranium as uranous-fluoride complexes. Fluid-wall rock interaction increased fluid pH, causing precipitation of uranium minerals. At the deepest exposed levels, wall rocks were altered to kaolinite and sericite, and uraninite, coffinite, jordisite, fluorite, molybdenite, quartz, and pyrite (with delta 34 S near zero per mil) were deposited. The fluids were progressively oxidized higher in the system; iron in the wall rocks was oxidized to hematite, and sooty uraninite and umohoite were deposited

  13. Hydrothermal performance of catalyst supports

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Jeffrey W.; Marshall, Christopher L.; Libera, Joseph A.; Dumesic, James A.; Pagan-Torres, Yomaira J.

    2018-04-10

    A high surface area catalyst with a mesoporous support structure and a thin conformal coating over the surface of the support structure. The high surface area catalyst support is adapted for carrying out a reaction in a reaction environment where the thin conformal coating protects the support structure within the reaction environment. In various embodiments, the support structure is a mesoporous silica catalytic support and the thin conformal coating comprises a layer of metal oxide resistant to the reaction environment which may be a hydrothermal environment.

  14. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  15. The STAR trigger

    International Nuclear Information System (INIS)

    Bieser, F.S.; Crawford, H.J.; Engelage, J.; Eppley, G.; Greiner, L.C.; Judd, E.G.; Klein, S.R.; Meissner, F.; Minor, R.; Milosevich, Z.; Mutchler, G.; Nelson, J.M.; Schambach, J.; VanderMolen, A.S.; Ward, H.; Yepes, P.

    2003-01-01

    We describe the trigger system that we designed and implemented for the STAR detector at RHIC. This is a 10 MHz pipelined system based on fast detector output that controls the event selection for the much slower tracking detectors. Results from the first run are presented and new detectors for the 2001 run are discussed

  16. Asthma Triggers: Gain Control

    Science.gov (United States)

    ... harm people too. Try to use pest management methods that pose less of a risk. Keep counters, sinks, tables and floors clean and ... with pest challenges in your home and other environments. [EPA ... pests while reducing pesticide risks; roaches are often asthma triggers and shouldn’t ...

  17. Physics issues on triggering

    Indian Academy of Sciences (India)

    The detectors at the ILC are planned to run without hardware trigger. The ... as not coming from the interaction point and not matching to the silicon detectors ... electrons so that additional dE/dx cuts can help, making also here a factor 10 or.

  18. AIDS radio triggers.

    Science.gov (United States)

    Elias, A M

    1991-07-01

    In April 1991, the Ethnic Communities' Council of NSW was granted funding under the Community AIDS Prevention and Education Program through the Department of Community Services and Health, to produce a series of 6x50 second AIDS radio triggers with a 10-second tag line for further information. The triggers are designed to disseminate culturally-sensitive information about HIV/AIDS in English, Italian, Greek, Spanish, Khmer, Turkish, Macedonian, Serbo-Croatian, Arabic, Cantonese, and Vietnamese, with the goal of increasing awareness and decreasing the degree of misinformation about HIV/AIDS among people of non-English-speaking backgrounds through radio and sound. The 6 triggers cover the denial that AIDS exists in the community, beliefs that words and feelings do not protect one from catching HIV, encouraging friends to be compassionate, compassion within the family, AIDS information for a young audience, and the provision of accurate and honest information on HIV/AIDS. The triggers are slated to be completed by the end of July 1991 and will be broadcast on all possible community, ethnic, and commercial radio networks across Australia. They will be available upon request in composite form with an information kit for use by health care professionals and community workers.

  19. Dealing with Asthma Triggers

    Science.gov (United States)

    ... one trigger that you shouldn't avoid because exercise is important for your health. Your doctor will want you to be active, so talk with him or her about what to do before playing ... or 15 minutes before you exercise or play sports. And, of course, you'll ...

  20. Trigger Finger (Stenosing Tenosynovitis)

    Science.gov (United States)

    ... All Topics A-Z Videos Infographics Symptom Picker Anatomy Bones Joints Muscles Nerves Vessels Tendons About Hand Surgery What is a Hand Surgeon? What is a Hand Therapist? Media Find a Hand Surgeon Home Anatomy Trigger Finger Email to a friend * required fields ...

  1. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  2. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  3. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  4. Drilling the Bushveld Complex- the world's largest layered mafic intrusion

    Science.gov (United States)

    Ashwal, L. D.; Webb, S. J.; Trumbull, R. B.

    2013-12-01

    The fact that surprising new discoveries can be made in layered mafic intrusions (e.g., subtle 100-150 m cyclicity in apparently homogeneous cumulates over 1000s of m) means that we are still in the first-order characterization phase of understanding these objects. Accordingly, we have secured funding from ICDP for a planning workshop to be held in Johannesburg in early 2014, aimed at scientific drilling of the Bushveld Complex, the world's largest layered mafic intrusion. Science objectives include, but are not limited to: 1. Magma chamber processes & melt evolution. How many melts/magmas/mushes were involved, what were their compositions and how did they interact? What, if anything, is missing from the Complex, and where did it go? Did Bushveld magmatism have an effect upon Earth's atmosphere at 2 Ga? 2. Crust-mantle interactions & origin of Bushveld granitoids. Are Bushveld granites & rhyolites crustal melts, differentiates from the mafic magmas or products of immiscibility? How can the evolved isotopic signatures in the mafic rocks (e.g., epsilon Nd to -8) be understood? 3. Origin of ore deposits. What were the relative roles of gravity settling, magma mixing, immiscibility and hydrothermal fluid transport in producing the PGE, Cr and V deposits? We have identified 3 potential drilling targets representing a total of ~12 km of drill core. Exact locations of drill sites are to be discussed at the workshop. Target A- East-Central Bushveld Complex. We propose 3 overlapping 3 km boreholes that will provide the first roof-to-floor continuous coverage of the Rustenburg Layered Suite. These boreholes will represent a curated, internationally available reference collection of Bushveld material for present and future research. Target B- Southeastern Bushveld Complex. We propose a single borehole of ~2 km depth, collared in Rooiberg felsite, and positioned to intersect the Roof Zone, Upper Zone, Main Zone and floor of the Complex. Amongst other things, this site will

  5. Hydrothermal synthetic strategies of inorganic semiconducting nanostructures.

    Science.gov (United States)

    Shi, Weidong; Song, Shuyan; Zhang, Hongjie

    2013-07-07

    Because of their unique chemical and physical properties, inorganic semiconducting nanostructures have gradually played a pivotal role in a variety of research fields, including electronics, chemical reactivity, energy conversion, and optics. A major feature of these nanostructures is the quantum confinement effect, which strongly depends on their size, shape, crystal structure and polydispersity. Among all developed synthetic methods, the hydrothermal method based on a water system has attracted more and more attention because of its outstanding advantages, such as high yield, simple manipulation, easy control, uniform products, lower air pollution, low energy consumption and so on. Precise control over the hydrothermal synthetic conditions is a key to the success of the preparation of high-quality inorganic semiconducting nanostructures. In this review, only the representative hydrothermal synthetic strategies of inorganic semiconducting nanostructures are selected and discussed. We will introduce the four types of strategies based on exterior reaction system adjustment, namely organic additive- and template-free hydrothermal synthesis, organic additive-assisted hydrothermal synthesis, template-assisted hydrothermal synthesis and substrate-assisted hydrothermal synthesis. In addition, the two strategies based on exterior reaction environment adjustment, including microwave-assisted and magnetic field-assisted hydrothermal synthesis, will be also described. Finally, we conclude and give the future prospects of this research area.

  6. Whole Algae Hydrothermal Liquefaction Technology Pathway

    Energy Technology Data Exchange (ETDEWEB)

    Biddy, M.; Davis, R.; Jones, S.

    2013-03-01

    This technology pathway case investigates the feasibility of using whole wet microalgae as a feedstock for conversion via hydrothermal liquefaction. Technical barriers and key research needs have been assessed in order for the hydrothermal liquefaction of microalgae to be competitive with petroleum-derived gasoline-, diesel-, and jet-range hydrocarbon blendstocks.

  7. rights reserved Geophysical Identification of Hydrothermally Altered ...

    African Journals Online (AJOL)

    ADOWIE PERE

    the pole to the magnetic data aided in mapping of various hydrothermally altered structures that may favour gold mineralisation. The interpretation of the aero data set has enhanced a lot of ... water serves as a concentrating, transporting and depositing agent through faults (structures) to the earth's surface. Hydrothermal ...

  8. Hydrogen and oxygen isotope constraints on hydrothermal alteration of the Trinity peridotite, Klamath Mountains, California

    Science.gov (United States)

    Liakhovitch, V.; Quick, J.E.; Gregory, R.T.

    2005-01-01

    The Trinity peridotite represents a rare opportunity to examine a relatively fertile plagioclase peridotite that was exhumed and later subjected to intrusive events in a seafloor environment, followed by its emplacement and incorporation into a continent. Over 250 stable isotopic determinations on whole rocks and minerals elucidate the hydrothermal evolution of the Trinity complex. All three serpentine polymorphs are present in the Trinity peridotite; these separate on the basis of their ??D values: antigorite, -46 serpentinization, or overprinting of earlier low-temperature seafloor serpentinization. Regionally, contours of ??D values exhibit bull's-eye patterns associated with the gabbroic plutons, with ??D maxima coinciding with the blackwall alteration at the margins on the plutons. In contrast to the hydrogen isotope behavior, oxygen isotope values of the three polymorphs are indistinguishable, spanning the range 5.3 history: (1) lithospheric emplacement and cooling of the peridotite in an oceanic environment ??? 472 Ma; (2) intrusion of gabbroic plutons into cold peridotite in an arc environment between 435 and 404 Ma; and finally (3) intrusion of felsic plutons between 171 and 127 Ma, long after the peridotite was incorporated into the continental crust. Copyright ?? 2005 by V. H. Winston & Son, Inc. All rights reserved.

  9. Radiogeochemical features of hydrothermal metasomatic formations

    International Nuclear Information System (INIS)

    Plyushchev, E.V.; Ryabova, L.A.; Shatov, V.V.

    1978-01-01

    Considered are the most general peculiarities of uranium and thorium distributions in hydrothermal-metasomatic formations of three levels of substance formation: 1) in hydrothermal minerals; 2) in natural associations of these minerals (in the altered rocks, metasomatites, ores, etc.); 3) ordened series of zonally and in stage conjugated hydrothermal-metasomatic formations. Statistically stable recurrence of natural combinations of hydrothermal-metasomatic formations points out conjugation of their formation in the directed evolution in the general hydrothermal process. Series of metasomatic formations, the initial members of which are potassium metasomatites, mostly result in accumulation up to industrial concentrations of radioactive elements in final members of these formations. Development of midlow-temperature propylitic alterations in highly radiative rocks causes the same accumulation

  10. Geothermic analysis of high temperature hydrothermal activities area in Western plateau of Sichuan province, China

    Science.gov (United States)

    Zhang, J.

    2016-12-01

    There is a high temperature hydrothermal activity area in the western plateau of Sichuan. More than 200 hot springs points have been found in the region, including 11 hot spring water temperature above local boiling point. Most of these distribute along Jinshajjiang fracture, Dege-Xiangcheng fracture, Ganzi-Litang fracture as well as Xianshuihe fracture, and form three high-temperature hydrothermal activity strips in the NW-SE direction. Using gravity, magnetic, seismic and helium isotope data, this paper analyzed the crust-mantle heat flow structure, crustal heat source distribution and water heating system. The results show that the geothermal activity mainly controlled by the "hot" crust. The ratio of crustal heat flow and surface heat flow is higher than 60%. In the high temperature hydrothermal activities area, there is lower S wave velocity zone with VsGeothermal water mainly reserve in the Triassic strata of the containing water good carbonate rocks, and in the intrusive granite which is along the fault zone. The thermal energy of Surface heat thermal activities mainly comes from the high-temperature hot source which is located in the middle and lower crust. Being in the deep crustal fracture, the groundwater infiltrated to the deep crust and absorbed heat, then, quickly got back to the surface and formed high hot springs.

  11. A Sr-isotopic comparison between thermal waters, rocks, and hydrothermal calcites, Long Valley caldera, California

    Science.gov (United States)

    Goff, F.; Wollenberg, H.A.; Brookins, D.C.; Kistler, R.W.

    1991-01-01

    The 87Sr/86Sr values of thermal waters and hydrothermal calcites of the Long Valley caldera geothermal system are more radiogenic than those of young intracaldera volcanic rocks. Five thermal waters display 87Sr/86Sr of 0.7081-0.7078 but show systematically lighter values from west to east in the direction of lateral flow. We believe the decrease in ratio from west to east signifies increased interaction of deeply circulating thermal water with relatively fresh volcanic rocks filling the caldera depression. All types of pre-, syn-, and post-caldera volcanic rocks in the west and central caldera have (87Sr/86Sr)m between about 0.7060 and 0.7072 and values for Sierra Nevada granodiorites adjacent to the caldera are similar. Sierran pre-intrusive metavolcanic and metasedimentary rocks can have considerably higher Sr-isotope ratios (0.7061-0.7246 and 0.7090-0.7250, respectively). Hydrothermally altered volcanic rocks inside the caldera have (87Sr/86Sr)m slightly heavier than their fresh volcanic equivalents and hydrothermal calcites (0.7068-0.7105) occupy a midrange of values between the volcanic/plutonic rocks and the Sierran metamorphic rocks. These data indicate that the Long Valley geothermal reservoir is first equilibrated in a basement complex that contains at least some metasedimentary rocks. Reequilibration of Sr-isotope ratios to lower values occurs in thermal waters as convecting geothermal fluids flow through the isotopically lighter volcanic rocks of the caldera fill. ?? 1991.

  12. The ATLAS Tau Trigger

    International Nuclear Information System (INIS)

    Rados, Petar Kevin

    2013-06-01

    The tau lepton plays a crucial role in understanding particle physics at the Tera scale. One of the most promising probes of the Higgs boson coupling to fermions is with detector signatures involving taus. In addition, many theories beyond the Standard Model, such as supersymmetry and exotic particles (W' and Z'), predict new physics with large couplings to taus. The ability to trigger on hadronic tau decays is therefore critical to achieving the physics goals of the ATLAS experiment. The higher instantaneous luminosities of proton-proton collisions achieved by the Large Hadron Collider (LHC) in 2012 resulted in a larger probability of overlap (pile-up) between bunch crossings, and so it was critical for ATLAS to have an effective tau trigger strategy. The details of this strategy are summarized in this paper, and the results of the latest performance measurements are presented. (authors)

  13. The LPS trigger system

    International Nuclear Information System (INIS)

    Benotto, F.; Costa, M.; Staiano, A.; Zampieri, A.; Bollito, M.; Isoardi, P.; Pernigotti, E.; Sacchi, R.; Trapani, P.P.; Larsen, H.; Massam, T.; Nemoz, C.

    1996-03-01

    The Leading Proton Spectrometer (LPS) has been equipped with microstrip silicon detectors specially designed to trigger events with high values of x L vertical stroke anti p' p vertical stroke / vertical stroke anti p p vertical stroke ≥0.95 where vertical stroke anti p' p vertical stroke and vertical stroke anti p p vertical stroke are respectively the momenta of outgoing and incoming protons. The LPS First Level Trigger can provide a clear tag for very high momentum protons in a kinematical region never explored before. In the following we discuss the physics motivation in tagging very forward protons and present a detailed description of the detector design, the front end electronics, the readout electronics, the Monte Carlo simulation and some preliminary results from 1995 data taking. (orig.)

  14. Minimum risk trigger indices

    International Nuclear Information System (INIS)

    Tingey, F.H.

    1979-01-01

    A viable safeguards system includes among other things the development and use of indices which trigger various courses of action. The usual limit of error calculation provides such an index. The classical approach is one of constructing tests which, under certain assumptions, make the likelihood of a false alarm small. Of concern also is the test's failure to indicate a loss (diversion) when in fact one has occurred. Since false alarms are usually costly and losses both costly and of extreme strategic sinificance, there remains the task of balancing the probability of false alarm and its consequences against the probability of undetected loss and its consequences. The application of other than classical hypothesis testing procedures are considered in this paper. Using various consequence models, trigger indices are derived which have certain optimum properties. Application of the techniques would enhance the material control function

  15. Neural networks for triggering

    International Nuclear Information System (INIS)

    Denby, B.; Campbell, M.; Bedeschi, F.; Chriss, N.; Bowers, C.; Nesti, F.

    1990-01-01

    Two types of neural network beauty trigger architectures, based on identification of electrons in jets and recognition of secondary vertices, have been simulated in the environment of the Fermilab CDF experiment. The efficiencies for B's and rejection of background obtained are encouraging. If hardware tests are successful, the electron identification architecture will be tested in the 1991 run of CDF. 10 refs., 5 figs., 1 tab

  16. The ARGUS vertex trigger

    International Nuclear Information System (INIS)

    Koch, N.; Kolander, M.; Kolanoski, H.; Siegmund, T.; Bergter, J.; Eckstein, P.; Schubert, K.R.; Waldi, R.; Imhof, M.; Ressing, D.; Weiss, U.; Weseler, S.

    1995-09-01

    A fast second level trigger has been developed for the ARGUS experiment which recognizes tracks originating from the interaction region. The processor compares the hits in the ARGUS Micro Vertex Drift Chamber to 245760 masks stored in random access memories. The masks which are fully defined in three dimensions are able to reject tracks originating in the wall of the narrow beampipe of 10.5 mm radius. (orig.)

  17. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  18. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  19. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  20. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  1. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  2. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  3. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  4. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  5. Mineralogy and geochemistry of Skarn Fe orebody and syenodioritic intrusive host rock in Zeber Kuh prospect area (SW Bardaskan, South Khorasan province

    Directory of Open Access Journals (Sweden)

    Hossein Narooie

    2017-11-01

    Full Text Available The Zeber Kuh prospect area is located southwest of Bardaskan, South Khorasan province, in the northeastern Iran. Lithologically, the area includes Rizu and Soltanieh Formations metamorphosed carbonate rocks, which were intruded by syenogranitic and syenodioritic intrusions. Field observations and laboratory studies such as structural controls of orebody, metasomatic replacement and formation of low temperature H2O-bearing minerals, and the occurrence of magnetite and pyrite associated with chlorite, epidote, calcite, and quartz indicate that  the iron mineralization is low temperature skarn-type. The source of Fe mineralization is probably a younger intrusive rock at depth. Hydrothermal ore fluid was ascended within fault zone and/or contact between the intrusive rock and the  carbonate unit and generated orebody. Iron grade ranges from 54 to 65 wt.% and sulfur value is > 3 wt.%. Magnetite chemistry and Ti, V, Al, Mn, Ni, and Cr contents are similar to skarn deposit. Biotite syenodiorite host rock has hypidiomorphic granular texture and it consists of plagioclase, K-feldspar, biotite, and apatite minerals. Chemically, this intrusive rock is K-series alkaline type, which was generated in within plate zone. This magma is characterized by strong enrichment in LREE, LILE (Rb, Cs, Ba, and K, HFSE (Nb, Zr, and Ti, and P elements. The primary magma is produced by low degree partial melting of garnet lherzolite from asthenospheric to boundary of asthenospheric-lithospheric mantle.

  6. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  7. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  8. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  9. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  10. Dynamics of the Yellowstone hydrothermal system

    Science.gov (United States)

    Hurwitz, Shaul; Lowenstern, Jacob B.

    2014-01-01

    The Yellowstone Plateau Volcanic Field is characterized by extensive seismicity, episodes of uplift and subsidence, and a hydrothermal system that comprises more than 10,000 thermal features, including geysers, fumaroles, mud pots, thermal springs, and hydrothermal explosion craters. The diverse chemical and isotopic compositions of waters and gases derive from mantle, crustal, and meteoric sources and extensive water-gas-rock interaction at variable pressures and temperatures. The thermal features are host to all domains of life that utilize diverse inorganic sources of energy for metabolism. The unique and exceptional features of the hydrothermal system have attracted numerous researchers to Yellowstone beginning with the Washburn and Hayden expeditions in the 1870s. Since a seminal review published a quarter of a century ago, research in many fields has greatly advanced our understanding of the many coupled processes operating in and on the hydrothermal system. Specific advances include more refined geophysical images of the magmatic system, better constraints on the time scale of magmatic processes, characterization of fluid sources and water-rock interactions, quantitative estimates of heat and magmatic volatile fluxes, discovering and quantifying the role of thermophile microorganisms in the geochemical cycle, defining the chronology of hydrothermal explosions and their relation to glacial cycles, defining possible links between hydrothermal activity, deformation, and seismicity; quantifying geyser dynamics; and the discovery of extensive hydrothermal activity in Yellowstone Lake. Discussion of these many advances forms the basis of this review.

