WorldWideScience

Sample records for layered mafic intrusions

  1. Drilling the Bushveld Complex- the world's largest layered mafic intrusion

    Science.gov (United States)

    Ashwal, L. D.; Webb, S. J.; Trumbull, R. B.

    2013-12-01

    The fact that surprising new discoveries can be made in layered mafic intrusions (e.g., subtle 100-150 m cyclicity in apparently homogeneous cumulates over 1000s of m) means that we are still in the first-order characterization phase of understanding these objects. Accordingly, we have secured funding from ICDP for a planning workshop to be held in Johannesburg in early 2014, aimed at scientific drilling of the Bushveld Complex, the world's largest layered mafic intrusion. Science objectives include, but are not limited to: 1. Magma chamber processes & melt evolution. How many melts/magmas/mushes were involved, what were their compositions and how did they interact? What, if anything, is missing from the Complex, and where did it go? Did Bushveld magmatism have an effect upon Earth's atmosphere at 2 Ga? 2. Crust-mantle interactions & origin of Bushveld granitoids. Are Bushveld granites & rhyolites crustal melts, differentiates from the mafic magmas or products of immiscibility? How can the evolved isotopic signatures in the mafic rocks (e.g., epsilon Nd to -8) be understood? 3. Origin of ore deposits. What were the relative roles of gravity settling, magma mixing, immiscibility and hydrothermal fluid transport in producing the PGE, Cr and V deposits? We have identified 3 potential drilling targets representing a total of ~12 km of drill core. Exact locations of drill sites are to be discussed at the workshop. Target A- East-Central Bushveld Complex. We propose 3 overlapping 3 km boreholes that will provide the first roof-to-floor continuous coverage of the Rustenburg Layered Suite. These boreholes will represent a curated, internationally available reference collection of Bushveld material for present and future research. Target B- Southeastern Bushveld Complex. We propose a single borehole of ~2 km depth, collared in Rooiberg felsite, and positioned to intersect the Roof Zone, Upper Zone, Main Zone and floor of the Complex. Amongst other things, this site will

  2. Late Neoproterozoic layered mafic intrusion of arc-affinity in the Arabian-Nubian Shield: A case study from the Shahira layered mafic intrusion, southern Sinai, Egypt

    Energy Technology Data Exchange (ETDEWEB)

    Azer, M.K.; Obeid, M.A.; Gahalan, H.A.

    2016-07-01

    The Shahira Layered Mafic Intrusion (SLMI), which belongs to the late Neoproterozoic plutonic rocks of the Arabian-Nubian Shield, is the largest layered mafic intrusion in southern Sinai. Field relations indicate that it is younger than the surrounding metamorphic rocks and older than the post-orogenic granites. Based on variation in mineral paragenesis and chemical composition, the SLMI is distinguished into pyroxene-hornblende gabbro, hornblende gabbro and diorite lithologies. The outer zone of the mafic intrusion is characterized by fine-grained rocks (chilled margin gabbroic facies), with typical subophitic and/or microgranular textures. Different rock units from the mafic intrusion show gradational boundaries in between. They show some indications of low grade metamorphism, where primary minerals are transformed into secondary ones. Geochemically, the Shahira layered mafic intrusion is characterized by enrichment in LILE relative to HFSE (e.g. Nb, P, Zr, Ti, Y), and LREE relative to HREE [(La/Lu)n= 4.75–8.58], with subalkaline characters. It has geochemical characteristics of pre-collisional arc-type environment. The geochemical signature of the investigated gabbros indicates partial melting of mantle wedge in a volcanic-arc setting, being followed by fractional crystallization and crustal contamination. Fractional crystallization processes played a vital role during emplacement of the Shahira intrusion and evolution of its mafic and intermediate rock units. The initial magma was evolved through crystallization of hornblende which was caused by slight increasing of H2O in the magma after crystallization of liquidus olivine, pyroxene and Ca-rich plagioclase. The gabbroic rocks crystallized at pressures between 4.5 and 6.9kbar (~15–20km depth). Whereas, the diorites yielded the lowest crystallization pressure between 1.0 to 4.4Kbar (<10km depth). Temperature was estimated by several geothermometers, which yielded crystallization temperatures ranging from 835

  3. Linking precious metal enrichment and halogen cycling in mafic magmatic systems: insights from the Rum layered intrusion, NW Scotland

    Science.gov (United States)

    Kelly, A. P.; O'Driscoll, B.; Clay, P. L.; Burgess, R.