  11. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    primitive, mantle-derived components and evolved, crust-derived components.Each compositional subtype can be ascribed to a relatively unique petrogenetic history. The numerically dominant ferroan, peraluminous granites probably represent low-degree, relatively high-pressure partial melting of preexisting, crust-derived, intermediate-composition granitoids. The moderately numerous, weakly magnesian, peraluminous granites probably reflect similar partial melting but at a higher degree and in a lower pressure environment. In contrast, the ferroan but metaluminous granites may be the result of extensive differentiation of tholeiitic basalt. Finally, the peralkaline igneous rocks at Mountain Pass have compositions potentially derived by differentiation of alkali basalt. The varying alkalic character of each subtype probably reflects polybaric petrogenesis and the corresponding effect of diverse mineral stabilities on ultimate melt compositions. Mantle-derived mafic magma and variably assimilated partial melts of mainly juvenile Paleoproterozoic crustal components are required to generate the relatively low initial strontium (87Sr/86Sr) and distinctive neodymium isotope compositions characteristic of the U.S. 1.4 Ga granitoid intrusions. The characteristics of these intrusions are consistent with crustal melting in an extensional/decompressional, intracratonic setting that was triggered by mantle upwelling and emplacement of tholeiitic basaltic magma at or near the base of the crust. Composite magmas, formed by mingling and mixing mantle components with partial melts of Paleoproterozoic crust, produced variably homogenized storage reservoirs that continued polybaric evolution as intrusions lodged at various crustal depths.

  12. A thermoelectric cap for seafloor hydrothermal vents

    International Nuclear Information System (INIS)

    Xie, Yu; Wu, Shi-jun; Yang, Can-jun

    2016-01-01

    Highlights: • We developed a thermoelectric cap (TC) to harvest hydrothermal energy. • The TC was deployed at a hydrothermal vent site near Kueishantao islet, Taiwan. • The TC monitored the temperature of the hydrothermal fluids during the field test. • The TC could make the thermal energy of hydrothermal fluids a viable power source. - Abstract: Long-term in situ monitoring is crucial to seafloor scientific investigations. One of the challenges of operating sensors in seabed is the lifespan of the sensors. Such sensors are commonly powered by batteries when other alternatives, such as tidal or solar energy, are unavailable. However, the batteries have a limited lifespan and must be recharged or replaced periodically, which is costly and impractical. A thermoelectric cap, which harvests the thermal energy of hydrothermal fluids through a conduction pipe and converts the heat to electrical energy by using thermoelectric generators, was developed to avoid these inconveniences. The thermoelectric cap was combined with a power and temperature measurement system that enables the thermoelectric cap to power a light-emitting diode lamp, an electronic load (60 Ω), and 16 thermocouples continuously. The thermoelectric cap was field tested at a shallow hydrothermal vent site near Kueishantao islet, which is located offshore of northeastern Taiwan. By using the thermal gradient between hydrothermal fluids and seawater, the thermoelectric cap obtained a sustained power of 0.2–0.5 W during the field test. The thermoelectric cap successfully powered the 16 thermocouples and recorded the temperature of the hydrothermal fluids during the entire field test. Our results show that the thermal energy of hydrothermal fluids can be an alternative renewable power source for oceanographic research.

  13. Seawater bicarbonate removal during hydrothermal circulation

    Science.gov (United States)

    Proskurowski, G. K.; Seewald, J.; Sylva, S. P.; Reeves, E.; Lilley, M. D.

    2013-12-01

    High temperature fluids sampled at hydrothermal vents represent a complex alteration product of water-rock reactions on a multi-component mixture of source fluids. Sources to high-temperature hydrothermal samples include the 'original' seawater present in the recharge limb of circulation, magmatically influenced fluids added at depth as well as any seawater entrained during sampling. High-temperature hydrothermal fluids are typically enriched in magmatic volatiles, with CO2 the dominant species, characterized by concentrations of 10's-100's of mmol/kg (1, 2). Typically, the high concentration of CO2 relative to background seawater bicarbonate concentrations (~2.3 mmol/kg) obscures a full analysis of the fate of seawater bicarbonate during high-temperature hydrothermal circulation. Here we present data from a suite of samples collected over the past 15 years from high-temperature hydrothermal vents at 9N, Endeavour, Lau Basin, and the MAR that have endmember CO2 concentrations less than 10 mmol/kg. Using stable and radiocarbon isotope measurements these samples provide a unique opportunity to examine the balance between 'original' seawater bicarbonate and CO2 added from magmatic sources. Multiple lines of evidence from multiple hydrothermal settings consistently points to the removal of ~80% of the 'original' 2.3 mmol/kg seawater bicarbonate. Assuming that this removal occurs in the low-temperature, 'recharge' limb of hydrothermal circulation, this removal process is widely occurring and has important contributions to the global carbon cycle over geologic time. 1. Lilley MD, Butterfield DA, Lupton JE, & Olson EJ (2003) Magmatic events can produce rapid changes in hydrothermal vent chemistry. Nature 422(6934):878-881. 2. Seewald J, Cruse A, & Saccocia P (2003) Aqueous volatiles in hydrothermal fluids from the Main Endeavour Field, northern Juan de Fuca Ridge: temporal variability following earthquake activity. Earth and Planetary Science Letters 216(4):575-590.

  14. Hydrothermal processing of actinide contaminated organic wastes

    International Nuclear Information System (INIS)

    Worl, A.; Buelow, S.J.; Le, L.A.; Padilla, D.D.; Roberts, J.H.

    1997-01-01

    Hydrothermal oxidation is an innovative process for the destruction of organic wastes, that occurs above the critical temperature and pressure of water. The process provides high destruction and removal efficiencies for a wide variety of organic and hazardous substances. For aqueous/organic mixtures, organic materials, and pure organic liquids hydrothermal processing removes most of the organic and nitrate components (>99.999%) and facilitates the collection and separation of the actinides. We have designed, built and tested a hydrothermal processing unit for the removal of the organic and hazardous substances from actinide contaminated liquids and solids. Here we present results for the organic generated at the Los Alamos National Laboratory Plutonium Facility

  15. Laboratory simulated hydrothermal alteration of sedimentary organic matter from Guaymas Basin, Gulf of California. Ph.D. Thesis

    Science.gov (United States)

    Leif, Roald N.

    1993-01-01

    High temperature alteration of sedimentary organic matter associated with marine hydrothermal systems involves complex physical and chemical processes that are not easily measured in most natural systems. Many of these processes can be evaluated indirectly by examining the geochemistry of the hydrothermal system in the laboratory. In this investigation, an experimental organic geochemical approach to studying pyrolysis of sedimentary organic matter is applied to the hydrothermal system in the Guaymas Basin, Gulf of California. A general survey of hydrothermal oils and extractable organic matter (bitumen) in hydrothermally altered sediments identified several homologous series of alkanones associated with a high temperature hydrothermal origin. The alkanones range in carbon number from C11 to C30 with no carbon number preference. Alkan-2-ones are in highest concentrations, with lower amounts of 3-, 4-, 5- (and higher) homologs. The alkanones appear to be pyrolysis products synthesized under extreme hydrothermal conditions. Hydrous pyrolysis and confinement pyrolysis experiments were performed to simulate thermally enhanced diagenetic and catagenetic changes in the immature sedimentary organic matter. The extent of alteration was measured by monitoring the n-alkanes, acyclic isoprenoids, steroid and triterpenoid biomarkers, polycyclic aromatic hydrocarbons and alkanones. The results were compared to bitumen extracts from sediments which have been naturally altered by a sill intrusion and accompanied hydrothermal fluid flow. These pyrolysis experiments duplicated many of the organic matter transformations observed in the natural system. Full hopane and sterane maturation occurred after 48 hr in experiments at 330 deg C with low water/rock mass ratios (0.29). A variety of radical and ionic reactions are responsible for the organic compound conversions which occur under extreme hydrothermal conditions. Short duration pyrolysis experiments revealed that a portion of the

  16. Zinc triggers microglial activation.

    Science.gov (United States)

    Kauppinen, Tiina M; Higashi, Youichirou; Suh, Sang Won; Escartin, Carole; Nagasawa, Kazuki; Swanson, Raymond A

    2008-05-28

    Microglia are resident immune cells of the CNS. When stimulated by infection, tissue injury, or other signals, microglia assume an activated, "ameboid" morphology and release matrix metalloproteinases, reactive oxygen species, and other proinflammatory factors. This innate immune response augments host defenses, but it can also contribute to neuronal death. Zinc is released by neurons under several conditions in which microglial activation occurs, and zinc chelators can reduce neuronal death in animal models of cerebral ischemia and neurodegenerative disorders. Here, we show that zinc directly triggers microglial activation. Microglia transfected with a nuclear factor-kappaB (NF-kappaB) reporter gene showed a severalfold increase in NF-kappaB activity in response to 30 microm zinc. Cultured mouse microglia exposed to 15-30 microm zinc increased nitric oxide production, increased F4/80 expression, altered cytokine expression, and assumed the activated morphology. Zinc-induced microglial activation was blocked by inhibiting NADPH oxidase, poly(ADP-ribose) polymerase-1 (PARP-1), or NF-kappaB activation. Zinc injected directly into mouse brain induced microglial activation in wild-type mice, but not in mice genetically lacking PARP-1 or NADPH oxidase activity. Endogenous zinc release, induced by cerebral ischemia-reperfusion, likewise induced a robust microglial reaction, and this reaction was suppressed by the zinc chelator CaEDTA. Together, these results suggest that extracellular zinc triggers microglial activation through the sequential activation of NADPH oxidase, PARP-1, and NF-kappaB. These findings identify a novel trigger for microglial activation and a previously unrecognized mechanism by which zinc may contribute to neurological disorders.

  17. Genesis of the hydrothermal gold deposits in the Canan area, Lepaguare District, Honduras

    Science.gov (United States)

    Mattioli, Michele; Menichetti, Marco; Renzulli, Alberto; Toscani, Lorenzo; Salvioli-Mariani, Emma; Suarez, Pedro; Murroni, Alessandro

    2014-04-01

    The Canan area (Honduras) is characterized by a gold-bearing ore deposit that is associated with quartz-veined shear zones. Gold mineralization occurs in low-to medium-grade metamorphic host-rocks (graphitic and sericitic schists). Hydrothermal fluids, which are associated with the emplacement of Cretaceous-Tertiary granodioritic intrusions, are responsible for the formation of quartz veins and the hydrothermal alteration of wall-rocks. Three main altered zones have been detected in the wall-rocks as far as 150 cm from the quartz veins. The distal zone (up to 50-cm thick) contains quartz, chlorite and illite. The intermediate zone is the thickest (up to 80 cm) and is marked by quartz, muscovite, sulphides, kaolinite and native elements such as Au and Ag. The proximal zone, which is close to the quartz veins, is rather thin (up to 25 cm) and contains clay minerals, Al-oxides-hydroxides and sulphides. The transition from the distal to the proximal zone is accompanied by the enrichment of SiO2 and the depletion of all other major elements, except for Fe2O3(tot). Precious metals occur in the highest concentrations in the intermediate zone (Au up to 7.6 ppm and Ag up to 11 ppm). We suggest that gold was transported as a reduced sulphur complex and was precipitated from the hydrothermal solution by the reaction of the sulphur complexes with Fe2+ from the alteration of the mafic minerals of the host-rock. Fluid-wall-rock interactions seem to be the main cause of gold mineralization. Genetic relationships with a strike-slip fault system, hydrothermal alteration zones within the metamorphic wall-rocks, and an entire set of geochemical anomalies are consistent with orogenic-type gold deposits of the epizonal class.

  18. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  19. Hydrothermal pretreatments of macroalgal biomass for biorefineries

    DEFF Research Database (Denmark)

    Ruiz, Héctor A.; Rodríguez-Jasso, Rosa M.; Aguedo, Mario

    2015-01-01

    in accordance with the integrated biorefineries. Furthermore, biorefinery concept requires processes that allow efficient utilization of all components of the biomass. The pretreatment step in a biorefinery is often based on hydrothermal principles of high temperatures in aqueous solution. Therefore...

  20. rights reserved Geophysical Identification of Hydrothermally Altered

    African Journals Online (AJOL)

    ADOWIE PERE

    Geophysical Identification of Hydrothermally Altered Structures That Favour .... aircraft. Total line kilometers of 36,500 were covered in the survey. Magnetic ... tie lines occur at about 2000 metres interval in the ... visual inspection of the map.

  1. ATLAS Tau Trigger

    CERN Document Server

    Belanger-Champagne, C; Bosman, M; Brenner, R; Casado, MP; Czyczula, Z; Dam, M; Demers, S; Farrington, S; Igonkina, O; Kalinowski, A; Kanaya, N; Osuna, C; Pérez, E; Ptacek, E; Reinsch, A; Saavedra, A; Sopczak, A; Strom, D; Torrence, E; Tsuno, S; Vorwerk, V; Watson, A; Xella, S

    2008-01-01

    Moving to the high energy scale of the LHC, the identification of tau leptons will become a necessary and very powerful tool, allowing a discovery of physics beyond Standard Model. Many models, among them light SM Higgs and various SUSY models, predict an abundant production of taus with respect to other leptons. The reconstruction of hadronic tau decays, although a very challenging task in hadronic enviroments, allows to increase a signal efficiency by at least of factor 2, and provides an independent control sample to disantangle lepton tau decays from prompt electrons and muons. Thanks to the advanced calorimetry and tracking, the ATLAS experiment has developed tools to efficiently identify hadronic taus at the trigger level. In this presentation we will review the characteristics of taus and the methods to suppress low-multiplicity, low-energy jets contributions as well as we will address the tau trigger chain which provide a rejection rate of 10^5. We will further present plans for commissioning the ATLA...

  2. The D0 calorimeter trigger

    International Nuclear Information System (INIS)

    Guida, J.

    1992-12-01

    The D0 calorimeter trigger system consists of many levels to make physics motivated trigger decisions. The Level-1 trigger uses hardware techniques to reduce the trigger rate from ∼ 100kHz to 200Hz. It forms sums of electromagnetic and hadronic energy, globally and in towers, along with finding the missing transverse energy. A minimum energy is set on these energy sums to pass the event. The Level-2 trigger is a set of software filters, operating in a parallel-processing microvax farm which further reduces the trigger rate to a few Hertz. These filters will reject events which lack electron candidates, jet candidates, or missing transverse energy in the event. The performance of these triggers during the early running of the D0 detector will also be discussed

  3. Chemical environments of submarine hydrothermal systems

    Science.gov (United States)

    Shock, Everett L.

    1992-01-01

    Perhaps because black-smoker chimneys make tremendous subjects for magazine covers, the proposal that submarine hydrothermal systems were involved in the origin of life has caused many investigators to focus on the eye-catching hydrothermal vents. In much the same way that tourists rush to watch the spectacular eruptions of Old Faithful geyser with little regard for the hydrology of the Yellowstone basin, attention is focused on the spectacular, high-temperature hydrothermal vents to the near exclusion of the enormous underlying hydrothermal systems. Nevertheless, the magnitude and complexity of geologic structures, heat flow, and hydrologic parameters which characterize the geyser basins at Yellowstone also characterize submarine hydrothermal systems. However, in the submarine systems the scale can be considerably more vast. Like Old Faithful, submarine hydrothermal vents have a spectacular quality, but they are only one fascinating aspect of enormous geologic systems operating at seafloor spreading centers throughout all of the ocean basins. A critical study of the possible role of hydrothermal processes in the origin of life should include the full spectrum of probable environments. The goals of this chapter are to synthesize diverse information about the inorganic geochemistry of submarine hydrothermal systems, assemble a description of the fundamental physical and chemical attributes of these systems, and consider the implications of high-temperature, fluid-driven processes for organic synthesis. Information about submarine hydrothermal systems comes from many directions. Measurements made directly on venting fluids provide useful, but remarkably limited, clues about processes operating at depth. The oceanic crust has been drilled to approximately 2.0 km depth providing many other pieces of information, but drilling technology has not allowed the bore holes and core samples to reach the maximum depths to which aqueous fluids circulate in oceanic crust. Such

  4. Surgery for trigger finger.

    Science.gov (United States)

    Fiorini, Haroldo Junior; Tamaoki, Marcel Jun; Lenza, Mário; Gomes Dos Santos, Joao Baptista; Faloppa, Flávio; Belloti, Joao Carlos

    2018-02-20

    Trigger finger is a common clinical disorder, characterised by pain and catching as the patient flexes and extends digits because of disproportion between the diameter of flexor tendons and the A1 pulley. The treatment approach may include non-surgical or surgical treatments. Currently there is no consensus about the best surgical treatment approach (open, percutaneous or endoscopic approaches). To evaluate the effectiveness and safety of different methods of surgical treatment for trigger finger (open, percutaneous or endoscopic approaches) in adults at any stage of the disease. We searched CENTRAL, MEDLINE, Embase and LILACS up to August 2017. We included randomised or quasi-randomised controlled trials that assessed adults with trigger finger and compared any type of surgical treatment with each other or with any other non-surgical intervention. The major outcomes were the resolution of trigger finger, pain, hand function, participant-reported treatment success or satisfaction, recurrence of triggering, adverse events and neurovascular injury. Two review authors independently selected the trial reports, extracted the data and assessed the risk of bias. Measures of treatment effect for dichotomous outcomes calculated risk ratios (RRs), and mean differences (MDs) or standardised mean differences (SMD) for continuous outcomes, with 95% confidence intervals (CIs). When possible, the data were pooled into meta-analysis using the random-effects model. GRADE was used to assess the quality of evidence for each outcome. Fourteen trials were included, totalling 1260 participants, with 1361 trigger fingers. The age of participants included in the studies ranged from 16 to 88 years; and the majority of participants were women (approximately 70%). The average duration of symptoms ranged from three to 15 months, and the follow-up after the procedure ranged from eight weeks to 23 months.The studies reported nine types of comparisons: open surgery versus steroid injections (two

  5. Hydrothermal industrialization: direct heat development. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1982-05-01

    A description of hydrothermal resources suitable for direct applications, their associated temperatures, geographic distribution and developable capacity are given. An overview of the hydrothermal direct-heat development infrastructure is presented. Development activity is highlighted by examining known and planned geothermal direct-use applications. Underlying assumptions and results for three studies conducted to determine direct-use market penetration of geothermal energy are discussed.

  6. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  7. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  8. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  9. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  10. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  11. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  12. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  13. Triggering at high luminosity: fake triggers from pile-up

    International Nuclear Information System (INIS)

    Johnson, R.

    1983-01-01

    Triggers based on a cut in transverse momentum (p/sub t/) have proved to be useful in high energy physics both because they indicte that a hard constituent scattering has occurred and because they can be made quickly enough to gate electronics. These triggers will continue to be useful at high luminosities if overlapping events do not cause an excessive number of fake triggers. In this paper, I determine if this is indeed a problem at high luminosity machines

  14. Hydrothermal synthesis of cathode materials

    Science.gov (United States)

    Chen, Jiajun; Wang, Shijun; Whittingham, M. Stanley

    A number of cathodes are being considered for the next generation of lithium ion batteries to replace the expensive LiCoO 2 presently used. Besides the layered oxides, such as LiNi yMn yCo 1-2 yO 2, a leading candidate is lithium iron phosphate with the olivine structure. Although this material is inherently low cost, a manufacturing process that produces electrochemically active LiFePO 4 at a low cost is also required. Hydrothermal reactions are one such possibility. A number of pure phosphates have been prepared using this technique, including LiFePO 4, LiMnPO 4 and LiCoPO 4; this method has also successfully produced mixed metal phosphates, such as LiFe 0.33Mn 0.33Co 0.33PO 4. Ascorbic acid was found to be better than hydrazine or sugar at preventing the formation of ferric ions in aqueous media. When conductive carbons are added to the reaction medium excellent electrochemical behavior is observed.

  15. Nostalgia: content, triggers, functions.

    Science.gov (United States)

    Wildschut, Tim; Sedikides, Constantine; Arndt, Jamie; Routledge, Clay

    2006-11-01

    Seven methodologically diverse studies addressed 3 fundamental questions about nostalgia. Studies 1 and 2 examined the content of nostalgic experiences. Descriptions of nostalgic experiences typically featured the self as a protagonist in interactions with close others (e.g., friends) or in momentous events (e.g., weddings). Also, the descriptions contained more expressions of positive than negative affect and often depicted the redemption of negative life scenes by subsequent triumphs. Studies 3 and 4 examined triggers of nostalgia and revealed that nostalgia occurs in response to negative mood and the discrete affective state of loneliness. Studies 5, 6, and 7 investigated the functional utility of nostalgia and established that nostalgia bolsters social bonds, increases positive self-regard, and generates positive affect. These findings demarcate key landmarks in the hitherto uncharted research domain of nostalgia.

  16. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  17. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  18. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  19. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  20. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  1. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  2. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  3. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  4. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  5. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  6. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  7. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  8. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  9. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  10. Timing of porphyry (Cu-Mo) and base metal (Zn-Pb-Ag-Cu) mineralisation in a magmatic-hydrothermal system—Morococha district, Peru

    Science.gov (United States)

    Catchpole, Honza; Kouzmanov, Kalin; Bendezú, Aldo; Ovtcharova, Maria; Spikings, Richard; Stein, Holly; Fontboté, Lluís

    2015-12-01

    The Morococha district in central Peru is characterised by economically important Cordilleran polymetallic (Zn-Pb-Ag-Cu) vein and replacement bodies and the large Toromocho porphyry Cu-Mo deposit in its centre. U-Pb, Re-Os, and 40Ar/39Ar geochronology data for various porphyry-related hydrothermal mineralisation styles record a 3.5-Ma multi-stage history of magmatic-hydrothermal activity in the district. In the late Miocene, three individual magmatic-hydrothermal centres were active: the Codiciada, Toromocho, and Ticlio centres, each separated in time and space. The Codiciada centre is the oldest magmatic-hydrothermal system in the district and consists of a composite porphyry stock associated with anhydrous skarn and quartz-molybdenite veins. The hydrothermal events are recorded by a titanite U-Pb age at 9.3 ± 0.2 Ma and a molybdenite Re-Os age at 9.26 ± 0.03 Ma. These ages are indistinguishable from zircon U-Pb ages for porphyry intrusions of the composite stock and indicate a time span of 0.2 Ma for magmatic-hydrothermal activity. The small Ticlio magmatic-hydrothermal centre in the west of the district has a maximum duration of 0.3 Ma, ranging from porphyry emplacement to porphyry mineralisation at 8.04 ± 0.14 Ma (40Ar/39Ar muscovite cooling age). The Toromocho magmatic-hydrothermal centre has a minimum of five recorded porphyry intrusions that span a total of 1.3 Ma and is responsible for the formation of the giant Toromocho Cu-Mo deposit. At least two hydrothermal pulses are identified. Post-dating a first pulse of molybdenite mineralisation, wide-spread hydrous skarn covers an area of over 6 km2 and is recorded by five 40Ar/39Ar cooling ages at 7.2-6.8 Ma. These ages mark the end of the slowly cooling and long-lived Toromocho magmatic-hydrothermal centre soon after last magmatic activity at 7.26 ± 0.02 Ma. District-wide (50 km2) Cordilleran base metal vein and replacement bodies post-date the youngest recorded porphyry mineralisation event at Toromocho

  11. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  12. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  13. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  14. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  15. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  16. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  17. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  18. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  19. Petrography and trace element signatures in silicates and Fe-Ti-oxides from the Lanjiahuoshan deposit, Panzhihua layered intrusion, Southwest China

    Science.gov (United States)

    Gao, Wenyuan; Ciobanu, Cristiana L.; Cook, Nigel J.; Huang, Fei; Meng, Lin; Gao, Shang

    2017-12-01

    Permian mafic-ultramafic layered intrusions in the central part of the Emeishan Large Igneous Province (ELIP), Southwestern China, host Fe-Ti-V-oxide ores that have features which distinguish them from other large layered intrusion-hosted deposits. The origin of these ores is highly debated. Careful petrographic examination, whole rock analysis, electron probe microanalysis, and measurement and mapping of trace element concentrations by laser ablation inductively coupled plasma mass spectrometry in all major and minor minerals (clinopyroxene, plagioclase, olivine, amphibole, titanomagnetite, ilmenite, pleonaste and pyrrhotite) has been undertaken on samples from the Lanjiahuoshan deposit, representing the Middle, Lower and Marginal Zone of the Panzhihua intrusion. Features are documented that impact on interpretation of intrusion petrology and with implications for genesis of the Fe-Ti-V-oxide ores. Firstly, there is evidence, as symplectites between clinopyroxene and plagioclase, for introduction of complex secondary melts. Secondly, reaction between a late hydrothermal fluid and clinopyroxene is recognized, which has led to formation of hydrated minerals (pargasite, phlogopite), as well as a potassium metasomatic event, postdating intrusion solidification, which led to formation of K-feldspar. Lastly, partitioning of trace elements between titanomagnetite and silicates needs to consider scavenging of metals by ilmenite (Mn, Sc, Zr, Nb, Sn, Hf and Ta) and sulfides, as well as the marked partitioning of Co, Ni, Zn, Ga, As and Sb into spinels exsolved from titanomagnetite. The role of these less abundant phases may have been understated in previous studies, highlighting the importance of petrographic examination of complex silicate-oxide-sulfide assemblages, as well as the need for a holistic approach to trace element analysis, acknowledging all minerals within the assemblage.

  20. The ATLAS hadronic tau trigger

    CERN Document Server

    Black, C; The ATLAS collaboration

    2012-01-01

    With the high luminosities of proton-proton collisions achieved at the LHC, the strategies for triggering have become more important than ever for physics analysis. The naive inclusive single tau lepton triggers now suffer from severe rate limitations. To allow for a large program of physics analyses with taus, the development of topological triggers that combine tau signatures with other measured quantities in the event is required. These combined triggers open many opportunities to study new physics beyond the Standard Model and to search for the Standard Model Higgs. We present the status and performance of the hadronic tau trigger in ATLAS. We demonstrate that the ATLAS tau trigger ran remarkably well over 2011, and how the lessons learned from 2011 led to numerous improvements in the preparation of the 2012 run. These improvements include the introduction of tau selection criteria that are robust against varying pileup scenarios, and the implementation of multivariate selection techniques in the tau trig...

  1. The ATLAS hadronic tau trigger

    CERN Document Server

    Black, C; The ATLAS collaboration

    2012-01-01

    With the high luminosities of proton-proton collisions achieved at the LHC, the strategies for triggering have become more important than ever for physics analysis. The naïve inclusive single tau lepton triggers now suffer from severe rate limitations. To allow for a large program of physics analyses with taus, the development of topological triggers that combine tau signatures with other measured quantities in the event is required. These combined triggers open many opportunities to study new physics beyond the Standard Model and to search for the Standard Model Higgs. We present the status and performance of the hadronic tau trigger in ATLAS. We demonstrate that the ATLAS tau trigger ran remarkably well over 2011, and how the lessons learned from 2011 led to numerous improvements in the preparation of the 2012 run. These improvements include the introduction of tau selection criteria that are robust against varying pileup scenarios, and the implementation of multivariate selection techniques in the tau tri...

  2. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  3. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  4. The ATLAS hadronic tau trigger

    International Nuclear Information System (INIS)

    Shamim, Mansoora

    2012-01-01

    The extensive tau physics programs of the ATLAS experiment relies heavily on trigger to select hadronic decays of tau lepton. Such a trigger is implemented in ATLAS to efficiently collect signal events, while keeping the rate of multi-jet background within the allowed bandwidth. This contribution summarizes the performance of the ATLAS hadronic tau trigger system during 2011 data taking period and improvements implemented for the 2012 data collection.

  5. Flexible trigger menu implementation on the Global Trigger for the CMS Level-1 trigger upgrade

    Science.gov (United States)

    MATSUSHITA, Takashi; CMS Collaboration

    2017-10-01

    The CMS experiment at the Large Hadron Collider (LHC) has continued to explore physics at the high-energy frontier in 2016. The integrated luminosity delivered by the LHC in 2016 was 41 fb-1 with a peak luminosity of 1.5 × 1034 cm-2s-1 and peak mean pile-up of about 50, all exceeding the initial estimations for 2016. The CMS experiment has upgraded its hardware-based Level-1 trigger system to maintain its performance for new physics searches and precision measurements at high luminosities. The Global Trigger is the final step of the CMS Level-1 trigger and implements a trigger menu, a set of selection requirements applied to the final list of objects from calorimeter and muon triggers, for reducing the 40 MHz collision rate to 100 kHz. The Global Trigger has been upgraded with state-of-the-art FPGA processors on Advanced Mezzanine Cards with optical links running at 10 GHz in a MicroTCA crate. The powerful processing resources of the upgraded system enable implementation of more algorithms at a time than previously possible, allowing CMS to be more flexible in how it handles the available trigger bandwidth. Algorithms for a trigger menu, including topological requirements on multi-objects, can be realised in the Global Trigger using the newly developed trigger menu specification grammar. Analysis-like trigger algorithms can be represented in an intuitive manner and the algorithms are translated to corresponding VHDL code blocks to build a firmware. The grammar can be extended in future as the needs arise. The experience of implementing trigger menus on the upgraded Global Trigger system will be presented.

  6. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  7. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  8. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  9. Reconstructing Magmatic-Hydrothermal Systems via Geologic Mapping of the Tilted, Cross-sectional Exposures of the Yerington District, Nevada

    Science.gov (United States)

    Dilles, J. H.; Proffett, J. M.

    2011-12-01

    The Jurassic Yerington batholith was cut by Miocene to recent normal faults and tilted ~90° west (Proffett, 1977). Exposures range from the volcanic environment to ~6 km depth in the batholith. Magmatic-hydrothermal fluids derived from the Luhr Hill granite and associated porphyry dikes produced characteristic porphyry copper mineralization and rock alteration (K-silicate, sericitic, and advanced argillic) in near-vertical columnar zones above cupolas on the deep granite. In addition, saline brines derived from the early Mesozoic volcanic and sedimentary section intruded by the batholith were heated and circulated through the batholith producing voluminous sodic-calcic and propylitic alteration. The magnetite-copper ore body at Pumpkin Hollow is hosted in early Mesozoic sedimentary rocks in the contact aureole of the batholith, and appears to be an IOCG type deposit produced where the sedimentary brines exited the batholith. Although many advances in understanding of Yerington have been made by lab-based geochronology and geochemistry studies, the first order igneous and hydrothermal features were recognized first in the 1960s and 1970s and are best documented by geological mapping at a variety of scales ranging from 1:500 to 1:24,000. The Anaconda technique of mapping mine benches, trenches, and drill cores was perfected here (Einaudi, 1997), and other techniques were used for surface exposures. The geologic and hydrothermal alteration maps establish that hydrothermal alteration accompanied each of several porphyry dike intrusions, and affected more than 100 km3 of rock. Both zonation in alteration mineralogy and vein orientations allow reconstruction of source areas and >5 km-long flow-paths of hydrothermal fluids through the batholith and contact aureole.

  10. A genetic link between magnetite mineralization and diorite intrusion at the El Romeral iron oxide-apatite deposit, northern Chile

    Science.gov (United States)

    Rojas, Paula A.; Barra, Fernando; Reich, Martin; Deditius, Artur; Simon, Adam; Uribe, Francisco; Romero, Rurik; Rojo, Mario

    2018-01-01

    El Romeral is one of the largest iron oxide-apatite (IOA) deposits in the Coastal Cordillera of northern Chile. The Cerro Principal magnetite ore body at El Romeral comprises massive magnetite intergrown with actinolite, with minor apatite, scapolite, and sulfides (pyrite ± chalcopyrite). Several generations of magnetite were identified by using a combination of optical and electron microscopy techniques. The main mineralization event is represented by zoned magnetite grains with inclusion-rich cores and inclusion-poor rims, which form the massive magnetite ore body. This main magnetite stage was followed by two late hydrothermal events that are represented by magnetite veinlets that crosscut the massive ore body and by disseminated magnetite in the andesite host rock and in the Romeral diorite. The sulfur stable isotope signature of the late hydrothermal sulfides indicates a magmatic origin for sulfur (δ34S between - 0.8 and 2.9‰), in agreement with previous δ34S data reported for other Chilean IOA and iron oxide-copper-gold deposits. New 40Ar/39Ar dating of actinolite associated with the main magnetite ore stage yielded ages of ca. 128 Ma, concordant within error with a U-Pb zircon age for the Romeral diorite (129.0 ± 0.9 Ma; mean square weighted deviation = 1.9, n = 28). The late hydrothermal magnetite-biotite mineralization is constrained at ca. 118 Ma by 40Ar/39Ar dating of secondary biotite. This potassic alteration is about 10 Ma younger than the main mineralization episode, and it may be related to post-mineralization dikes that crosscut and remobilize Fe from the main magnetite ore body. These data reveal a clear genetic association between magnetite ore formation, sulfide mineralization, and the diorite intrusion at El Romeral (at 129 Ma), followed by a late and more restricted stage of hydrothermal alteration associated with the emplacement of post-ore dikes at ca. 118 Ma. Therefore, this new evidence supports a magmatic-hydrothermal model for the

  11. Trigger and data acquisition

    CERN Multimedia

    CERN. Geneva; Gaspar, C

    2001-01-01

    Past LEP experiments generate data at 0.5 MByte/s from particle detectors with over a quarter of a million readout channels. The process of reading out the electronic channels, treating them, and storing the date produced by each collision for further analysis by the physicists is called "Data Acquisition". Not all beam crossings produce interesting physics "events", picking the interesting ones is the task of the "Trigger" system. In order to make sure that the data is collected in good conditions the experiment's operation has to be constantly verified. In all, at LEP experiments over 100 000 parameters were monitored, controlled, and synchronized by the "Monotoring and control" system. In the future, LHC experiments will produce as much data in a single day as a LEP detector did in a full year's running with a raw data rate of 10 - 100 MBytes/s and will have to cope with some 800 million proton-proton collisions a second of these collisions only one in 100 million million is interesting for new particle se...

  12. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  13. The TOTEM modular trigger system

    Energy Technology Data Exchange (ETDEWEB)

    Bagliesi, M.G., E-mail: mg.bagliesi@pi.infn.i [University of Siena and INFN Pisa (Italy); Berretti, M.; Cecchi, R.; Greco, V.; Lami, S.; Latino, G.; Oliveri, E.; Pedreschi, E.; Scribano, A.; Spinella, F.; Turini, N. [University of Siena and INFN Pisa (Italy)

    2010-05-21

    The TOTEM experiment will measure the total cross-section with the luminosity independent method and study elastic and diffractive scattering at the LHC. We are developing a modular trigger system, based on programmable logic, that will select meaningful events within 2.5{mu}s. The trigger algorithm is based on a tree structure in order to obtain information compression. The trigger primitive is generated directly on the readout chip, VFAT, that has a specific fast output that gives low resolution hits information. In two of the TOTEM detectors, Roman Pots and T2, a coincidence chip will perform track recognition directly on the detector readout boards, while for T1 the hits are transferred from the VFATs to the trigger hardware. Starting from more than 2000 bits delivered by the detector electronics, we extract, in a first step, six trigger patterns of 32 LVDS signals each; we build, then, on a dedicated board, a 1-bit (L1) trigger signal for the TOTEM experiment and 16 trigger bits to the CMS experiment global trigger system for future common data taking.

  14. The TOTEM modular trigger system

    International Nuclear Information System (INIS)

    Bagliesi, M.G.; Berretti, M.; Cecchi, R.; Greco, V.; Lami, S.; Latino, G.; Oliveri, E.; Pedreschi, E.; Scribano, A.; Spinella, F.; Turini, N.

    2010-01-01

    The TOTEM experiment will measure the total cross-section with the luminosity independent method and study elastic and diffractive scattering at the LHC. We are developing a modular trigger system, based on programmable logic, that will select meaningful events within 2.5μs. The trigger algorithm is based on a tree structure in order to obtain information compression. The trigger primitive is generated directly on the readout chip, VFAT, that has a specific fast output that gives low resolution hits information. In two of the TOTEM detectors, Roman Pots and T2, a coincidence chip will perform track recognition directly on the detector readout boards, while for T1 the hits are transferred from the VFATs to the trigger hardware. Starting from more than 2000 bits delivered by the detector electronics, we extract, in a first step, six trigger patterns of 32 LVDS signals each; we build, then, on a dedicated board, a 1-bit (L1) trigger signal for the TOTEM experiment and 16 trigger bits to the CMS experiment global trigger system for future common data taking.

  15. Upgrade trigger: Biannual performance update

    CERN Document Server

    Aaij, Roel; Couturier, Ben; Esen, Sevda; De Cian, Michel; De Vries, Jacco Andreas; Dziurda, Agnieszka; Fitzpatrick, Conor; Fontana, Marianna; Grillo, Lucia; Hasse, Christoph; Jones, Christopher Rob; Le Gac, Renaud; Matev, Rosen; Neufeld, Niko; Nikodem, Thomas; Polci, Francesco; Del Buono, Luigi; Quagliani, Renato; Schwemmer, Rainer; Seyfert, Paul; Stahl, Sascha; Szumlak, Tomasz; Vesterinen, Mika Anton; Wanczyk, Joanna; Williams, Mark Richard James; Yin, Hang; Zacharjasz, Emilia Anna

    2017-01-01

    This document presents the performance of the LHCb Upgrade trigger reconstruction sequence, incorporating changes to the underlying reconstruction algorithms and detector description since the Trigger and Online Upgrade TDR. An updated extrapolation is presented using the most recent example of an Event Filter Farm node.

  16. Minimum Bias Trigger in ATLAS

    International Nuclear Information System (INIS)

    Kwee, Regina

    2010-01-01

    Since the restart of the LHC in November 2009, ATLAS has collected inelastic pp collisions to perform first measurements on charged particle densities. These measurements will help to constrain various models describing phenomenologically soft parton interactions. Understanding the trigger efficiencies for different event types are therefore crucial to minimize any possible bias in the event selection. ATLAS uses two main minimum bias triggers, featuring complementary detector components and trigger levels. While a hardware based first trigger level situated in the forward regions with 2.2 < |η| < 3.8 has been proven to select pp-collisions very efficiently, the Inner Detector based minimum bias trigger uses a random seed on filled bunches and central tracking detectors for the event selection. Both triggers were essential for the analysis of kinematic spectra of charged particles. Their performance and trigger efficiency measurements as well as studies on possible bias sources will be presented. We also highlight the advantage of these triggers for particle correlation analyses. (author)

  17. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  18. Hydrothermal processing of radioactive combustible waste

    International Nuclear Information System (INIS)

    Worl, L.A.; Buelow, S.J.; Harradine, D.; Le, L.; Padilla, D.D.; Roberts, J.H.

    1998-01-01

    Hydrothermal processing has been demonstrated for the treatment of radioactive combustible materials for the US Department of Energy. A hydrothermal processing system was designed, built and tested for operation in a plutonium glovebox. Presented here are results from the study of the hydrothermal oxidation of plutonium and americium contaminated organic wastes. Experiments show the destruction of the organic component to CO 2 and H 2 O, with 30 wt.% H 2 O 2 as an oxidant, at 540 C and 46.2 MPa. The majority of the actinide component forms insoluble products that are easily separated by filtration. A titanium liner in the reactor and heat exchanger provide corrosion resistance for the oxidation of chlorinated organics. The treatment of solid material is accomplished by particle size reduction and the addition of a viscosity enhancing agent to generate a homogeneous pumpable mixture

  19. The BGU/CERN solar hydrothermal reactor

    CERN Document Server

    Bertolucci, Sergio; Caspers, Fritz; Garb, Yaakov; Gross, Amit; Pauletta, Stefano

    2014-01-01

    We describe a novel solar hydrothermal reactor (SHR) under development by Ben Gurion University (BGU) and the European Organization for Nuclear Research CERN. We describe in broad terms the several novel aspects of the device and, by extension, of the niche it occupies: in particular, enabling direct off-grid conversion of a range of organic feedstocks to sterile useable (solid, liquid) fuels, nutrients, products using only solar energy and water. We then provide a brief description of the high temperature high efficiency panels that provide process heat to the hydrothermal reactor, and review the basics of hydrothermal processes and conversion taking place in this. We conclude with a description of a simulation of the pilot system that will begin operation later this year.

  20. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    Science.gov (United States)

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    are attributes of the ancient North American cratonic margin that appear to be essential prerequisites to this style of postcollisional magmatism and associated gold-rich fluid exsolution. This type of magmatic hydrothermal activity occurs in a very specific tectonic setting that typically sets intrusion-related gold deposits apart from orogenic gold deposits, which are synorogenic in timing and have no consistent direct relationship to such diverse and contemporaneous lithospheric mantle-derived magmas, although they too are commonly sited adjacent to lithospheric boundaries.

  1. Possible climate effects of the CAMP intrusive and extrusive activity and its influence on the end-Triassic mass extinction

    Science.gov (United States)

    Marzoli, A.; Davies, J.; Valeriani, L.; Preto, N.; Cirilli, S.; Panfili, G.; Dal Corso, J.; Vasconcellos, E.; Ernesto, M.; Youbi, N.; Callegaro, S.

    2017-12-01

    The end-Triassic global climate changes were probably triggered by the emplacement of the CAMP (Central Atlantic magmatic province). Here we explore the possibility that CAMP intrusions triggered global warming, while CAMP eruptions triggered short-lived cooling events. The main phase of the end-Triassic environmental changes and mass extinction was marked by two carbon isotopic excursions (CIEs). Based on stratigraphic and geochronologic data, we show that the earliest CAMP intrusions were emplaced at ca. 201.6 Ma prior to the first CIE (Davies et al., 2017). The main phase of CAMP magmatism started during the first CIE at ca. 201.5 Ma and continued until the second CIE and the Triassic-Jurassic boundary (at ca. 201.3 Ma). In particular, intrusion of the over 1 million cubic km of basaltic sills in Amazonia (Brazil) and of widespread sills from North America and Africa occurred within this interval. Multidisciplinary analyses show that organic matter rich sediments close to the sills from Brazil, Morocco, and the USA underwent contact metamorphism and organic carbon depletion. Such process may have released large amounts of thermogenic gases (CO2 and CH4) leading to global perturbation of the carbon cycle and to global warming. The timing of CAMP volcanic eruptions is well constrained by combined geochronologic, stratigraphic and palynologic data. In Morocco, newly observed palynological assemblages for sediments at the top of the lava piles are nearly identical to those found at the base of the volcanic sequences. These new data combined with carbon isotopic data indicate that over 95% of the CAMP lava flows in Morocco erupted during a short time interval at the very beginning of the end-Triassic extinction interval. A similar scenario applies possibly to the lava flows from North America. CAMP basalts are quite sulfur rich (up to 1800 ppm) suggesting that CAMP eruptions emitted large amounts of SO2. Such emissions lead possibly to short-lived cooling events

  2. Role of Sulfur in the Formation of Magmatic-Hydrothermal Copper-Gold Deposits

    Science.gov (United States)

    Seo, J.; Guillong, M.; Heinrich, C.