    2017-12-01

    Layered intrusions host the world's largest known concentrations of the platinum-group elements (PGE). Emphasis has been attached to the role of halogen-bearing fluids in concentrating the precious metals, but whether this occurs at the magmatic stage, or via subsequent metasomatism, is actively debated. One obstacle to progress has been the analytical difficulty of measuring low abundances of the halogens in the cumulate products of layered intrusions. To elucidate the importance of the halogens in facilitating PGE-mineralisation, as well as fingerprint halogen provenance and assess the importance of halogen cycling in mafic magma systems more generally, a suite of samples encompassing different stages of activity of the Palaeogene Rum layered intrusion was investigated. Halogen abundances were measured by neutron irradiation noble gas mass spectrometric analysis, permitting the detection of relatively low (ppm-ppb) abundances of Cl, Br and I in mg-sized samples. The samples include PGE-enriched chromite seams, various cumulates (e.g., peridotites), picrites (approximating the Rum parental magma), and pegmatites representing volatile-rich melts that circulated the intrusion at a late-stage in its solidification history. The new data reveal that PGE-bearing chromite seams contain relatively low Cl concentrations (2-3 ppm), with high molar ratios of Br/Cl and I/Cl (0.005 and 0.009, respectively). The picrites and cumulates have Br/Cl and I/Cl ratios close to sub-continental lithospheric mantle values of approximately 0.0013 and 0.00002, respectively, and thus likely reflect the Rum magma source region. A positive correlation between Cl and Br signifies comparable partitioning behaviour in all samples. However, I is more variable, displaying a positive correlation with Cl for more primitive samples (e.g. picrite and peridotite), and seemingly decoupling from Br and Cl in chromite seams and pegmatites. The relative enrichment of I over Cl in the chromite seams points

  4. Formation of thick stratiform Fe-Ti oxide layers in layered intrusion and frequent replenishment of fractionated mafic magma: Evidence from the Panzhihua intrusion, SW China

    Science.gov (United States)

    Song, Xie-Yan; Qi, Hua-Wen; Hu, Rui-Zhong; Chen, Lie-Meng; Yu, Song-Yue; Zhang, Jia-Fei

    2013-03-01

    Panzhihua intrusion is one of the largest layered intrusions that hosts huge stratiform Fe-Ti oxide layers in the central part of the Emeishan large igneous province, SW China. Up to 60 m thick stratiform massive Fe-Ti oxide layers containing 85 modal% of magnetite and ilmenite and overlying magnetite gabbro compose cyclic units of the Lower Zone of the intrusion. The cyclic units of the Middle Zone consist of magnetite gabbro and overlying gabbro. In these cyclic units, contents of Fe2O3(t), TiO2 and Cr and Fe3+/Ti4+ ratio of the rocks decrease upward, Cr content of magnetite and forsterite percentage of olivine decrease as well. The Upper Zone consists of apatite gabbro characterized by enrichment of incompatible elements (e.g., 12-18 ppm La, 20-28 ppm Y) and increasing of Fe3+/Ti4+ ratio (from 1.3 to 2.3) upward. These features indicate that the Panzhihua intrusion was repeatedly recharged by more primitive magma and evolved magmas had been extracted. Calculations using MELTS indicate that extensive fractionation of olivine and clinopyroxene in deep level resulted in increasing Fe and Ti contents in the magma. When these Fe-Ti-enriched magmas were emplaced along the base of the Panzhihua intrusion, Fe-Ti oxides became an early crystallization phase, leading to a residual magma of lower density. We propose that the unusually thick stratiform Fe-Ti oxide layers resulted from coupling of gravity settling and sorting of the crystallized Fe-Ti oxides from Fe-Ti-enriched magmas and frequent magma replenishment along the floor of the magma chamber.