    2009-05-01

    Sulfur plays essential roles in hydrothermal ore-forming processes [1], which calls for precise and accurate quantitative sulfur determination in fluid inclusions. Feasibility tests for sulfur quantification by comparing data from both LA-Quadrupole (Q) - ICP-MS and LA-High Resolution (HR) - ICP-MS show that reliable sulfur quantification in fluid inclusions is possible [2], provided that a very careful baseline correction is applied. We investigate the metal transporting capabilities of sulfur by measuring sulfur together with copper and other elements in cogenetic brine and vapor inclusions ('boiling assemblages') in single healed crack hosted by quartz veins. Samples are from high-temperature magmatic-hydrothermal ore deposits and miarolitic cavities of barren granitoid. Clear compositional correlations of sulfur with copper and gold were found. A molar S/Cu ratio commonly close to 2 but never above 2, indicates sulfur-complexed metal transportation in the high-temperature hydrothermal vapor, and probably also in the Na-Fe-K-Cl-enriched brines. Vapor/brine partitioning trends of the S and Cu are shown to be related with the chemistry of the fluids (possibly by various sulfur speciations in varying pH, fO2) and causative magma source. In the boiling hydrothermal environments, higher vapor partitioning of Cu and S is observed at reduced and peraluminous Sn-W granite, whereas oxidized and perakaline porphyry-style deposits have a lower partitioning to the vapor although the total concentration of S, Cu, Au in both fluid phase is higher than in the Sn-W granite [3]. Vapor inclusion in the boiling assemblages from magmatic-hydrothermal ore deposits and granitic intrusions generally contain an excess of sulfur over ore metals such as Cu, Fe, and Mo. This allows efficient sulfide ore precipitation in high-temperature porphyry-type deposits, and complexation of gold by the remaining sulfide down to lower temperatures. The results confirm earlier interpretations [1] and

  3. Hydrothermal processing of transuranic contaminated combustible waste

    International Nuclear Information System (INIS)

    Buelow, S.J.; Worl, L.; Harradine, D.; Padilla, D.; McInroy, R.

    2001-01-01

    Experiments at Los Alamos National Laboratory have demonstrated the usefulness of hydrothermal processing for the disposal of a wide variety of transuranic contaminated combustible wastes. This paper provides an overview of the implementation and performance of hydrothermal treatment for concentrated salt solutions, explosives, propellants, organic solvents, halogenated solvents, and laboratory trash, such as paper and plastics. Reaction conditions vary from near ambient temperatures and pressure to over 1000degC and 100 MPa pressure. Studies involving both radioactive and non-radioactive waste simulants are discussed. (author)

  4. Coupling geophysical investigation with hydrothermal modeling to constrain the enthalpy classification of a potential geothermal resource.

    Science.gov (United States)

    White, Jeremy T.; Karakhanian, Arkadi; Connor, Chuck; Connor, Laura; Hughes, Joseph D.; Malservisi, Rocco; Wetmore, Paul

    2015-01-01

    An appreciable challenge in volcanology and geothermal resource development is to understand the relationships between volcanic systems and low-enthalpy geothermal resources. The enthalpy of an undeveloped geothermal resource in the Karckar region of Armenia is investigated by coupling geophysical and hydrothermal modeling. The results of 3-dimensional inversion of gravity data provide key inputs into a hydrothermal circulation model of the system and associated hot springs, which is used to evaluate possible geothermal system configurations. Hydraulic and thermal properties are specified using maximum a priori estimates. Limited constraints provided by temperature data collected from an existing down-gradient borehole indicate that the geothermal system can most likely be classified as low-enthalpy and liquid dominated. We find the heat source for the system is likely cooling quartz monzonite intrusions in the shallow subsurface and that meteoric recharge in the pull-apart basin circulates to depth, rises along basin-bounding faults and discharges at the hot springs. While other combinations of subsurface properties and geothermal system configurations may fit the temperature distribution equally well, we demonstrate that the low-enthalpy system is reasonably explained based largely on interpretation of surface geophysical data and relatively simple models.

  5. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  6. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  7. Late-Hercynian intrusion-related gold deposits: An integrated model on the Tighza polymetallic district, central Morocco

    Science.gov (United States)

    Éric, Marcoux; Khadija, Nerci; Yannick, Branquet; Claire, Ramboz; Gilles, Ruffet; Jean-Jacques, Peucat; Ross, Stevenson; Michel, Jébrak

    2015-07-01

    radiogenic isotope studies. Nd and Sr isotope compositions of scheelite and granites suggest the participation of a juvenile component while lead isotopes demonstrate a major participation of the basement. Both gold mineralization and zoning suggest that the system developed at the end of the magmatic activity, accompanying a major transition in magmatic fluid composition. The morphology of the gold-bearing mineralization is dependent of the permeability and the reactivity of host-rocks: focus circulation of fluids through pre-existing tectonic corridors, reactivated by late-Hercynian intrusions favor the formation of large W-type gold veins, while infiltration of fluid within reactive stratigraphic layers gives rise to skarn mineralization. A 40Ar/39Ar date (W1 north vein: 291.8 ± 0.3 Ma) indicates that hydrothermal circulation predates gold and tungsten deposition in open fractures as well as Mine granite emplacement. The W-Au mineralization preceded the onset of a large convective hydrothermal cell around the intrusion that led to the formation of the Pb-Ag-Zn mined veins. The Tighza polymetallic district displays numerous similarities with the R-IRG model that was defined in the American Cordillera, such as thermal and zonation patterns, carbonic hydrothermal fluids and chronology of intrusion and related deposits, but also provides new insight to the R-IRG model such as wide Au-quartz veins instead of sheeted Au-veins, oxidation state of the magma, and Sr-Nd isotopic data. These results establish a major magmatic contribution and discard a direct genetic relationship between gold mineralization and major neighboring Pb-Ag-Zn veins. A large number of classic Pb-Zn district of the Western Hercynides belong to the same clan.

  8. The chemistry of hydrothermal magnetite: a review

    Science.gov (United States)

    Nadoll, Patrick; Angerer, Thomas; Mauk, Jeffrey L.; French, David; Walshe, John

    2014-01-01

    Magnetite (Fe3O4) is a well-recognized petrogenetic indicator and is a common accessory mineral in many ore deposits and their host rocks. Recent years have seen an increased interest in the use of hydrothermal magnetite for provenance studies and as a pathfinder for mineral exploration. A number of studies have investigated how specific formation conditions are reflected in the composition of the respective magnetite. Two fundamental questions underlie these efforts — (i) How can the composition of igneous and, more importantly, hydrothermal magnetite be used to discriminate mineralized areas from barren host rocks, and (ii) how can this assist exploration geologists to target ore deposits at greater and greater distances from the main mineralization? Similar to igneous magnetite, the most important factors that govern compositional variations in hydrothermal magnetite are (A) temperature, (B) fluid composition — element availability, (C) oxygen and sulfur fugacity, (D) silicate and sulfide activity, (E) host rock buffering, (F) re-equilibration processes, and (G) intrinsic crystallographic controls such as ionic radius and charge balance. We discuss how specific formation conditions are reflected in the composition of magnetite and review studies that investigate the chemistry of hydrothermal and igneous magnetite from various mineral deposits and their host rocks. Furthermore, we discuss the redox-related alteration of magnetite (martitization and mushketovitization) and mineral inclusions in magnetite and their effect on chemical analyses. Our database includes published and previously unpublished magnetite minor and trace element data for magnetite from (1) banded iron formations (BIF) and related high-grade iron ore deposits in Western Australia, India, and Brazil, (2) Ag–Pb–Zn veins of the Coeur d'Alene district, United States, (3) porphyry Cu–(Au)–(Mo) deposits and associated (4) calcic and magnesian skarn deposits in the southwestern United

  9. Hydrothermal alteration of Hercynian granites, its significance to the evolution of geothermal systems in granitic rocks

    Energy Technology Data Exchange (ETDEWEB)

    Marques, Jose M.; Matias, Maria J.; Basto, Maria J.; Aires-Barros, Luis A. [Instituto Superior Tecnico, Centro de Petrologia e Geoquimica, Universidade Tecnica de Lisboa, Av. Rovisco Pais, 1049-001 Lisbon (Portugal); Carreira, Paula M. [Instituto Tecnologico e Nuclear, Estrada Nacional n 10, 2686 - 953 Sacavem (Portugal); Goff, Fraser E. [Earth and Planetary Sciences Department, Univ. of New Mexico, Albuquerque, NM 87131 (United States)

    2010-06-15

    We discuss geochemical and isotopic ({sup 18}O/{sup 16}O, {sup 2}H/{sup 1}H and {sup 87}Sr/{sup 86}Sr) data recording the hydrothermal alteration of northern Portuguese Hercynian granites by Na-HCO{sub 3}-CO{sub 2}-rich mineral waters. Whole-rock samples from drill cores of Vilarelho da Raia granite have {delta}{sup 18}O values in the +11.47 to +10.10 permille range. The lower values correspond to highly fractured granite samples displaying vein and pervasive alteration. In the pervasive alteration stage, which probably results from a convective hydrothermal system set up by the intrusion of the granites, the metamorphic waters are in equilibrium with hydrous minerals. In contrast, the vein alteration of these granitic rocks was caused by water of meteoric origin. The oxygen ratios between water (W) and rock (R), the so-called W/R ratios, obtained for the open system (where the heated water is lost from the system by escape to the surface) range between 0.05 and 0.11, suggesting that the recrystallization of the veins was influenced by a small flux of meteoric water. Stable isotope analyses performed on the cores show that the vein alteration stage relates to post-emplacement tectonic stresses acting on the granite, probably of late Hercynian age. Our results are consistent with the existence of two separate alteration events (pervasive and vein) caused by hydrothermal waters of different isotopic characteristics. The studies presented in this paper should be viewed as a natural analogue that uses the alteration features observed in a fossil geothermal system at Vilarelho da Raia to assess possible water-rock reactions presently occurring at depth in granitic rocks of the nearby Chaves area. (author)

  10. Carbon dioxide diffuse emission and thermal energy release from hydrothermal systems at Copahue-Caviahue Volcanic Complex (Argentina)

    Science.gov (United States)

    Chiodini, Giovanni; Cardellini, Carlo; Lamberti, María Clara; Agusto, Mariano; Caselli, Alberto; Liccioli, Caterina; Tamburello, Giancarlo; Tassi, Franco; Vaselli, Orlando; Caliro, Stefano

    2015-10-01

    The north-western sector of Caviahue caldera (Argentina), close to the active volcanic system of Copahue, is characterized by the presence of several hydrothermal sites that host numerous fumarolic emissions, anomalous soil diffuse degassing of CO2 and hot soils. In March 2014, measurements of soil CO2 fluxes in 5 of these sites (namely, Las Máquinas, Las Maquinitas I, Las Maquinitas II, Anfiteatro, and Termas de Copahue) allowed an estimation that 165 t of deeply derived CO2 is daily released. The gas source is likely related to a relatively shallow geothermal reservoir containing a single vapor phase as also suggested by both the geochemical data from the 3 deep wells drilled in the 1980s and gas geoindicators applied to the fumarolic discharges. Gas equilibria within the H-C-O gas system indicate the presence of a large, probably unique, single phase vapor zone at 200-210 °C feeding the hydrothermal manifestations of Las Máquinas, Las Maquinitas I and II and Termas de Copahue. A natural thermal release of 107 MW was computed by using CO2 as a tracer of the original vapor phase. The magmatic signature of the incondensable fumarolic gases, the wide expanse of the hydrothermal areas and the remarkable high amount of gas and heat released by fluid expulsion seem to be compatible with an active magmatic intrusion beneath this portion of the Caviahue caldera.

  11. DUMAND data acquisition with triggering

    International Nuclear Information System (INIS)

    Brenner, A.E.; Theriot, D.; March, R.H.

    1980-01-01

    A data acquisition scheme for the standard DUMAND array that includes a simple triggering scheme as a fundamental part of the system is presented. Although there are a number of not yet fully understood parameters, it is assumed that thresholds can be set in such a manner as to give rise to a triggered signal that is not so dominated by randoms that it gives a substantial decrease in the data acquisition rate over that which would be required by a nontriggered system. It is also assumed that the triggering logic is relatively simple and does not need major computational capabilities for a trigger logic decision. With these assumptions, it is possible to generate the trigger at the array and restrict the data transfer to shore. However, with a not unreasonable delay of 200 microseconds, it is even possible to transmit the information for the trigger to shore and perform all that logic on the shore. The critical point is to send the minimum amount of information necessary to construct the trigger such that one need not send all the possible information in all detectors of the array continuously to shore. 1 figure

  12. Triggered Release from Polymer Capsules

    Energy Technology Data Exchange (ETDEWEB)

    Esser-Kahn, Aaron P. [Univ. of Illinois, Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology and Dept. of Chemistry; Odom, Susan A. [Univ. of Illinois, Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology and Dept. of Chemistry; Sottos, Nancy R. [Univ. of Illinois, Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology and Dept. of Materials Science and Engineering; White, Scott R. [Univ. of Illinois, Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology and Dept. of Aerospace Engineering; Moore, Jeffrey S. [Univ. of Illinois, Urbana, IL (United States). Beckman Inst. for Advanced Science and Technology and Dept. of Chemistry

    2011-07-06

    Stimuli-responsive capsules are of interest in drug delivery, fragrance release, food preservation, and self-healing materials. Many methods are used to trigger the release of encapsulated contents. Here we highlight mechanisms for the controlled release of encapsulated cargo that utilize chemical reactions occurring in solid polymeric shell walls. Triggering mechanisms responsible for covalent bond cleavage that result in the release of capsule contents include chemical, biological, light, thermal, magnetic, and electrical stimuli. We present methods for encapsulation and release, triggering methods, and mechanisms and conclude with our opinions on interesting obstacles for chemically induced activation with relevance for controlled release.

  13. Ideas and perspectives: hydrothermally driven redistribution and sequestration of early Archaean biomass - the "hydrothermal pump hypothesis"

    Science.gov (United States)

    Duda, Jan-Peter; Thiel, Volker; Bauersachs, Thorsten; Mißbach, Helge; Reinhardt, Manuel; Schäfer, Nadine; Van Kranendonk, Martin J.; Reitner, Joachim

    2018-03-01

    Archaean hydrothermal chert veins commonly contain abundant organic carbon of uncertain origin (abiotic vs. biotic). In this study, we analysed kerogen contained in a hydrothermal chert vein from the ca. 3.5 Ga Dresser Formation (Pilbara Craton, Western Australia). Catalytic hydropyrolysis (HyPy) of this kerogen yielded n-alkanes up to n-C22, with a sharp decrease in abundance beyond n-C18. This distribution ( ≤ n-C18) is very similar to that observed in HyPy products of recent bacterial biomass, which was used as reference material, whereas it differs markedly from the unimodal distribution of abiotic compounds experimentally formed via Fischer-Tropsch-type synthesis. We therefore propose that the organic matter in the Archaean chert veins has a primarily microbial origin. The microbially derived organic matter accumulated in anoxic aquatic (surface and/or subsurface) environments and was then assimilated, redistributed and sequestered by the hydrothermal fluids (hydrothermal pump hypothesis).

  14. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  15. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  16. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  18. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  19. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  20. Distribution of hydrothermal fluid around the ore body in the subseafloor of the Izena hydrothermal field

    Science.gov (United States)

    Toki, T.; Otake, T.; Ishibashi, J. I.; Matsui, Y.; Kawagucci, S.; Kato, H.; Fuchida, S.; Miyahara, R.; Tsutsumi, A.; Kawakita, R.; Uza, H.; Uehara, R.; Shinjo, R.; Nozaki, T.; Kumagai, H.; Maeda, L.

    2017-12-01

    From 16th November to 15th December 2016, D/V Chikyu drilled the sea bottom around hydrothermal fields at HAKUREI site in the Izena Hole, Okinawa Trough. Site C9025, C9026, C9027, C9028, and C9032 are located along the transect line from the top of the northern mound of HAKUREI site to the eastward, and Site C9030 for the control site is located about 500 m northwest of the mound. Mg concentrations have generally been used to estimate mixing ratios between hydrothermal end-member and seawater in samples from hydrothermal vents. Higher Mg concentrations, however, were detected in the interstitial water than that of seawater, which could be due to artificially dissolution of Mg-bearing minerals that had formed in in-situ environments, when the cored sediments had become cool after their recovery on ship. Similar features were observed with regard to sulfate concentrations, and it suggests that these chemical species are not suitable to estimate quantitatively the contribution of hydrothermally-derived components. In some layers, chloride concentrations were different from that of seawater, indicating that hydrothermal fluids that had been suffered from phase separation flowed into the layers. The deviation, however, was positive or negative relative to that of seawater for an influence of brine or vapor phase, respectively. Therefore chloride concentrations are also not suitable to evaluate a quantitative contribution of hydrothermal end-member. On the other hand, K and B showed only enrichments relative to the seawater, and their highest concentrations are consistent with the reported hydrothermal end-members of each species at HAKUREI site. Using the concentrations of K and B can be evaluated for an influence of hydrothermal components. Furthermore, the headspace gas data are useful in the layers of sulfide minerals and silicified rocks, even though the interstitial waters could not be obtained because of their hardness. Based on these indices, hydrothermal fluids

  1. Treatment of urban sludge by hydrothermal carbonization.

    Science.gov (United States)

    Xu, Xiwei; Jiang, Enchen

    2017-08-01

    Urban sludge was treated by Hydrothermal carbonization (HTC). The effect of hydrothermal carbonization temperature, mixing with or without catalysts on solid products yield, heavy metal contents, turbidity and COD value was evaluated. The result showed solid products yield decreased from 92.04% to 52.65% when the temperature increased from 180 to 300°C. And the Cu, Zn, and Pb contents under exchangeable states decreased and reached discharge standard. Addition of FeCl 3 or Al(OH) 3 resulted in a significant increase in the exchangeable states of Zn, Pb, Cr, and Cd and decrease in their residual states. The turbidity and COD value of hydrothermal liquid decreased from 450° to 175°, and 13 to 6.8g/L, with increasing hydrothermal temperature. Comparison with HTC, solid productivity from low-temperature pyrolysis is higher. The exchangeable states of Cu, Zn, and Cr exceeded the limiting values. Our results show HTC can facilitate transforming urban sludge into no-pollution and energy-rich products. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Hydrothermal Liquefaction of the Microalgae Phaeodactylum tricornutum

    DEFF Research Database (Denmark)

    Sigaard Christensen, Per; Peng, Gaël; Vogel, Frédéric

    2014-01-01

    The microalgae Phaeodactylum tricornutum was processed by hydrothermal liquefaction in order to assess the influence of reaction temperature and reaction time on the product and elemental distribution. The experiments were carried out at different reaction times (5 and 15 min) and over a wide range...

  3. Hydrothermal synthesis, structure and characterization of new ...

    Indian Academy of Sciences (India)

    Unknown

    Keywords. Hydrothermal; crystal structure; solid electrolyte; iron (III) pyrophosphate. 1. Introduction ... tion, structure and electrical conductivity and the higher values of ..... type cavity structure. Acknowledgements. The authors would like to express their thanks to DST,. New Delhi, for financial assistance under the projects.

  4. Hydrothermal synthesis of a new ethylenediammonium intercalated ...

    Indian Academy of Sciences (India)

    Unknown

    Vanadyl phosphate; hydrothermal synthesis; intercalation; single crystal ... presence of 'en'.7–15 In all these solids en molecules occur in suitable ... all the cases, the mixture was transferred to a 45 ml Teflon lined Parr acid digestion .... position cannot be fully occupied at the same time as it will lead to a P-P distance of.

  5. Valorization of Furfural Residue by Hydrothermal Carbonization

    DEFF Research Database (Denmark)

    Yue, Fen; Zhang, Jia; Pedersen, Christian Marcus

    2017-01-01

    Furfural residue (FR) is a low-cost by-product generated in the furfural production from corncobs, which is mainly composed of cellulose and lignin. In this report, hydrothermal carbonization (HTC) of deashed FR was conducted at various reaction temperatures (200, 220 and 240 °C) and reaction times...

  6. Phase Transformation of Hydrothermally Synthesized Nanoparticle ...

    African Journals Online (AJOL)

    Mild hydrothermal hydrolysis of TiCl4 produces nanorods of the rutile phase of titanium dioxide in high yield, while in the presence of organic acids (citric, acetic, D-tartaric and benzoic acids) anatase is the only product. The effect of these organic acids on the products of the hydrolysis reaction as well as the reaction kinetics ...

  7. Combined hydrothermal liquefaction and catalytic hydrothermal gasification system and process for conversion of biomass feedstocks

    Science.gov (United States)

    Elliott, Douglas C.; Neuenschwander, Gary G.; Hart, Todd R.

    2017-09-12

    A combined hydrothermal liquefaction (HTL) and catalytic hydrothermal gasification (CHG) system and process are described that convert various biomass-containing sources into separable bio-oils and aqueous effluents that contain residual organics. Bio-oils may be converted to useful bio-based fuels and other chemical feedstocks. Residual organics in HTL aqueous effluents may be gasified and converted into medium-BTU product gases and directly used for process heating or to provide energy.

  8. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Anhydrite precipitation in seafloor hydrothermal systems

    Science.gov (United States)

    Theissen-Krah, Sonja; Rüpke, Lars H.

    2016-04-01

    The composition and metal concentration of hydrothermal fluids venting at the seafloor is strongly temperature-dependent and fluids above 300°C are required to transport metals to the seafloor (Hannington et al. 2010). Ore-forming hydrothermal systems and high temperature vents in general are often associated with faults and fracture zones, i.e. zones of enhanced permeabilities that act as channels for the uprising hydrothermal fluid (Heinrich & Candela, 2014). Previous numerical models (Jupp and Schultz, 2000; Andersen et al. 2015) however have shown that high permeabilities tend to decrease fluid flow temperatures due to mixing with cold seawater and the resulting high fluid fluxes that lead to short residence times of the fluid near the heat source. A possible mechanism to reduce the permeability and thereby to focus high temperature fluid flow are mineral precipitation reactions that clog the pore space. Anhydrite for example precipitates from seawater if it is heated to temperatures above ~150°C or due to mixing of seawater with hydrothermal fluids that usually have high Calcium concentrations. We have implemented anhydrite reactions (precipitation and dissolution) in our finite element numerical models of hydrothermal circulation. The initial results show that the precipitation of anhydrite efficiently alters the permeability field, which affects the hydrothermal flow field as well as the resulting vent temperatures. C. Andersen et al. (2015), Fault geometry and permeability contrast control vent temperatures at the Logatchev 1 hydrothermal field, Mid-Atlantic Ridge, Geology, 43(1), 51-54. M. D. Hannington et al. (2010), Modern Sea-Floor Massive Sulfides and Base Metal Resources: Toward an Estimate of Global Sea-Floor Massive Sulfide Potential, in The Challenge of Finding New Mineral Resources: Global Metallogeny, Innovative Exploration, and New Discoveries, edited by R. J. Goldfarb, E. E. Marsh and T. Monecke, pp. 317-338, Society of Economic Geologists

  10. Volcano-hydrothermal system and activity of Sirung volcano (Pantar Island, Indonesia)

    Science.gov (United States)

    Caudron, Corentin; Bernard, Alain; Murphy, Sam; Inguaggiato, Salvatore; Gunawan, Hendra

    2018-05-01

    Sirung is a frequently active volcano located in the remote parts of Western Timor (Indonesia). Sirung has a crater with several hydrothermal features including a crater lake. We present a timeseries of satellite images of the lake and chemical and isotope data from the hyperacid hydrothermal system. The fluids sampled in the crater present the typical features of hyperacidic systems with high TDS, low pH and δ34SHSO4-δ34SS0 among the highest for such lakes. The cations concentrations are predominantly controlled by the precipitation of alunite, jarosite, silica phases, native sulfur and pyrite which dominate the shallow portions of the hydrothermal system. These minerals may control shallow sealing processes thought to trigger phreatic eruptions elsewhere. Sparse Mg/Cl and SO4/Cl ratios and lake parameters derived from satellite images suggest gradual increase in heat and gas flux, most likely SO2-rich, prior to the 2012 phreatic eruption. An acidic river was sampled 8 km far from the crater and is genetically linked with the fluids rising toward the active crater. This river would therefore be a relevant target for future remote monitoring purposes. Finally, several wells and springs largely exceeded the World Health Organization toxicity limits in total arsenic and fluoride.

  11. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  12. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  13. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  14. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  15. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  16. The CDF level-3 trigger

    International Nuclear Information System (INIS)

    Devlin, T.

    1993-01-01

    The Collider Detector at Fermilab (CDF) has been operating at the Tevatron and collecting data on proton-antiproton interactions with collision rates above 250,000 Hz. Three levels of filtering select events for data logging at a rate of about 4 Hz. The Level 3 trigger provides most of the capabilities of the offline production programs for event reconstruction and physics analysis. The type of physics triggers, application of cuts, and combinations of logical requirements for event selection are controlled at run time by a trigger table using a syntax fully integrated with the Level 1 and Level 2 hardware triggers. The level 3 software operates in 48 RISC/UNIX processors (over 1000 mips) served by four 20-MByte/sec data buses for input, output and control. The system architecture, debugging, code validation, error reporting, analysis capabilities and performance will be described

  17. Organic sulfur metabolisms in hydrothermal environments.

    Science.gov (United States)

    Rogers, Karyn L; Schulte, Mitchell D

    2012-07-01

    Sulfur is central to the metabolisms of many organisms that inhabit extreme environments. While biotic and abiotic cycling of organic sulfur compounds has been well documented in low-temperature anaerobic environments, cycling of organic sulfur in hydrothermal environments has received less attention. Recently published thermodynamic data have been used to estimate aqueous alkyl thiol and sulfide activities in deep-sea hydrothermal systems. Here we use geochemical mixing models to predict fluid compositions that result from mixing end-member hydrothermal fluid from the East Pacific Rise with bottom seawater. These fluid compositions are combined with estimates of methanethiol and dimethylsulfide activities to evaluate energy yields for potential organic sulfur-based metabolisms under hydrothermal conditions. Aerobic respiration has the highest energy yields (over -240 kJ/mol e⁻) at lower temperature; however, oxygen is unlikely to persist at high temperatures, restricting aerobic respiration to mesophilic communities. Nitrite reduction to N₂ has the highest energy yields at higher temperatures (greater than ∼40 °C). Nitrate and nitrite reduction to ammonium also yield significant energy (up to -70 kJ/mol e⁻). Much lower, but still feasible energy yields are calculated for sulfate reduction, disproportionation, and reduction with H₂. Organic compound family and the activity of methanethiol and dimethylsulfide were less important than metabolic strategy in determining overall energy yields. All metabolic strategies considered were exergonic within some portion of the mixing regime suggesting that organic sulfur-based metabolisms may be prevalent within deep-sea hydrothermal vent microbial communities. © 2012 Blackwell Publishing Ltd.

  18. Voltammetric Investigation Of Hydrothermal Iron Speciation

    Directory of Open Access Journals (Sweden)

    Charlotte eKleint

    2016-05-01

    Full Text Available Hydrothermal vent fluids are highly enriched in iron (Fe compared to ambient seawater, and organic ligands may play a role in facilitating the transport of some hydrothermal Fe into the open ocean. This is important since Fe is a limiting micronutrient for primary production in large parts of the world`s surface ocean. We have investigated the concentration and speciation of Fe in several vent fluid and plume samples from the Nifonea vent field, Coriolis Troughs, New Hebrides Island Arc, South Pacific Ocean using competitive ligand exchange - adsorptive cathodic stripping voltammetry (CLE - AdCSV with salicylaldoxime (SA as the artificial ligand. Our results for total dissolved Fe (dFe in the buoyant hydrothermal plume samples showed concentrations up to 3.86 µM dFe with only a small fraction between 1.1% and 11.8% being chemically labile. Iron binding ligand concentrations ([L] were found in µM level with strong conditional stability constants up to log K[L],Fe3+ of 22.9. Within the non-buoyant hydrothermal plume above the Nifonea vent field, up to 84.7% of the available Fe is chemically labile and [L] concentrations up to 97 nM were measured. [L] was consistently in excess of Felab, indicating that all available Fe is being complexed, which in combination with high Felab values in the non-buoyant plume, signifies that a high fraction of hydrothermal dFe is potentially being transported away from the plume into the surrounding waters, contributing to the global oceanic Fe budget.

  19. Hydrothermal systems in small ocean planets.

    Science.gov (United States)

    Vance, Steve; Harnmeijer, Jelte; Kimura, Jun; Hussmann, Hauke; Demartin, Brian; Brown, J Michael

    2007-12-01

    We examine means for driving hydrothermal activity in extraterrestrial oceans on planets and satellites of less than one Earth mass, with implications for sustaining a low level of biological activity over geological timescales. Assuming ocean planets have olivine-dominated lithospheres, a model for cooling-induced thermal cracking shows how variation in planet size and internal thermal energy may drive variation in the dominant type of hydrothermal system-for example, high or low temperature system or chemically driven system. As radiogenic heating diminishes over time, progressive exposure of new rock continues to the current epoch. Where fluid-rock interactions propagate slowly into a deep brittle layer, thermal energy from serpentinization may be the primary cause of hydrothermal activity in small ocean planets. We show that the time-varying hydrostatic head of a tidally forced ice shell may drive hydrothermal fluid flow through the seafloor, which can generate moderate but potentially important heat through viscous interaction with the matrix of porous seafloor rock. Considering all presently known potential ocean planets-Mars, a number of icy satellites, Pluto, and other trans-neptunian objects-and applying Earth-like material properties and cooling rates, we find depths of circulation are more than an order of magnitude greater than in Earth. In Europa and Enceladus, tidal flexing may drive hydrothermal circulation and, in Europa, may generate heat on the same order as present-day radiogenic heat flux at Earth's surface. In all objects, progressive serpentinization generates heat on a globally averaged basis at a fraction of a percent of present-day radiogenic heating and hydrogen is produced at rates between 10(9) and 10(10) molecules cm(2) s(1).

  20. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  1. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  2. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  3. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  4. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  5. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  6. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  7. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  8. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  9. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  10. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  11. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  12. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  13. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  14. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  15. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  16. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  17. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  18. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  19. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  20. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  1. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  2. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  3. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  4. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  5. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  6. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  7. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  8. Flexible trigger menu implementation on the Global Trigger for the CMS Level-1 trigger upgrade

    CERN Document Server

    Matsushita, Takashi

    2017-01-01

    The CMS experiment at the Large Hadron Collider (LHC) has continued to explore physics at the high-energy frontier in 2016. The integrated luminosity delivered by the LHC in 2016 was 41~fb$^{-1}$ with a peak luminosity of 1.5 $\\times$ 10$^{34}$ cm$^{-2}$s$^{-1}$ and peak mean pile-up of about 50, all exceeding the initial estimations for 2016. The CMS experiment has upgraded its hardware-based Level-1 trigger system to maintain its performance for new physics searches and precision measurements at high luminosities. The Global Trigger is the final step of the CMS \\mbox{Level-1} trigger and implements a trigger menu, a set of selection requirements applied to the final list of objects from calorimeter and muon triggers, for reducing the 40 MHz collision rate to 100 kHz. The Global Trigger has been upgraded with state-of-the-art FPGA processors on Advanced Mezzanine Cards with optical links running at 10 GHz in a MicroTCA crate. The powerful processing resources of the upgraded system enable implemen...

  9. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  10. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  11. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  12. Trigger processing using reconfigurable logic in the CMS calorimeter trigger

    Energy Technology Data Exchange (ETDEWEB)

    Brooke, J J; Cussans, D G; Heath, G P; Maddox, A J; Newbold, D M; Rabbetts, P D

    2001-04-01

    We present the design of the Global Calorimeter Trigger processor for the CMS detector at LHC. This is a fully pipelined processor system which collects data from all the CMS calorimeters and produces summary information used in forming the Level-1 trigger decision for each event. The design in based on the use of state-of-the-art reconfigurable logic devices (FPGAs) and fast data links. We present the results of device testing using a low-latency pipelined sort algorithm, which demonstrate that an FPGA can be used to perform processing previously foreseen to require custom ASICs. Our design approach results in a powerful, flexible and compact processor system.

  13. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  14. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  15. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  16. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  17. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  18. The DOe Silicon Track Trigger

    International Nuclear Information System (INIS)

    Steinbrueck, Georg

    2003-01-01

    We describe a trigger preprocessor to be used by the DOe experiment for selecting events with tracks from the decay of long-lived particles. This Level 2 impact parameter trigger utilizes information from the Silicon Microstrip Tracker to reconstruct tracks with improved spatial and momentum resolutions compared to those obtained by the Level 1 tracking trigger. It is constructed of VME boards with much of the logic existing in programmable processors. A common motherboard provides the I/O infrastructure and three different daughter boards perform the tasks of identifying the roads from the tracking trigger data, finding the clusters in the roads in the silicon detector, and fitting tracks to the clusters. This approach provides flexibility for the design, testing and maintenance phases of the project. The track parameters are provided to the trigger framework in 25 μs. The effective impact parameter resolution for high-momentum tracks is 35 μm, dominated by the size of the Tevatron beam

  19. Review Document: Full Software Trigger

    CERN Document Server

    Albrecht, J; Raven, G

    2014-01-01

    This document presents a trigger system for the upgraded LHCb detector, scheduled to begin operation in 2020. This document serves as input for the internal review towards the "DAQ, online and trigger TDR". The proposed trigger system is implemented entirely in software. In this document we show that track reconstruction of a similar quality to that available in the offline algorithms can be performed on the full inelastic $pp$-collision rate, without prior event selections implemented in custom hardware and without relying upon a partial event reconstruction. A track nding eciency of 98.8 % relative to oine can be achieved for tracks with $p_T >$ 500 MeV/$c$. The CPU time required for this reconstruction is about 40 % of the available budget. Proof-of-principle selections are presented which demonstrate that excellent performance is achievable using an inclusive beauty trigger, in addition to exclusive beauty and charm triggers. Finally, it is shown that exclusive beauty and charm selections that do not intr...

  20. Linking precious metal enrichment and halogen cycling in mafic magmatic systems: insights from the Rum layered intrusion, NW Scotland

    Science.gov (United States)

    Kelly, A. P.; O'Driscoll, B.; Clay, P. L.; Burgess, R.

    2017-12-01

    to the local involvement of an organic-rich sedimentary assimilant and potentially represents an important trigger for PGE-mineralisation. Similarly high I/Cl signatures in some of the late-stage pegmatites suggest that fluids with this distinctive composition circulated the cooling Rum intrusion for a protracted period of time.

  1. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  2. Whole Algae Hydrothermal Liquefaction Technology Pathway

    Energy Technology Data Exchange (ETDEWEB)

    Biddy, Mary J.; Davis, Ryan; Jones, Susanne B.; Zhu, Yunhua

    2013-03-31

    In support of the Bioenergy Technologies Office, the National Renewable Energy Laboratory (NREL) and the Pacific Northwest National Laboratory (PNNL) are undertaking studies of biomass conversion technologies to hydrocarbon fuels to identify barriers and target research toward reducing conversion costs. Process designs and preliminary economic estimates for each of these pathway cases were developed using rigorous modeling tools (Aspen Plus and Chemcad). These analyses incorporated the best information available at the time of development, including data from recent pilot and bench-scale demonstrations, collaborative industrial and academic partners, and published literature and patents. This pathway case investigates the feasibility of using whole wet microalgae as a feedstock for conversion via hydrothermal liquefaction. Technical barriers and key research needs have been assessed in order for the hydrothermal liquefaction of microalgae to be competitive with petroleum-derived gasoline, diesel and jet range blendstocks.

  3. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  4. Hydrothermal optimal power flow using continuation method

    International Nuclear Information System (INIS)

    Raoofat, M.; Seifi, H.

    2001-01-01

    The problem of optimal economic operation of hydrothermal electric power systems is solved using powerful continuation method. While in conventional approach, fixed generation voltages are used to avoid convergence problems, in the algorithm, they are treated as variables so that better solutions can be obtained. The algorithm is tested for a typical 5-bus and 17-bus New Zealand networks. Its capabilities and promising results are assessed

  5. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  6. Hydrothermal treatment of coprecipitated YSZ powders

    International Nuclear Information System (INIS)

    Arakaki, Alexander Rodrigo; Yoshito, Walter Kenji; Ussui, Valter; Lazar, Dolores Ribeiro Ricci

    2009-01-01

    Zirconia stabilized with 8.5 mol% yttria (YSZ) were synthesized by coprecipitation and resulting gels were hydrothermally treated at 200°C and 220 PSI for 4, 8 and 16 hours. Products were oven dried at 70°C for 24 hours, uniaxially pressed as pellets and sintered at 1500 °C for 1 hour. Powders were characterized for surface area with N 2 gas adsorption, X-ray diffraction, laser diffraction granulometric analysis and scanning and transmission electronic microscopy. Density of ceramics was measured by an immersion method based on the Archimedes principle. Results showed that powders dried at 70°C are amorphous and after treatment has tetragonal/cubic symmetry. Surface area of powders presented a significant reduction after hydrothermal treatment. Ceramics prepared from hydrothermally treated powders have higher green density but sintered pellets are less dense when compared to that made with powders calcined at 800°C for 1 hour due to the agglomerate state of powders. Solvothermal treatment is a promising procedure to enhance density. (author)

  7. Chronology of magmatism and mineralization in the Kassandra mining area, Greece: The potentials and limitations of dating hydrothermal illites

    Science.gov (United States)

    Gilg, H. Albert; Frei, Robert

    1994-05-01

    Various geochronological methods ( U/Pb, Rb/Sr, and K/Ar) have been applied to constrain the timing of magmatism and polymetallic mineralization in the Kassandra mining district, northern Greece. These data provide the first geochronological evidence that porphyry copper mineralization, proximal copper skarns, and distal high-temperature carbonate-hosted Pb-Zn-Ag-Au replacement ores formed contemporaneously and probably within less than 2 million years. Polymetallic mineralization is temporally related to the emplacement of granodioritic to quartz dioritic porphyries (24-25 Ma) that postdate the largest post-tectonic intrusion of the area, the Stratoni granodiorite (27.9 ± 1.2 Ma). Andesite porphyry dikes, which crosscut the Pb-Zn-Ag-Au ores and associated alterations, represent the last magmatic phase in the area (19.1 ± 0.6 Ma) and did not contribute to metal concentration. The combination of K/Ar, Rb/Sr, and oxygen isotope studies of hydrothermal illite-rich clays and careful granulometric analysis constrains the reliability of these geochronological methods and emphasizes the importance of characterizing the post-formational history of the sample. We identify various processes which partly disturbed the K/Ar and Rb/Sr system of some clays, such as retrograde alteration by heated meteoric waters, superimposed supergene illitization, and resetting of both isotopic systems due to a hydrothermal overprint related to the intrusion of the andesite porphyry. Our data, however, suggest that diffusive Ar loss from the finest clay fractions ( 200°C), therefore, do not give reliable formation ages. The loss of Ar may be used to model the cooling history of the hydrothermal system applying the concept of closure temperatures ( DODSON, 1973). 40K- 40Ar rad isochrons of natural, coarser grained (> 0.6 μm) size fractions of illites from single samples, even when slightly contaminated with feldspars, may yield meaningful ages either of the formation or of a reheating event

  8. ATLAS FTK Fast Track Trigger

    CERN Document Server

    Iizawa, T; The ATLAS collaboration

    2014-01-01

    The Fast TracKer (FTK) will perform global track reconstruction after each Level-1 trigger accept signal to enable the software-based higher level trigger to have early access to tracking information. FTK is a dedicated processor based on a mixture of advanced technologies. Modern, powerful Field Programmable Gate Arrays (FPGAs) form an important part of the system architecture, and the large level of computing power required for pattern recognition is provided by incorporating standard-cell ASICs named Associative Memory (AM). Motivation and the architecture of the FTK system will be presented, and the status of hardware and simulation will be following.

  9. RPC Trigger Robustness: Status Report

    CERN Document Server

    Di Mattia, A; Nisati, A; Pastore, F; Vari, R; Veneziano, Stefano; Aielli, G; Camarri, P; Cardarelli, R; Di Ciaccio, A; Di Simone, A; Liberti, B; Santonico, R

    2002-01-01

    The present paper describes the Level-1 Barrel Muon Trigger performance as expected with the current configuration of the RPC detectors designed for the Barrel Muon Spectrometer of ATLAS. Results of a beam test performed at the X5-GIF facility at CERN are presented in order to show the trigger efficiency with different conditions of RPC detection efficiency and several background rates. Small (50$\\times$50 cm$^2$) RPC chambers with final Front-end electronics and splitter boards are used in the test, while the coincidence logic is applied off-line using a detailed simulation of the coincidence matrix.

  10. Fast processor for dilepton triggers

    International Nuclear Information System (INIS)

    Katsanevas, S.; Kostarakis, P.; Baltrusaitis, R.