  5. Source characteristics and tectonic setting of mafic-ultramafic intrusions in North Xinjiang, NW China: Insights from the petrology and geochemistry of the Lubei mafic-ultramafic intrusion

    Science.gov (United States)

    Chen, Bao-Yun; Yu, Jin-Jie; Liu, Shuai-Jie

    2018-05-01

    The newly discovered Lubei sulfide-bearing mafic-ultramafic intrusion forms the western extension of the Huangshan-Jin'erquan mafic-ultramafic intrusion belt in East Tianshan, NW China. The Lubei intrusion comprises hornblende peridotite, lherzolite, and harzburgite in its southern portion, gabbro in its middle portion, and hornblende gabbro in its northern portion. Intrusive relationships indicate that three magma pulses were involved in the formation of the intrusion, and that they were likely evolved from a common primitive magma. Estimated compositions of the Lubei primitive magma are similar to those of island arc calc-alkaline basalt except for the low Na2O and CaO contents of the Lubei primitive magma. This paper reports on the mineral compositions, whole-rock major and trace element contents, and Rb-Sr and Sm-Nd isotopic compositions of the Lubei intrusion, and a zircon LA-MC-ICP-MS U-Pb age for hornblende gabbro. The Lubei intrusion is characterized by enrichment in large-ion lithophile elements, depletion in high-field-strength elements, and marked negative Nb and Ta anomalies, with enrichment in chondrite-normalized light rare earth elements. It exhibits low (87Sr/86Sr)i ratios of 0.70333-0.70636 and low (143Nd/144Nd)i ratios of 0.51214-0.51260, with positive εNd values of +4.01 to +6.33. LA-ICP-MS U-Pb zircon ages yielded a weighted-mean age of 287.9 ± 1.6 Ma for the Lubei intrusion. Contemporaneous mafic-ultramafic intrusions in different tectonic domains in North Xinjiang show similar geological and geochemical signatures to the Lubei intrusion, suggesting a source region of metasomatized mantle previously modified by hydrous fluids from the slab subducted beneath the North Xinjiang region in the early Permian. Metasomatism of the mantle was dominated by hydrous fluids and was related to subduction of the Paleo-Asian oceanic lithosphere during the Paleozoic. Sr-Nd-Pb isotopic compositions suggest that the mantle source was a mixture of depleted mid

  6. Paleomagnetic record of a geomagnetic field reversal from late miocene mafic intrusions, southern nevada.

    Science.gov (United States)

    Ratcliff, C D; Geissman, J W; Perry, F V; Crowe, B M; Zeitler, P K

    1994-10-21

    Late Miocene (about 8.65 million years ago) mafic intrusions and lava flows along with remagnetized host rocks from Paiute Ridge, southern Nevada, provide a high-quality paleomagnetic record of a geomagnetic field reversal. These rocks yield thermoremanent magnetizations with declinations of 227 degrees to 310 degrees and inclinations of -7 degrees to 49 degrees , defining a reasonably continuous virtual geomagnetic pole path over west-central Pacific longitudes. Conductive cooling estimates for the intrusions suggest that this field transition, and mafic magmatism, lasted only a few hundred years. Because this record comes principally from intrusive rocks, rather than sediments or lavas, it is important in demonstrating the longitudinal confinement of the geomagnetic field during a reversal.

  7. Petrological constraints on the recycling of mafic crystal mushes, magma ascent and intrusion of braided sills in the Torres del Paine mafic complex (Patagonia)

    Science.gov (United States)