    1983-01-01

    We describe a fast trigger processor, developed for and used in Fermilab experiment E-537, for selecting high-mass dimuon events produced by negative pions and anti-protons. The processor finds candidate tracks by matching hit information received from drift chambers and scintillation counters, and determines their momenta. Invariant masses are calculated for all possible pairs of tracks and an event is accepted if any invariant mass is greater than some preselectable minimum mass. The whole process, accomplished within 5 to 10 microseconds, achieves up to a ten-fold reduction in trigger rate

  11. DT Local Trigger performance in 2015

    CERN Document Server

    CMS Collaboration

    2015-01-01

    The Local Trigger system of the CMS Drift Tube chambers (DT) was checked applying similar methods as in the LHC Run 1 (2012). The main variables shown in this note are the trigger efficiency, the trigger quality and the fraction of trigger ghosts. The performance was found to be comparable or better than in Run 1.

  12. Aftershocks triggered by fluid intrusion: Evidence for the aftershock sequence occurred 2014 in West Bohemia/Vogtland

    Czech Academy of Sciences Publication Activity Database

    Hainzl, S.; Fischer, Tomáš; Čermáková, Hana; Bachura, M.; Vlček, J.

    2016-01-01

    Roč. 121, č. 4 (2016), s. 2575-2590 ISSN 2169-9313 R&D Projects: GA ČR GAP210/12/2336; GA MŠk LM2010008 Institutional support: RVO:67985530 Keywords : pore-pressure diffusion * 2000 earth quake swarm * Vogtland/Western Bohemia Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 3.350, year: 2016

  13. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  14. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  15. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  16. Direct catalytic hydrothermal liquefaction of spirulina to biofuels with hydrogen

    Science.gov (United States)

    Zeng, Qin; Liao, Hansheng; Zhou, Shiqin; Li, Qiuping; Wang, Lu; Yu, Zhihao; Jing, Li

    2018-01-01

    We report herein on acquiring biofuels from direct catalytic hydrothermal liquefaction of spirulina. The component of bio-oil from direct catalytic hydrothermal liquefaction was similar to that from two independent processes (including liquefaction and upgrading of biocrude). However, one step process has higher carbon recovery, due to the less loss of carbons. It was demonstrated that the yield and HHV of bio-oil from direct catalytic algae with hydrothermal condition is higher than that from two independent processes.

  17. The Trigger for Early Running

    CERN Document Server

    The ATLAS Collaboration

    2009-01-01

    The ATLAS trigger and data acquisition system is based on three levels of event selection designed to capture the physics of interest with high efficiency from an initial bunch crossing rate of 40 MHz. The selections in the three trigger levels must provide sufficient rejection to reduce the rate to 200 Hz, compatible with offline computing power and storage capacity. The LHC is expected to begin its operation with a peak luminosity of 10^31 with a relatively small number of bunches, but quickly ramp up to higher luminosities by increasing the number of bunches, and thus the overall interaction rate. Decisions must be taken every 25 ns during normal LHC operations at the design luminosity of 10^34, where the average bunch crossing will contain more than 20 interactions. Hence, trigger selections must be deployed that can adapt to the changing beam conditions while preserving the interesting physics and satisfying varying detector requirements. In this paper, we provide a menu of trigger selections that can be...

  18. The CDF Silicon Vertex Trigger

    International Nuclear Information System (INIS)

    Dell'Orso, Mauro

    2006-01-01

    Motivations, design, performance and ongoing upgrade of the CDF Silicon Vertex Trigger are presented. The system provides CDF with a powerful tool for online tracking with offline quality in order to enhance the reach on B-physics and large P t -physics coupled to b quarks

  19. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  20. Pre-eruption deformation caused by dike intrusion beneath Kizimen volcano, Kamchatka, Russia, observed by InSAR

    Science.gov (United States)

    Ji, Lingyun; Lu, Zhong; Dzurisin, Daniel; Senyukov, Sergey

    2013-01-01

    Interferometric synthetic aperture radar (InSAR) images reveal a pre-eruption deformation signal at Kizimen volcano, Kamchatka, Russia, where an ongoing eruption began in mid-November, 2010. The previous eruption of this basaltic andesite-to-dacite stratovolcano occurred in 1927–1928. InSAR images from both ascending and descending orbital passes of Envisat and ALOS PALSAR satellites show as much as 6 cm of line-of-sight shortening from September 2008 to September 2010 in a broad area centered at Kizimen. About 20 cm of opening of a nearly vertical dike provides an adequate fit to the surface deformation pattern. The model dike is approximately 14 km long, 10 km high, centered 13 km beneath Kizimen, and strikes NE–SW. Time-series analysis of multi-temporal interferograms indicates that (1) intrusion started sometime between late 2008 and July 2009, (2) continued at a nearly constant rate, and (3) resulted in a volume expansion of 3.2 × 107 m3 by September 2010, i.e., about two months before the onset of the 2010 eruption. Earthquakes located above the tip of the dike accompanied the intrusion. Eventually, magma pressure in the dike exceeded the confining strength of the host rock, triggering the 2010 eruption. Our results provide insight into the intrusion process that preceded an explosive eruption at a Pacific Rim stratovolcano following nearly a century of quiescence, and therefore have implications for monitoring and hazards assessment at similar volcanoes elsewhere.

  1. Cuprous oxide thin films grown by hydrothermal electrochemical deposition technique

    International Nuclear Information System (INIS)

    Majumder, M.; Biswas, I.; Pujaru, S.; Chakraborty, A.K.

    2015-01-01

    Semiconducting cuprous oxide films were grown by a hydrothermal electro-deposition technique on metal (Cu) and glass (ITO) substrates between 60 °C and 100 °C. X-ray diffraction studies reveal the formation of cubic cuprous oxide films in different preferred orientations depending upon the deposition technique used. Film growth, uniformity, grain size, optical band gap and photoelectrochemical response were found to improve in the hydrothermal electrochemical deposition technique. - Highlights: • Cu 2 O thin films were grown on Cu and glass substrates. • Conventional and hydrothermal electrochemical deposition techniques were used. • Hydrothermal electrochemical growth showed improved morphology, thickness and optical band gap

  2. Mineralogical and Geochemical Characterization of the Kimmeria Intrusion-Related Deposit, Xanthi, NE Greece

    Science.gov (United States)

    Theodoridou, Stella; Melfos, Vasilios; Voudouris, Panagiotis; Miskovic, Aleksandar

    2016-04-01

    Although intrusion-related systems have not been previously recognized in the European segment of the Tethyan Metallogenic Belt, the Rhodope metallogenic province of SE Balkan peninsula hosts numerous such occurrences. The Kimmeria hydrothermal system incorporates two styles of ore mineralization: i) a massive Au-bearing magnetite-pyrrhotite skarn and ii) a Mo-Cu-Bi-W quartz vein-hosted mineralization, both of which are related to the Oligocene Xanthi pluton (25.5±1.2 to 30±1 My, K-Ar in hornblende and biotite). The Xanthi pluton, consisting of I-type gabbros, monzonites and amphibole-biotite granodiorites, intrudes the basement gneisses, mica schists, amphibolites and marbles of the Southern Rhodope Core Complex; a dome that has gradually exhumed from Paleocene/mid Eocene to Miocene (starting between 65 and >42 to 10 My). The Xanthi pluton emplacement and the magmatically derived hydrothermal fluid circulation were controlled by two major regional structures: the low-angle Kavala-Xanthi-Komotini detachment fault and the Nestos thrust fault. The Kimmeria Au-Cu-Fe skarn mineralization features a well-preserved aureole at the contact between the granodiorite and the surrounding marbles. It consists of two paragenetic stages comprising magnetite and pyrrhotite-rich assemblages. Alteration minerals comprise chlorite and sericite. Bulk chemical analyses of the skarn mineralization revealed relatively high concentration of Cu (1 wt.%), Pb (288 ppm) and Zn (0.74 wt.%). The mineralization is also enriched in As (molybdenite as dominant sulfides. Minor sphalerite, tetrahedrite-tennantite, galena and rutile are also present, while sericite and chlorite as the alteration minerals. The Cu and Mo content of the vein type mineralization exceed 1.0 and 0.2 wt.% respectively, along with < 2.7 ppm Au, 1.3 to 79.5 ppm W and 0.6 to 456 ppm Bi. A first approach fluid study has revealed small variations in δ34S values of sulfides (0 - 2.3 ‰ VCDT) from both types of mineralization

  3. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  4. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  5. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  6. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  7. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  8. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  9. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  10. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  11. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  12. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  13. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  14. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  15. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  16. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  17. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  18. Geology, mineralization, U-Pb dating and Sr-Nd isotope geochemistry of intrusive bodies in northeast of Kashmar

    Directory of Open Access Journals (Sweden)

    Alireza Almasi

    2015-04-01

    similar scenario to Neotethys subduction. Khaf-Kashmar-Bardeskan volcano-plutonic belt is located between Neotethys suture and Alborz- Sabzevar Back- arc (Asiabanha and Foden, 2012. We suggest Khaf-Kashmar-Bardeskan volcano-plutonic belt forms at the arc-parallel fault and shear zones in the back of continental magmatic arc. In the basis of all evidences (Shear zone system, high-K to shoshonitic calc-alkaline I- and A-type magmatism, typical alterations related to upper zones of IOCG deposits and IOCG mineralization, we suggest IOCG (Au-Cu mineralization in Kashmar. Discussion On the basis of former regional (Muller and Walter, 1983 and local structural studies (this research, regional compression causes sinistral strike-slip movements of Dorouneh and Taknar faults, shear zone, pull-apart and Riedel fractures (P, R and R' types in the study area. These events cause magma intrusion and circulation of hydrothermal fluids. On the basis of geology, geochemistry and magnetic susceptibility measuring of intrusive rocks, several high K to shoshonitic calc-alkaline to alkaline I-type and one A-type intrusive rocks are intruded in Kashmar area. Swarm dykes are the youngest and the agent for alteration and mineralization. U-Pb dating related to quartz monzonite body (preventative sample for I-type intrusive rocks which are older than A-type series show 40 Ma (Middle Eocene for this rock group in Kashmar. The mean of initial 87Sr/86Sr and 143Nd/144Nd are 0.705-0.707 and 0.5135-0.5126 for I-type series, respectively. εNd(i amounts for I-type series are in negative to positive limit ranges (-1.65 to 1.33. These amounts show subduction source with contamination to continental crust. Two type alteration and mineralization occur in Kashmar: 1 primary alterations (advanced argillic+ sericite+ silicification which are synchronous with sulfide base-metal veins (chalcopyrite+ pyrite± galena± quartz± chloride and 2 Lateral alterations (carbonatization+ Fe-oxides+ silicification

  19. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  20. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  1. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  2. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  3. Controls on thallium uptake during hydrothermal alteration of the upper ocean crust

    Science.gov (United States)

    Coggon, Rosalind M.; Rehkämper, Mark; Atteck, Charlotte; Teagle, Damon A. H.; Alt, Jeffrey C.; Cooper, Matthew J.

    2014-11-01

    Hydrothermal circulation is a fundamental component of global biogeochemical cycles. However, the magnitude of the high temperature axial hydrothermal fluid flux remains disputed, and the lower temperature ridge flank fluid flux is difficult to quantify. Thallium (Tl) isotopes behave differently in axial compared to ridge flank systems, with Tl near-quantitatively stripped from the intrusive crust by high temperature hydrothermal reactions, but added to the lavas during low temperature reaction with seawater. This contrasting behavior provides a unique approach to determine the fluid fluxes associated with axial and ridge flank environments. Unfortunately, our understanding of the Tl isotopic mass balance is hindered by poor knowledge of the mineralogical, physical and chemical controls on Tl-uptake by the ocean crust. Here we use analyses of basaltic volcanic upper crust from Integrated Ocean Drilling Program Hole U1301B on the Juan de Fuca Ridge flank, combined with published analyses of dredged seafloor basalts and upper crustal basalts from Holes 504B and 896A, to investigate the controls on Tl-uptake by mid-ocean ridge basalts and evaluate when in the evolution of the ridge flank hydrothermal system Tl-uptake occurs. Seafloor basalts indicate an association between basaltic uptake of Tl from cold seawater and uptake of Cs and Rb, which are known to partition into K-rich phases. Although there is no clear relationship between Tl and K contents of seafloor basalts, the data do not rule out the incorporation of at least some Tl into the same minerals as the alkali elements. In contrast, we find no relationship between the Tl content and either the abundance of secondary phyllosilicate minerals, or the K, Cs or Rb contents in upper crustal basalts. We conclude that the uptake of Tl and alkali elements during hydrothermal alteration of the upper crust involves different processes and/or mineral phases compared to those that govern seafloor weathering. Furthermore

  4. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  5. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  6. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  7. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  8. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  9. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  10. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  11. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  12. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  13. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  14. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  15. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  16. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  17. Volcano-tectonic earthquakes: A new tool for estimating intrusive volumes and forecasting eruptions

    Science.gov (United States)

    White, Randall; McCausland, Wendy

    2016-01-01

    , the intruded magma volume can be quickly and easily estimated with few short-period seismic stations. Notable cases in which distal VT events preceded eruptions at long-dormant volcanoes include: Nevado del Ruiz (1984-1985), Pinatubo (1991), Unzen (1989-1995), Soufriere Hills (1995), Shishaldin (1989-1999), Tacana' (1985-1986), Pacaya (1980-1984), Rabaul (1994), and Cotopaxi (2001). Additional cases are recognized at frequently active volcanoes including Popocateptl (2001-2003) and Mauna Loa (1984). We present four case studies (Pinatubo, Soufriere Hills, Unzen, and Tacana') in which we demonstrate the above mentioned VT characteristics prior to eruptions. Using regional data recorded by NEIC, we recognized in near-real time that a huge distal VT swarm was occurring, deduced that a proportionately huge magmatic intrusion was taking place beneath the long dormant Sulu Range, New Britain Island, Papua New Guinea, that it was likely to lead to eruptive activity, and warned Rabaul Volcano Observatory days before a phreatic eruption occurred. This confirms the value of this technique for eruption forecasting. We also present a counter-example where we deduced that a VT swarm at Volcan Cosiguina, Nicaragua, indicated a small intrusion, insufficient to reach the surface and erupt. Finally, we discuss limitations of the method and propose a mechanism by which this distal VT seismicity is triggered by magmatic intrusion.

  18. Uranium metallogenesis of the peraluminous leucogranite from the Pontivy-Rostrenen magmatic complex (French Armorican Variscan belt): the result of long-term oxidized hydrothermal alteration during strike-slip deformation

    Science.gov (United States)

    Ballouard, C.; Poujol, M.; Mercadier, J.; Deloule, E.; Boulvais, P.; Baele, J. M.; Cuney, M.; Cathelineau, M.

    2018-06-01

    In the French Armorican Variscan belt, most of the economically significant hydrothermal U deposits are spatially associated with peraluminous leucogranites emplaced along the south Armorican shear zone (SASZ), a dextral lithospheric scale wrench fault that recorded ductile deformation from ca. 315 to 300 Ma. In the Pontivy-Rostrenen complex, a composite intrusion, the U mineralization is spatially associated with brittle structures related to deformation along the SASZ. In contrast to monzogranite and quartz monzodiorite (3 3), the leucogranite samples are characterized by highly variable U contents ( 3 to 27 ppm) and Th/U ratios ( 0.1 to 5) suggesting that the crystallization of magmatic uranium oxide in the more evolved facies was followed by uranium oxide leaching during hydrothermal alteration and/or surface weathering. U-Pb dating of uranium oxides from the deposits reveals that they mostly formed between ca. 300 and 270 Ma. In monzogranite and quartz monzodiorite, apatite grains display magmatic textures and provide U-Pb ages of ca. 315 Ma reflecting the time of emplacement of the intrusions. In contrast, apatite grains from the leucogranite display textural, geochemical, and geochronological evidences for interaction with U-rich oxidized hydrothermal fluids contemporaneously with U mineralizing events. From 300 to 270 Ma, infiltration of surface-derived oxidized fluids leached magmatic uranium oxide from fertile leucogranite and formed U deposits. This phenomenon was sustained by brittle deformation and by the persistence of thermal anomalies associated with U-rich granitic bodies.

  19. Hydrothermal germination models: Improving experimental efficiency by limiting data collection to the relevant hydrothermal range

    Science.gov (United States)

    Hydrothermal models used to predict germination response in the field are usually parameterized with data from laboratory experiments that examine the full range of germination response to temperature and water potential. Inclusion of low water potential and high and low-temperature treatments, how...

  20. Statistical Analysis and ETAS Modeling of Seismicity Induced by Production of Geothermal Energy from Hydrothermal Systems

    Science.gov (United States)

    Dinske, C.; Langenbruch, C.; Shapiro, S. A.

    2017-12-01

    We investigate seismicity related to hydrothermal systems in Germany and Italy, focussing on temporal changes of seismicity rates. Our analysis was motivated by numerical simulations The modeling of stress changes caused by the injection and production of fluid revealed that seismicity rates decrease on a long-term perspective which is not observed in the considered case studies. We analyze the waiting time distributions of the seismic events in both time domain (inter event times) and fluid volume domain (inter event volume). We find clear indications that the observed seismicity comprises two components: (1) seismicity that is directly triggered by production and re-injection of fluid, i.e. induced events, and (2) seismicity that is triggered by earthquake interactions, i.e. aftershock triggering. In order to better constrain our numerical simulations using the observed induced seismicity we apply catalog declustering to seperate the two components. We use the magnitude-dependent space-time windowing approach introduced by Gardner and Knopoff (1974) and test several published algorithms to calculate the space-time windows. After declustering, we conclude that the different hydrothermal reservoirs show a comparable seismic response to the circulation of fluid and additional triggering by earthquake interactions. The declustered catalogs contain approximately 50 per cent of the number of events in the original catalogs. We then perform ETAS (Epidemic Type Aftershock; Ogata, 1986, 1988) modeling for two reasons. First, we want to know whether the different reservoirs are also comparable regarding earthquake interaction patterns. Second, if we identify systematic patterns, ETAS modeling can contribute to forecast seismicity during production of geothermal energy. We find that stationary ETAS models cannot accurately capture real seismicity rate changes. One reason for this finding is given by the rate of observed induced events which is not constant over time. Hence

  1. Hydrothermal synthesis of hexagonal magnesium hydroxide nanoflakes

    International Nuclear Information System (INIS)

    Wang, Qiang; Li, Chunhong; Guo, Ming; Sun, Lingna; Hu, Changwen

    2014-01-01

    Graphical abstract: Hexagonal Mg(OH) 2 nanoflakes were synthesized via hydrothermal method in the presence of PEG-20,000. Results show that PEG-20,000 plays an important role in the formation of this kind of nanostructure. The SAED patterns taken from the different positions on a single hexagonal Mg(OH) 2 nanoflake yielded different crystalline structures. The structure of the nanoflakes are polycrystalline and the probable formation mechanism of Mg(OH) 2 nanoflakes is discussed. - Highlights: • Hexagonal Mg(OH) 2 nanoflakes were synthesized via hydrothermal method. • PEG-20,000 plays an important role in the formation of hexagonal nanostructure. • Mg(OH) 2 nanoflakes show different crystalline structures at different positions. • The probable formation mechanism of hexagonal Mg(OH) 2 nanoflakes was reported. - Abstract: Hexagonal magnesium hydroxide (Mg(OH) 2 ) nanoflakes were successfully synthesized via hydrothermal method in the presence of the surfactant polyethylene glycol 20,000 (PEG-20,000). Results show that PEG-20,000 plays an important role in the formation of this kind of nanostructure. The composition, morphologies and structure of the Mg(OH) 2 nanoflakes were characterized by X-ray diffraction (XRD), field-emission scanning electron microscopy (FE-SEM), high-resolution transmission electron microscopy (HRTEM), and selected area electron diffraction (SAED). The SAED patterns taken from the different positions on a single hexagonal Mg(OH) 2 nanoflake show different crystalline structures. The structure of the nanoflakes are polycrystalline and the probable formation mechanism of Mg(OH) 2 nanoflakes is discussed. Brunauer–Emmett–Teller (BET) analysis were performed to investigate the porous structure and surface area of the as-obtained nanoflakes

  2. Borehole plugging by hydrothermal transport. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Roy, D.M.; White, W.B.

    1976-02-28

    Calcium silicate--and aluminosilicate--compositions based on mixtures of fine grained quartz with various cements or calcium silicate compounds have been investigated under hydrothermal conditions in the temperature range 110-250/sup 0/C and pressure range 1,000-10,000 psi, pressures which are always in excess of that required to maintain liquid H/sub 2/O, and approximate the confining pressures which might be anticipated in deep boreholes. All silicate cement combinations investigated produce materials having adequate strength after reaction times of 1 day or longer. The calcium aluminate cement was also adequate with respect to strength but would need to be investigated more extensively for overall properties because of its highly reactive chemistry. The mini-rock cylinder-cement plug hydrothermal experiments in both limestone and sandstone resulted in reasonable magnitudes of bonding strength. The typical shear strength of a hydrothermally treated cement-sandstone plug is 1030 psi, and the compressive strength of the extruded cement plug is 9550 psi. Reactions having a potential for producing calcium carbonate plugs in holes drilled in carbonate rocks were studied. It should be noted that most cements are calcium silicate systems and are chemically compatible with the CaCO/sub 3/ and CaMg(CO/sub 3/)/sub 2/ in the rock walls of the hole. A side benefit from this research is some insight into the suitability of massive carbonate rocks as disposal sites. Carbonate rocks by themselves are highly impermeable, have low exchange capacity, and a low water content--all properties that are desirable in the storage medium. A major drawback is the presence of secondary permeability in the form of solutionally modified joints, fractures, and bedding planes.

  3. Borehole plugging by hydrothermal transport. Final report

    International Nuclear Information System (INIS)

    Roy, D.M.; White, W.B.

    1976-01-01

    Calcium silicate--and aluminosilicate--compositions based on mixtures of fine grained quartz with various cements or calcium silicate compounds have been investigated under hydrothermal conditions in the temperature range 110-250 0 C and pressure range 1,000-10,000 psi, pressures which are always in excess of that required to maintain liquid H 2 O, and approximate the confining pressures which might be anticipated in deep boreholes. All silicate cement combinations investigated produce materials having adequate strength after reaction times of 1 day or longer. The calcium aluminate cement was also adequate with respect to strength but would need to be investigated more extensively for overall properties because of its highly reactive chemistry. The mini-rock cylinder-cement plug hydrothermal experiments in both limestone and sandstone resulted in reasonable magnitudes of bonding strength. The typical shear strength of a hydrothermally treated cement-sandstone plug is 1030 psi, and the compressive strength of the extruded cement plug is 9550 psi. Reactions having a potential for producing calcium carbonate plugs in holes drilled in carbonate rocks were studied. It should be noted that most cements are calcium silicate systems and are chemically compatible with the CaCO 3 and CaMg(CO 3 ) 2 in the rock walls of the hole. A side benefit from this research is some insight into the suitability of massive carbonate rocks as disposal sites. Carbonate rocks by themselves are highly impermeable, have low exchange capacity, and a low water content--all properties that are desirable in the storage medium. A major drawback is the presence of secondary permeability in the form of solutionally modified joints, fractures, and bedding planes

  4. Magma degassing triggered by static decompression at Kīlauea Volcano, Hawai‘i

    Science.gov (United States)

    Poland, Michael P.; Jeff, Sutton A.; Gerlach, Terrence M.

    2009-01-01

    During mid-June 2007, the summit of Kīlauea Volcano, Hawai‘i, deflated rapidly as magma drained from the subsurface to feed an east rift zone intrusion and eruption. Coincident with the deflation, summit SO2 emission rates rose by a factor of four before decaying to background levels over several weeks. We propose that SO2 release was triggered by static decompression caused by magma withdrawal from Kīlauea's shallow summit reservoir. Models of the deflation suggest a pressure drop of 0.5–3 MPa, which is sufficient to trigger exsolution of the observed excess SO2 from a relatively small volume of magma at the modeled source depth beneath Kīlauea's summit. Static decompression may also explain other episodes of deflation accompanied by heightened gas emission, including the precursory phases of Kīlauea's 2008 summit eruption. Hazards associated with unexpected volcanic gas emission argue for increased awareness of magma reservoir pressure fluctuations.

  5. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  6. Hydrothermal Liquefaction Treatment Preliminary Hazard Analysis Report

    Energy Technology Data Exchange (ETDEWEB)

    Lowry, Peter P.; Wagner, Katie A.

    2015-08-31

    A preliminary hazard assessment was completed during February 2015 to evaluate the conceptual design of the modular hydrothermal liquefaction treatment system. The hazard assessment was performed in 2 stages. An initial assessment utilizing Hazard Identification and Preliminary Hazards Analysis (PHA) techniques identified areas with significant or unique hazards (process safety-related hazards) that fall outside of the normal operating envelope of PNNL and warranted additional analysis. The subsequent assessment was based on a qualitative What-If analysis. This analysis was augmented, as necessary, by additional quantitative analysis for scenarios involving a release of hazardous material or energy with the potential for affecting the public.

  7. Vertical Cable Seismic Survey for Hydrothermal Deposit

    Science.gov (United States)

    Asakawa, E.; Murakami, F.; Sekino, Y.; Okamoto, T.; Ishikawa, K.; Tsukahara, H.; Shimura, T.

    2012-04-01

    The vertical cable seismic is one of the reflection seismic methods. It uses hydrophone arrays vertically moored from the seafloor to record acoustic waves generated by surface, deep-towed or ocean bottom sources. Analyzing the reflections from the sub-seabed, we could look into the subsurface structure. This type of survey is generally called VCS (Vertical Cable Seismic). Because VCS is an efficient high-resolution 3D seismic survey method for a spatially-bounded area, we proposed the method for the hydrothermal deposit survey tool development program that the Ministry of Education, Culture, Sports, Science and Technology (MEXT) started in 2009. We are now developing a VCS system, including not only data acquisition hardware but data processing and analysis technique. Our first experiment of VCS surveys has been carried out in Lake Biwa, JAPAN in November 2009 for a feasibility study. Prestack depth migration is applied to the 3D VCS data to obtain a high quality 3D depth volume. Based on the results from the feasibility study, we have developed two autonomous recording VCS systems. After we carried out a trial experiment in the actual ocean at a water depth of about 400m and we carried out the second VCS survey at Iheya Knoll with a deep-towed source. In this survey, we could establish the procedures for the deployment/recovery of the system and could examine the locations and the fluctuations of the vertical cables at a water depth of around 1000m. The acquired VCS data clearly shows the reflections from the sub-seafloor. Through the experiment, we could confirm that our VCS system works well even in the severe circumstances around the locations of seafloor hydrothermal deposits. We have, however, also confirmed that the uncertainty in the locations of the source and of the hydrophones could lower the quality of subsurface image. It is, therefore, strongly necessary to develop a total survey system that assures a accurate positioning and a deployment techniques

  8. Magmatic-hydrothermal fluid evolution of the Dalli porphyry Cu-Au deposit; using Amphibole and Plagioclas mineral chemistry

    Directory of Open Access Journals (Sweden)

    Houshang Pourkaseb

    2017-07-01

    Full Text Available Introduction The formation of porphyry copper deposits is attributed to the shallow emplacement, and subsequent cooling of the hydrothermal system of porphyritic intrusive rocks (Titley and Bean, 1981. These deposits have usually been developed along the chain of subduction-related volcanic and calc-alkalin batholiths (Sillitoe, 2010. Nevertheless, it is now confirmed that porphyry copper systems can also form in collisional and post collisional settings (Zarasvandi et al., 2015b. Detailed studies on the geochemical features of ore-hosting porphyry Cu-Mo-Au intrusions indicate that they are generally adakitic, water and sulfur- riched, and oxidized (Wang et al., 2014. For example, high oxygen fugacity of magma has decisive role in transmission of copper and gold to the porphyry systems as revealed in (Wang et al., 2014. In this regard, the present work deals with the mineral chemistry of amphibole and plagioclase in the Dalli porphyry Cu-Au deposit. The data is used to achieve the physical and chemical conditions of magma and its impact on mineralization. Moreover, the results of previous studies on the hydrothermal system of the Dalli deposit such as Raman laser spectroscopy and fluid inclusion studies are included for determination of the evolution from magmatic to hydrothermal conditions. Materials and methods In order to correctly characterize the physical and chemical conditions affecting the trend of mineralization, 20 least altered and fractured samples of diorite and quartz-diorite intrusions were chosen from boreholes. Subsequently, 20 thin-polished sections were prepared in the Shahid Chamran University of Ahvaz. Finally, mineral chemistry of amphibole and plagioclase were determined using electron micro probe analyses (EMPA in the central lab of the Leoben University. Results Amphibole that is one of the the main rock-forming minerals can form in a wide variety of igneous and metamorphic rocks. Accordingly, amphibole chemistry can be

  9. Triggers in UA2 and UA1

    International Nuclear Information System (INIS)

    Dorenbosch, J.

    1985-01-01

    The UA2 and UA1 trigger systems are described as they will be used after the upgrade of the CERN SPPS. The luminosity of the collider will increase to 3x10 30 . The bunch spacing is 4 microseconds, comparable to the time available for a second level trigger at the SSC. The first level triggers are very powerful and deliver trigger rates of about 100 Hz. The UA1 second level trigger operates on the final digitizings with a combination of special and general purpose processors. At the highest trigger levels a small farm of processors performs the final reduction. (orig.)

  10. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  11. Hydrothermal alteration in oceanic ridge volcanics: A detailed study at the Galapagos Fossil Hydrothermal Field

    Science.gov (United States)

    Ridley, W.I.; Perfit, M.R.; Josnasson, I.R.; Smith, M.F.

    1994-01-01

    The Galapagos Fossil Hydrothermal Field is composed of altered oceanic crust and extinct hydrothermal vents within the eastern Galapagos Rift between 85??49???W and 85??55???W. The discharge zone of the hydrothermal system is revealed along scarps, thus providing an opportunity to examine the uppermost mineralized, and highly altered interior parts of the crust. Altered rocks collected in situ by the submersible ALVIN show complex concentric alteration zones. Microsamples of individual zones have been analysed for major/minor, trace elements, and strontium isotopes in order to describe the complex compositional details of the hydrothermal alteration. Interlayered chlorite-smectite and chlorite with disequilibrium compositions dominate the secondary mineralogy as replacement phases of primary glass and acicular pyroxene. Phenocrysts and matrix grains of plagioclase are unaffected during alteration. Using a modification of the Gresens' equation we demonstrate that the trivalent rare earth elements (REEs) are relatively immobile, and calculate degrees of enrichment and depletion in other elements. Strontium isotopic ratios increase as Sr concentrations decrease from least-altered cores to most-altered rims and cross-cutting veins in individual samples, and can be modeled by open system behaviour under low fluid-rock ratio (< 10) conditions following a period of lower-temperature weathering of volcanics within the rift zone. The complex patterns of element enrichment and depletion and strontium isotope variations indicate mixing between pristine seawater and ascending hot fluids to produce a compositional spectrum of fluids. The precipitation of base-metal sulfides beneath the seafloor is probably a result of fluid mixing and cooling. If, as suggested here, the discharge zone alteration occurred under relatively low fluid-rock ratios, then this shallow region must play an important role in determining the exit composition of vent fluids in marine hydrothermal systems

  12. Muon Trigger for Mobile Phones

    Science.gov (United States)

    Borisyak, M.; Usvyatsov, M.; Mulhearn, M.; Shimmin, C.; Ustyuzhanin, A.

    2017-10-01

    The CRAYFIS experiment proposes to use privately owned mobile phones as a ground detector array for Ultra High Energy Cosmic Rays. Upon interacting with Earth’s atmosphere, these events produce extensive particle showers which can be detected by cameras on mobile phones. A typical shower contains minimally-ionizing particles such as muons. As these particles interact with CMOS image sensors, they may leave tracks of faintly-activated pixels that are sometimes hard to distinguish from random detector noise. Triggers that rely on the presence of very bright pixels within an image frame are not efficient in this case. We present a trigger algorithm based on Convolutional Neural Networks which selects images containing such tracks and are evaluated in a lazy manner: the response of each successive layer is computed only if activation of the current layer satisfies a continuation criterion. Usage of neural networks increases the sensitivity considerably comparable with image thresholding, while the lazy evaluation allows for execution of the trigger under the limited computational power of mobile phones.

  13. Stimulus conflict triggers behavioral avoidance.

    Science.gov (United States)

    Dignath, David; Eder, Andreas B

    2015-12-01

    According to a recent extension of the conflict-monitoring theory, conflict between two competing response tendencies is registered as an aversive event and triggers a motivation to avoid the source of conflict. In the present study, we tested this assumption. Over five experiments, we examined whether conflict is associated with an avoidance motivation and whether stimulus conflict or response conflict triggers an avoidance tendency. Participants first performed a color Stroop task. In a subsequent motivation test, participants responded to Stroop stimuli with approach- and avoidance-related lever movements. These results showed that Stroop-conflict stimuli increased the frequency of avoidance responses in a free-choice motivation test, and also increased the speed of avoidance relative to approach responses in a forced-choice test. High and low proportions of response conflict in the Stroop task had no effect on avoidance in the motivation test. Avoidance of conflict was, however, obtained even with new conflict stimuli that had not been presented before in a Stroop task, and when the Stroop task was replaced with an unrelated filler task. Taken together, these results suggest that stimulus conflict is sufficient to trigger avoidance.

  14. Industrial accidents triggered by lightning.

    Science.gov (United States)

    Renni, Elisabetta; Krausmann, Elisabeth; Cozzani, Valerio

    2010-12-15

    Natural disasters can cause major accidents in chemical facilities where they can lead to the release of hazardous materials which in turn can result in fires, explosions or toxic dispersion. Lightning strikes are the most frequent cause of major accidents triggered by natural events. In order to contribute towards the development of a quantitative approach for assessing lightning risk at industrial facilities, lightning-triggered accident case histories were retrieved from the major industrial accident databases and analysed to extract information on types of vulnerable equipment, failure dynamics and damage states, as well as on the final consequences of the event. The most vulnerable category of equipment is storage tanks. Lightning damage is incurred by immediate ignition, electrical and electronic systems failure or structural damage with subsequent release. Toxic releases and tank fires tend to be the most common scenarios associated with lightning strikes. Oil, diesel and gasoline are the substances most frequently released during lightning-triggered Natech accidents. Copyright © 2010 Elsevier B.V. All rights reserved.

  15. The UA1 trigger processor

    International Nuclear Information System (INIS)

    Grayer, G.H.

    1981-01-01

    Experiment UA1 is a large multi-purpose spectrometer at the CERN proton-antiproton collider, scheduled for late 1981. The principal trigger is formed on the basis of the energy deposition in calorimeters. A trigger decision taken in under 2.4 microseconds can avoid dead time losses due to the bunched nature of the beam. To achieve this we have built fast 8-bit charge to digital converters followed by two identical digital processors tailored to the experiment. The outputs of groups of the 2440 photomultipliers in the calorimeters are summed to form a total of 288 input channels to the ADCs. A look-up table in RAM is used to convert the digitised photomultiplier signals to energy in one processor, combinations of input channels, and also counts the number of clusters with electromagnetic or hadronic energy above pre-determined levels. Up to twelve combinations of these conditions, together with external information, may be combined in coincidence or in veto to form the final trigger. Provision has been made for testing using simulated data in an off-line mode, and sampling real data when on-line. (orig.)

  16. ATLAS Level-1 Topological Trigger

    CERN Document Server

    Zheng, Daniel; The ATLAS collaboration

    2018-01-01

    The ATLAS experiment has introduced and recently commissioned a completely new hardware sub-system of its first-level trigger: the topological processor (L1Topo). L1Topo consist of two AdvancedTCA blades mounting state-of-the-art FPGA processors, providing high input bandwidth (up to 4 Gb/s) and low latency data processing (200 ns). L1Topo is able to select collision events by applying kinematic and topological requirements on candidate objects (energy clusters, jets, and muons) measured by calorimeters and muon sub-detectors. Results from data recorded using the L1Topo trigger will be presented. These results demonstrate a significantly improved background event rejection, thus allowing for a rate reduction without efficiency loss. This improvement has been shown for several physics processes leading to low-pT leptons, including H->tau tau and J/Psi->mu mu. In addition to describing the L1Topo trigger system, we will discuss the use of an accurate L1Topo simulation as a powerful tool to validate and optimize...

  17. ATLAS FTK: Fast Track Trigger

    CERN Document Server

    Volpi, Guido; The ATLAS collaboration

    2015-01-01

    An overview of the ATLAS Fast Tracker processor is presented, reporting the design of the system, its expected performance, and the integration status. The next LHC runs, with a significant increase in instantaneous luminosity, will provide a big challenge to the trigger and data acquisition systems of all the experiments. An intensive use of the tracking information at the trigger level will be important to keep high efficiency in interesting events, despite the increase in multiple p-p collisions per bunch crossing (pile-up). In order to increase the use of tracks within the High Level Trigger (HLT), the ATLAS experiment planned the installation of an hardware processor dedicated to tracking: the Fast TracKer (FTK) processor. The FTK is designed to perform full scan track reconstruction at every Level-1 accept. To achieve this goal, the FTK uses a fully parallel architecture, with algorithms designed to exploit the computing power of custom VLSI chips, the Associative Memory, as well as modern FPGAs. The FT...

  18. The 2006 Eruption of Raoul Volcano (Kermadecs): A Phreato-magmatic Event From a Hydrothermally-Sealed Volcanic Conduit System.

    Science.gov (United States)

    Christenson, B. W.; Reyes, A. G.; Werner, C. A.

    2006-12-01

    The March 17, 2006 eruption from Raoul volcano (Kermadec Islands, NZ), which tragically claimed the life of NZ Department of Conservation staff member Mark Kearney, is being interpreted as a magmatic-hydrothermal event triggered by shaking associated with regional earthquake swarm activity. Although the eruption released ca. 200 T of SO2, thus confirming its magmatic nature, it occurred without significant precursory volcanic seismicity, and without any of the precursory responses of the volcanic hydrothermal system which were observed prior to the last eruption in 1964. Raoul Island has a long and varied eruption history dating back > 1.4 ma, and has been hydrothermally active throughout historic time. Present day fumarolic and hotspring discharges within Raoul caldera point to the existence of a small but well established, mixed meteoric - seawater hydrothermal system within the volcano. Magmatic signatures are apparent in fumarolic gas discharges, but are heavily masked by their interaction with hydrothermal system fluids (eg. near complete scrubbing of sulphur and halogen gases from the boiling point fumarolic discharges). A diffuse degassing study conducted in 2004 revealed that ca. 80 T/d CO2 is passively discharged from the volcano, suggesting that ongoing (albeit low level) convective degassing of magma occurs at depth. Interestingly, vent locations from the 2006 eruption correspond to areas of relatively low CO2 discharge on the crater floor in 2004. This, in conjunction with the preliminary findings of abundant hydrothermal mineralisation (calcite, anhydrite, quartz) in eruption ejecta, suggests that the main volcanic conduits had become effectively sealed during the interval since the last eruption. Calcite-hosted fluid inclusions are CO2 clathrate-bearing, and have relatively low homogenisation temperatures (165-180 °C), suggesting that the seal environment was both gas-charged and shallowly seated (< 200 m). Shaking associated with the regional

  19. Preliminary study of the uranium favorability of Mesozoic intrusive and Tertiary volcanic and sedimentary rocks of the Central Mojave Desert, Kern and San Bernardino counties, California

    International Nuclear Information System (INIS)

    Leedom, S.H.; Kiloh, K.D.

    1978-02-01

    Numerous, small, low-grade, supergene uranium deposits are found in Tertiary volcanic and sedimentary rocks in the central Mojave Desert of southern California. Large thorium-to-uranium ratios in samples of Mesozoic intrusive rocks exposed in the area indicate that these rocks have been extensively weathered, eroded, and subsequently leached by ground waters, and that they may have been the primary source of uranium for the deposits. The uranium content of samples of volcanic intrusive and extrusive rocks is average for intermediate to silicic rocks, but samples of basalt flows in the area contain six times the average uranium content of mafic igneous rocks. Devitrified tuffs and tuffaceous sedimentary rocks, interbedded with calcareous units, are additional sources of uranium for supergene uranium deposits found in calcareous units. Uranium is also found in accessory minerals in a few Mesozoic quartz-rich pegmatite dikes. Uranium deposits in the central Mojave Desert have been formed by enrichment during diagenetic replacement of Tertiary carbonate rocks; by supergene enrichment along fractures, joints, and bedding planes in Tertiary volcanic and sedimentary rocks; during formation of Holocene caliche; and by deposition within hydrothermally altered shear zones. Within the area, the diagenetic replacement type of deposit has the greatest potential for large, low-grade uranium occurrences. The other type of uranium deposits are small, erratically distributed, and extensively covered by alluvium

  20. Headache triggers in the US military.

    Science.gov (United States)

    Theeler, Brett J; Kenney, Kimbra; Prokhorenko, Olga A; Fideli, Ulgen S; Campbell, William; Erickson, Jay C

    2010-05-01

    Headaches can be triggered by a variety of factors. Military service members have a high prevalence of headache but the factors triggering headaches in military troops have not been identified. The objective of this study is to determine headache triggers in soldiers and military beneficiaries seeking specialty care for headaches. A total of 172 consecutive US Army soldiers and military dependents (civilians) evaluated at the headache clinics of 2 US Army Medical Centers completed a standardized questionnaire about their headache triggers. A total of 150 (87%) patients were active-duty military members and 22 (13%) patients were civilians. In total, 77% of subjects had migraine; 89% of patients reported at least one headache trigger with a mean of 8.3 triggers per patient. A wide variety of headache triggers was seen with the most common categories being environmental factors (74%), stress (67%), consumption-related factors (60%), and fatigue-related factors (57%). The types of headache triggers identified in active-duty service members were similar to those seen in civilians. Stress-related triggers were significantly more common in soldiers. There were no significant differences in trigger types between soldiers with and without a history of head trauma. Headaches in military service members are triggered mostly by the same factors as in civilians with stress being the most common trigger. Knowledge of headache triggers may be useful for developing strategies that reduce headache occurrence in the military.