    Leuthold, Julien; Müntener, Othmar; Baumgartner, Lukas; Putlitz, Benita

    2014-05-01

    Cumulate and crystal mush disruption and reactivation are difficult to recognise in coarse grained shallow plutonic rocks. Mafic minerals included in hornblende and zoned plagioclase provide snapshots of early crystallization and cumulate formation, but are difficult to interpret in terms of the dynamics of magma ascent and possible links between silicic and mafic rock emplacement. We will present the field relations, the microtextures and the mineral chemistry of the Miocene mafic sill complex of the Torres del Paine intrusive complex (Patagonia, Chile) and its sub-vertical feeder-zone. The mafic sill complex was built up by a succession of braided sills of shoshonitic and high-K calc-alkaline porphyritic hornblende-gabbro and fine grained monzodioritic sills. The mafic units were over-accreted over 41±11 ka, underplating the overlying granite. Local diapiric structures and felsic magma accumulation between sills indicate limited separation of intercumulus liquid from the mafic sills. Anhedral hornblende cores, with olivine + clinopyroxene ± plagioclase ± apatite inclusions, crystallized at temperatures >900°C and pressures of ~300 to ~500 MPa. The corresponding rims and monzodiorite matrix crystallized at 950°C) from the middle crust reservoir to the emplacement level. We show that hornblende-plagioclase thermobarometry is a useful monitor for the determination of segregation conditions of granitic magmas from gabbroic crystal mushes, and for monitoring the evolution of shallow crustal magmatic crystallization, decompression and cooling.

  8. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  9. Silicate geothermometry as an indicator of water-rock interaction processes in the serpentinized mafic-ultramafic intrusion of Ylivieska

    International Nuclear Information System (INIS)

    Ruskeeniemi, T.; Blomqvist, R.; Vuorela, P.; Frape, S.K.; Blyth, A.

    1996-01-01

    The aim of the study was to use oxygen and hydrogen isotopes to examine the origin of different generations of serpentine. Of special interest was the study of low-temperature generations that may be correlated with the present meteoric waters. The research was commenced with drill core logging in order to obtain insight into the fracture minerals and their distribution in a mafic-ultramafic intrusion. (39 refs., 17 figs., 5 tabs.)

  10. Mafic-silicic magma interaction in the layered 1.87 Ga Soukkio Complex in Mäntsälä, southern Finland

    Directory of Open Access Journals (Sweden)

    Toni T. Eerola

    2002-01-01

    Full Text Available The Svecofennian layered Soukkio Complex (1.87 Ga in Mäntsälä, southern Finland, consists of layered tholeiitic gabbro and porphyritic calc-alkaline monzonite, quartz monzonite and granite, mingled together. The gabbro belongs to a group of ten mafic-ultramafic intrusions of Mäntsälä, part of the 150 km long and 20 km wide, linear, E-W trending Hyvinkää–Mäntsälä Gabbroic Belt(HMGB, representing syn-collisional magmatism. Structures and textures related to magma mingling and mixing occur in a 1–2 km wide zone around Lake Kilpijärvi, located at the center of the Soukkio Complex. The complex is compositionally stratified and consists of four zones:its base, found at the Western Zone, is a dynamically layered gabbro. The followingtonalite is probably a result of magma mixing. Felsic amoeboid layers and pipes, alternating with or cutting the fine-grained gabbro in the Central-Western Zone, resemble those of mafic-silicic layered intrusions in general. Mafic magmatic enclaves (MMEs and pillows form the South-Central Zone and disrupted synplutonic mafic dykes or sheets intruded the granite in the Eastern Zone. The MMEs and disrupted synplutonic mafic dykes or sheets show cuspate and chilled margins against the felsic host, quartz ocelli, corroded K-feldspar xenocrysts with or without plagioclase mantles, and acicular apatite, all typical features of magma mingling and mixing. Mixing is suggested by intermediate composition of MMEs between granitoid and gabbro, as well as by their partly linear trends in some Harker diagrams. REE composition of the MMEs is similar to that of the Soukkio Gabbro, as expected for granite hosted MMEs. The model proposed for evolution of the Soukkio Complex involves intrusion of mafic magma into the crust, causing its partial melting. This generated granitic magma above the mafic chamber. Injections of mafic magma invaded the felsic chamber and those magmas interacted mainly by intermingling. Mingling and

  11. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  12. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  13. A note on the layered intrusions at Annandagstoppane and Juletoppane, western Dronning Maud Land

    International Nuclear Information System (INIS)

    Krynauw, J.R.; Hunter, D.R.; Wilson, A.H.