  1. Hydrothermal Processes in the Archean - New Insights from Imaging Spectroscopy

    NARCIS (Netherlands)

    Ruitenbeek, F.J.A. van

    2007-01-01

    The aim of this research was to gain new insights in fossil hydrothermal systems using airborne imaging spectroscopy. Fossil submarine hydrothermal systems in Archean greenstone belts and other geologic terranes are important because of their relationship with volcanic massive sulfide (VMS) mineral

  2. Levulinic acid from orange peel waste by hydrothermal carbonization (HTC)

    NARCIS (Netherlands)

    Puccini, Monica; Licursi, Domenico; Stefanelli, Eleonora; Vitolo, Sandra; Galletti, Anna Maria Raspolli; Heeres, Hero Jan

    2016-01-01

    With the awareness of the need for optimal and sustainable use of natural resources, hydrothermal treatment of biomass and biomass waste for energy and resource recovery has received increasing attention. The hydrothermal carbonization (HTC) of a biomass is achieved using water as the reaction

  3. Hydrothermal stability of microporous silica and niobia-silica membranes

    NARCIS (Netherlands)

    Boffa, V.; Blank, David H.A.; ten Elshof, Johan E.

    2008-01-01

    The hydrothermal stability of microporous niobia–silica membranes was investigated and compared with silica membranes. The membranes were exposed to hydrothermal conditions at 150 and 200 °C for 70 h. The change of pore structure before and after exposure to steam was probed by single-gas permeation

  4. Hydrothermal carbonization. Investigation of process parameters

    Energy Technology Data Exchange (ETDEWEB)

    Steinbrueck, J.; Rossbach, M.; Reichert, D.; Bockhorn, H. [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany). Inst. of Technical Chemistry and Polymerchemistry; Walz, L. [Energie Baden-Wuerttemberg AG, Karlsruhe (Germany); Eyler, D. [European Institute for Energy Research, Karlsruhe (Germany)

    2010-07-01

    For energetic use and as a raw material lignocellulosic biomass becomes more and more important. Among pyrolytic refining, the hydrothermal treatment can be an alternative way to deoxygenerate biomass. The objective of this study is to gain deeper insights into the Hydrothermal Carbonization (HTC) process and also to define basic parameters for the construction of a small pilot plant. The biomass is converted in an autoclave at temperatures between 180 C and 240 C establishing the respective vapour pressure. Reaction times between 1 and 12 hours are applied and various catalysts in different concentrations are tested. Elemental analysis of the product, a brown coal-like solid, shows a composition of ca. C{sub 4}H{sub 3}O{sub 1}, corresponding to a carbon recovery of 60% of initial carbon mass. The elemental composition of the product is independent of the process temperature and the applied biomass, if a minimal reaction time is adhered, which however heavily depends on the reaction temperature. The remaining carbon species in intermediate reaction products in the liquid and gas phase are characterised by use of GC/MS, HPLC and FTIR. From the experimental data a two-way mechanism is deduced that includes a rapid formation of an initial solid and dehydration and decomposition reactions which lead to smaller organic molecules, e.g. furfural and aromatic species, and can be promoted by acid catalysis, e.g. H{sub 2}SO{sub 4}. (orig.)

  5. Hydrothermal Liquefaction of Wastewater Treatment Plant Solids

    Energy Technology Data Exchange (ETDEWEB)

    Billing, Justin M.

    2016-10-16

    Feedstock cost is the greatest barrier to the commercial production of biofuels. The merits of any thermochemical or biological conversion process are constrained by their applicability to the lowest cost feedstocks. At PNNL, a recent resource assessment of wet waste feedstocks led to the identification of waste water treatment plant (WWTP) solids as a cost-negative source of biomass. WWTP solids disposal is a growing environmental concern [1, 2] and can account for up to half of WWTP operating costs. The high moisture content is well-suited for hydrothermal liquefaction (HTL), avoiding the costs and parasitic energy losses associated with drying the feedstock for incineration. The yield and quality of biocrude and upgraded biocrude from WWTP solids is comparable to that obtained from algae feedstocks but the feedstock cost is $500-1200 less per dry ton. A collaborative project was initiated and directed by the Water Environment & Reuse Foundation (WERF) and included feedstock identification, dewatering, shipping to PNNL, conversion to biocrude by HTL, and catalytic hydrothermal gasification of the aqueous byproduct. Additional testing at PNNL included biocrude upgrading by catalytic hydrotreatment, characterization of the hydrotreated product, and a preliminary techno-economic analysis (TEA) based on empirical results. This short article will cover HTL conversion and biocrude upgrading. The WERF project report with complete HTL results is now available through the WERF website [3]. The preliminary TEA is available as a PNNL report [4].

  6. Characteristics of hydrothermal alteration mineralogy and geochemistry of igneous rocks from the epithermal Co-O mine and district, Eastern Mindanao (Philippines)

    Science.gov (United States)

    Sonntag, Iris; Hagemann, Steffen

    2010-05-01

    Detailed petrographic as well as hyperspectral analyses using PIMA (Portable Infrared Mineral Analyser) and geochemical (major, trace and rare earth elements) studies were conducted on samples of the epithermal, low sulfidation Co-O mine (47,869 ounces gold produced in 2009 with an average grade of 13.3 g/t gold) and district in Eastern Mindanao (Philippines). The aims of the study were to unravel the petrogenetic origin of the various volcanic (host rocks) and intrusive rocks (potential fluid driver) as well as their relationship and influence on the hydrothermal alteration zoning and fluid chemistry. The auriferous veins at the Co-O mine were formed during two hydrothermal stages associated with the district wide D1 and D2 deformation events. Gold in stage 1 quartz veins is in equilibrium with galena and sphalerite, whereas in stage 2 it is associated with pyrite. Auriferous quartz veins of stage 1 reflect temperatures below 250° C or strong variations in pH and fO2 at higher temperatures, due to potential involvement of acidic gas or meteoric water. Cathodoluminescense studies revealed strong zonation of quartz associated with Au, presumably related to changes in the Al content, which is influenced by the pH. Plumose textures indicate times of rapid deposition, whereas saccharoidal quartz grains are related to potential calcite replacement. The geology of the Co-O mine and district is dominated by Miocene volcanic rocks (basic to intermediate flows and pyroclastics units), which are partly covered by Pliocene volcanic rocks and late Oligocene to Miocene limestones. The Miocene units are intruded by diorite (presumably Miocene in age). The epithermal mineralization event may be related to diorite intrusions. The geochemistry of all igneous rocks in the district is defined by a sub-alkaline affinity and is low to medium K in composition. Most units are related to a Miocene subduction zone with westward subduction, whereas the younger Pliocene rocks are related to

  7. Hydrothermal carbonization and torrefaction of grape pomace: a comparative evaluation.

    Science.gov (United States)

    Pala, Mehmet; Kantarli, Ismail Cem; Buyukisik, Hasan Baha; Yanik, Jale

    2014-06-01

    Grape pomace was treated by hydrothermal carbonization (sub-critical water, 175-275°C) and torrefaction (nitrogen atmosphere, 250 and 300°C), with mass yield of solid product (char) ranging between 47% and 78%, and energy densification ratio to 1.42-1.15 of the original feedstock. The chars were characterised with respect to their fuel properties, morphological and structural properties and combustion characteristics. The hydrothermal carbonization produced the char with greater energy density than torrefaction. The chars from torrefaction were found to be more aromatic in nature than that from hydrothermal carbonization. Hydrothermal carbonization process produced the char having high combustion reactivity. Most interesting was the finding that aqueous phase from hydrothermal carbonization had antioxidant activity. The results obtained in this study showed that HTC appears to be promising process for a winery waste having high moisture content. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. The Jefferson Lab Trigger Supervisor System

    International Nuclear Information System (INIS)

    Ed Jastrzembsi; David Abbott; Graham Heyes; R.W. MacLeod; Carl Timmer; Elliott Wolin

    2000-01-01

    We discuss the design and performance of a Trigger Supervisor System for use in nuclear physics experiments at Jefferson Lab. We also discuss the enhanced features of a new Trigger Supervisor Module now under construction

  9. The Jefferson Lab Trigger Supervisor System

    International Nuclear Information System (INIS)

    Jastrzembski, E.; Abbott, D.J.; Heyes, W.G.; MacLeod, R.W.; Timmer, C.; Wolin, E.

    1999-01-01

    The authors discuss the design and performance of a Trigger Supervisor System for use in nuclear physics experiments at Jefferson Lab. They also discuss the enhanced features of a new Trigger Supervisor Module now under construction

  10. Hydrothermal titanite from the Chengchao iron skarn deposit: temporal constraints on iron mineralization, and its potential as a reference material for titanite U-Pb dating

    Science.gov (United States)

    Hu, Hao; Li, Jian-Wei; McFarlane, Christopher R. M.

    2017-09-01

    Uranium-lead isotopes and trace elements of titanite from the Chengchao iron skarn deposit (Daye district, Eastern China), located along the contact zones between Triassic marine carbonates and an early Cretaceous intrusive complex consisting of granite and quartz diorite, were analyzed using laser ablation inductively coupled plasma mass spectrometry to provide temporal constraints on iron mineralization and to evaluate its potential as a reference material for titanite U-Pb geochronology. Titanite grains from mineralized endoskarn have simple growth zoning patterns, exhibit intergrowth with magnetite, diopside, K-feldspar, albite and actinolite, and typically contain abundant primary two-phase fluid inclusions. These paragenetic and textural features suggest that these titanite grains are of hydrothermal origin. Hydrothermal titanite is distinct from the magmatic variety from the ore-related granitic intrusion in that it contains unusually high concentrations of U (up to 2995 ppm), low levels of Th (12.5-453 ppm), and virtually no common Pb. The REE concentrations are much lower, as are the Th/U and Lu/Hf ratios. The hydrothermal titanite grains yield reproducible uncorrected U-Pb ages ranging from 129.7 ± 0.7 to 132.1 ± 2.7 Ma (2σ), with a weighted mean of 131.2 ± 0.2 Ma [mean standard weighted deviation (MSWD) = 1.7] that is interpreted as the timing of iron skarn mineralization. This age closely corresponds to the zircon U-Pb age of 130.9 ± 0.7 Ma (MSWD = 0.7) determined for the quartz diorite, and the U-Pb ages for zircon and titanite (130.1 ± 1.0 Ma and 131.3 ± 0.3 Ma) in the granite, confirming a close temporal and likely genetic relationship between granitic magmatism and iron mineralization. Different hydrothermal titanite grains have virtually identical uncorrected U-Pb ratios suggestive of negligible common Pb in the mineral. The homogeneous textures and U-Pb characteristics of Chengchao hydrothermal titanite suggest that the mineral might be a

  11. Phreatic eruptions and deformation of Ioto Island (Iwo-jima), Japan, triggered by deep magma injection

    Science.gov (United States)

    Ueda, Hideki; Nagai, Masashi; Tanada, Toshikazu

    2018-03-01

    On Ioto Island (Iwo-jima), 44 phreatic eruptions have been recorded since 1889, when people began to settle there. Four of these eruptions, after the beginning of continuous observation by seismometers in 1976, were accompanied by intense seismic activity and rapid crustal deformation beforehand. Other eruptions on Ioto were without obvious crustal activities. In this paper, we discuss the mechanisms of phreatic eruptions on Ioto. Regular geodetic surveys and continuous GNSS observations show that Ioto intermittently uplifts at an abnormally high rate. All of the four eruptions accompanied by the precursors took place during intermittent uplifts. The crustal deformation before and after one of these eruptions revealed that a sill-like deformation source in the shallow part of Motoyama rapidly inflated before and deflated after the beginning of the eruption. From the results of a seismic array and a borehole survey, it is estimated that there is a layer of lava at a depth of about 100-200 m, and there is a tuff layer about 200-500 m beneath it. The eruptions accompanied by the precursors probably occurred due to abrupt boiling of hot water in hydrothermal reservoirs in the tuff layer, sealed by the lava layer and triggered by intermittent uplift. For the eruptions without precursors, the hydrothermal systems are weakly sealed by clay or probably occurred on the same principle as a geyser because phreatic eruptions had occurred beforehand and hydrostatic pressure is applied to the hydrothermal reservoirs.

  12. Study on the hydrothermal treatment of Shenhua coal

    Energy Technology Data Exchange (ETDEWEB)

    Zhicai Wang; Hengfu Shui; Zhanning Pei; Jinsheng Gao [Anhui University of Technology, Ma' anshan (China). School of Chemistry and Chemical Engineering

    2008-04-15

    In this paper, the hydrothermal treatment of Shenhua coal was carried out under 0.1 MPa (initial pressure) nitrogen and different temperature. Effects of hydrothermal treatment on the structure and the hydro-liquefaction activity of Shenhua coal were investigated by the ultimate and proximate analyses, the FTIR measurements and TG analyses of hydrothermally treated coals, and the characterizations of extraction and swelling properties, and the batch hydro-liquefaction of treated coal were also carried out. The results indicate that hydrothermal treatment above 200{sup o}C can increase the hydrogen content of treated coal and decrease the yield of volatiles and the content of ash, especially a large amount of CO and CH{sub 4} are found in gas products obtained by the hydrothermal treatment above 250{sup o}C. Hydrothermal treatment disrupts the weak covalent bond such as ether, ester and side-chain substituent by hydrolysis and pyrolysis, and changes the distribution of H-bond in coal. The swelling ratio and the Soxhlet extraction yield of treated coal decrease with the increase of hydrothermal treatment temperature. The conversion of liquefaction and the yield of CS{sub 2}/NMP mixed solvent extraction at ambient temperature are enhanced by hydrothermal treatment at 300{sup o}C. Therefore hydrogen donation reactions and the rupture of non-covalent bond and weak covalent bonds present in the process of hydrothermal treatment resulting in the changes of structure and reactivity of Shenhua coal. The results show that the hydro-liquefaction activity of Shenhua coal can be improved by hydrothermal pretreatment between 250{sup o}C and 300{sup o}C. 15 refs., 5 figs., 4 tabs.

  13. Water column imaging on hydrothermal vent in Central Indian Ridge

    Science.gov (United States)

    Koh, J.; Park, Y.

    2017-12-01

    Water column imaging with Multibeam echosounder systems (MBES) is recently becoming of increasing interest for oceanographic studies. Especially gas bubbles and hot water exposed from hydrothermal vents make acoustic impedance anomalies in cold seawater, water column imaging is very useful for the researchers who want to detect some kinds of hydrothermal activity. We conducted a hydrothermal exploration program, called "INVENT17", using the MBES system, KONGBERG EM122 (12kHz, 1°×1°), mounted on R/V ISABU and we deployed other equipments including video guided hydraulic grab, tow-yo CTD and general CTD with MAPR (Miniature Autonomous Plume Recorder) in 2017. First, to evaluate its capabilities of detection of hydrothermal vent, the surveys using the MBES were conducted at the Solitaire Field, previously identified hydrothermal area of the Central Indian Ridge. The bathymetric data obtained from MBES provided information about detailed morphology of seafloor, but we were not able to achieve the information from the water column imaging data. But the clue of existence of active hydrothermal vent was detected through the values of ΔNTU, dEh/dt, and OPR gained from MAPR, the data means that the hydrothermal activity affects 100m from the seafloor. It could be the reason that we can't find the hydrothermal activity because the range resolution of water column imaging is pretty rough so that the size of 100m-scaled activity has low possibility to distinguish from seafloor. The other reason is there are no sufficient objects to cause strong scattering like as CO2 bubbles or droplets unlike in the mid-Okinawa Trough. And this suggests that can be a important standard to identify properties of hydrothermal vent sites depending on the presence of scattering objects in water mass. To justify this, we should perform more chemical analysis of hot water emanating from hydrothermal vent and collected several bottles of water sample to do that.

  14. The Trigger System of the CMS Experiment

    OpenAIRE

    Felcini, Marta

    2008-01-01

    We give an overview of the main features of the CMS trigger and data acquisition (DAQ) system. Then, we illustrate the strategies and trigger configurations (trigger tables) developed for the detector calibration and physics program of the CMS experiment, at start-up of LHC operations, as well as their possible evolution with increasing luminosity. Finally, we discuss the expected CPU time performance of the trigger algorithms and the CPU requirements for the event filter farm at start-up.

  15. Triggers for a high sensitivity charm experiment

    International Nuclear Information System (INIS)

    Christian, D.C.

    1994-07-01

    Any future charm experiment clearly should implement an E T trigger and a μ trigger. In order to reach the 10 8 reconstructed charm level for hadronic final states, a high quality vertex trigger will almost certainly also be necessary. The best hope for the development of an offline quality vertex trigger lies in further development of the ideas of data-driven processing pioneered by the Nevis/U. Mass. group

  16. Hydrovolcanic and Hydrothermal Biomediated Mineral Growth in Basaltic Tuff, Surtsey Volcano, Iceland

    Science.gov (United States)

    Jackson, M. D.; Couper, S.; Ivarsson, M.; Stan, C. V.; Tamura, N.; Miyagi, L. M.; Moore, J. G.

    2017-12-01

    Fine-scale analyses of hydroclasts in 1979 Surtsey basaltic tuff drill core provide new methods for examining hydrovolcanic and hydrothermal magma-rock influences on biomediated alteration in palagonitized submarine tephra. Synchrotron source X-ray microdiffraction and microfluorescence studies from Advanced Light Source beamline 12.3.2, epifluorescent UVA illumination microscopy, S/TEM EDX compositional analyses, and Raman spectroscopy define diverse nanocrystalline clay mineral structures at 137.9 m depth (93.8 °C (1980)) and 102.6 m depth (141.3 °C (1980)). At 137.9 m, olivine contains endolithic microborings; vermicular microstructures in altered glass contain nontronite exhibiting crystallographic preferred orientation; and 75-150 µm sub-circular microstructures in altered glass contain Al-tobermorite, a calcium-silicate-hydrate with 11.3 Å interlayer spacing, zeolite, and epifluorescent, thread-like structures. At 102.6 m depth, concentrically-layered microstructures occur in altered glass and altered olivine. These have nontronite crystallographic preferred orientations that rotate around a longitudinal axis commonly occupied by a 10-80 µm long, epifluorescent thread-like structure. Pronounced carbon concentrations detected by S/TEM EDX trace layer boundaries. First-order Raman bands at 1370 cm-1 (disorder-related) and at 1580 cm-1 (order-related), and second-order bands at 2500-3300 cm-1 (overtone scattering) detect degraded organic carbonaceous matter, a strong indication of biological origin. Sub-circular nanostructures in altered glass at 137.9 m depth show similar spectra. Borehole fluid temperatures at 102.6 m, 141.3 °C in 1980, exceeded 130 °C, the assumed limit for growth of microorganisms, however. Previous analyses suggest an early low temperature episode in submarine deposits, prior to development of a hydrothermal system driven by 1964-1967 magmatic intrusions. The abundant traces of biomediated nanocrystalline clay mineral growth validate

  17. Contextual reminders fail to trigger memory reconsolidation in aged rats and aged humans.

    Science.gov (United States)

    Jones, Bethany J; Pest, Stacey M; Vargas, Iliana M; Glisky, Elizabeth L; Fellous, Jean-Marc

    2015-04-01

    There is strong evidence that hippocampal memory returns to a labile state upon reactivation, initiating a reconsolidation process that restabilizes it and allows for its updating. Normal aging is associated with deficits in episodic memory processes. However, the effects of aging on memory reconsolidation and its neural substrate remain largely unknown, and an animal model is lacking. In this study we investigated the effects of aging on context-dependent reconsolidation using an episodic set-learning task in humans and an analogous set-learning spatial task in rats. In both tasks, young and older subjects learned a set of objects (humans) or feeder locations (rats; Set 1) in Context A on Day 1. On Day 2, a different set (Set 2) was learned in either Context A (Reminder condition) or Context B (No Reminder condition). On Day 3, subjects were instructed (humans) or cued (rats) to recall Set 1. Young rats and humans in the Reminder condition falsely recalled significantly more items from Set 2 than those in the No Reminder condition, suggesting that the reminder context triggered a reactivation of Set 1 on Day 2 and allowed the integration of Set 2 items into Set 1. In both species, older subjects displayed a different pattern of results than young subjects. In aged rats, there was no difference between conditions in the level of falsely recalled Set 2 items (intrusions). Older humans in the No Reminder condition made significantly more intrusions than those in the Reminder condition. Follow-up control experiments in aged rats suggested that intrusions in older animals reflected general interference, independent of context manipulations. We conclude that contextual reminders are not sufficient to trigger memory updating in aged rats or aged humans, unlike in younger individuals. Future studies using this animal model should further our understanding of the role of the hippocampus in memory maintenance and updating during normal aging. Copyright © 2015 Elsevier Inc

  18. First level trigger of the DIRAC experiment

    International Nuclear Information System (INIS)

    Afanas'ev, L.G.; Karpukhin, V.V.; Kulikov, A.V.; Gallas, M.

    2001-01-01

    The logic of the first level trigger of the DIRAC experiment at CERN is described. A parallel running of different trigger modes with tagging of events and optional independent prescaling is realized. A CAMAC-based trigger system is completely computer controlled

  19. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  20. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.