    1984-01-01

    Aspects of the geology and geochemistry of the layered rocks at Annandagstoppane (72 degrees 33'S, 06 degrees 16'W) and Juletoppane (72 degrees 23'S, 05 degrees 33'W) in the Giaeverryggen, western Dronning Maud Land, are discussed. The mafic rocks in the two areas have been divided into a 'main suite' and a 'younger suite'. The main suite rocks comprise medium-grained gabbros, gabbronorites and anorhositic gabbros. lenticular and discontinuous rhythmic layers are present. The younger suite comprises basaltic dykes at Annandagstoppane, and a dolerite sill and small pods of fine-grained gabbroic bodies at Juletoppane. Petrographic and geochemical aspects of main suite rocks in the two areas show close similarities, and indicate that pyroxene and plagioclase were the primocrysts in the orthocumulate assemblages. The preliminary results suggest that the Annandagstoppane and Juletoppane gabbroic rocks may either constitute a single layered intrusion, or reflect outcrops of intrusions of several ages, their magmas having been derived from compositionally similar mantle sources. The close chemical similarities of the younger suite with the main suite suggest that all the mafic phases in the two areas are genetically related

  14. Zircon and baddeleyite from the economic ultramafic-mafic Noril'sk-1 intrusion (Russia): Hf-isotope constraints on source composition

    Science.gov (United States)

    Malitch, K. N.; Belousova, E. A.; Badanina, I. Yu.; Griffin, W. L.

    2012-04-01

    The ultramafic-mafic Noril'sk-1 intrusion in the northwestern part of the Siberian Craton (Russia) represents one of three known Noril'sk-type, ore-bearing intrusions, which host one of the world's major economic sulphide platinum-group-element (PGE)-Cu-Ni deposits. Zircon and baddeleyite dated previously both by SHRIMP (i.e. 248.0 ± 3.7 Ma, Campbell et al. 1992) and ID-TIMS (251.1 ± 3.6 Ma, Kamo et al. 1996) have been restricted to one lithology (e.g. leucogabbro) of the Noril'sk-1 intrusion. To better constrain the age of igneous event and sources involved in its generation our multi-technique study utilized ten rock samples characteristic of unmineralized and mineralized lithologies. The rocks investigated comprise (from top to bottom) gabbro-diorite (sample N1-1), leucogabbro (N1-3), olivine-free gabbro (N1-2 and N1-4), olivine-bearing gabbro (N1-5), olivine gabbro (N1-6), plagiowehrlite and plagiodunite (N1-7), taxitic-textured rocks comprising melanotroctolite, olivine gabbro with relics of ultramafic rocks (N1-8, N1-9) and contact fine-grained gabbro (N1-10). Sulphide PGE-Cu-Ni ores occur in ultramafic (N1-7) and taxitic-textured rocks (N1-8 and N1-9), which have thickness of about 17 m, whereas the low-sulphide horizon of about 1 m thick occurs in the upper part of intrusion (N1-3). In situ U-Pb analyses of zircon from these rocks, combined with detailed study of crystal morphology and internal structure, identify four zircon populations (Malitch et al. 2012). The U-Pb ages of baddeleyite and the defined zircon populations cover a significant time span, from Late Paleozoic to Early Mesozoic (e.g., 290 ± 2.8; 261.3 ± 1.6; 245.7 ± 1.1; 236.5 ± 1.8 and 226.7 ± 0.9 Ma). The established distribution of U-Pb ages implies that crystallization of baddeleyite and zircon corresponds to several stages of protracted evolution of ultramafic-mafic magmas at deep-seated staging chambers and/or probably characterizes interaction of distinct magmas during formation

  15. Genesis of the Permian Kemozibayi sulfide-bearing mafic-ultramafic intrusion in Altay, NW China: Evidence from zircon geochronology, Hf and O isotopes and mineral chemistry

    Science.gov (United States)

    Tang, Dongmei; Qin, Kezhang; Xue, Shengchao; Mao, Yajing; Evans, Noreen J.; Niu, Yanjie; Chen, Junlu

    2017-11-01

    The recently discovered Kemozibayi mafic-ultramafic intrusion and its associated magmatic Cu-Ni sulfide deposits are located at the southern margin of the Chinese Altai Mountain, Central Asian Orogenic Belt in north Xinjiang, NW China. The intrusion is composed of olivine websterite, norite, gabbro and diorite. Disseminated and net-textured Ni-Cu sulfide ores are hosted in the center of the gabbro. In this work, new zircon U-Pb ages, Hf-O isotopic and sulfide S isotopic data, and whole rock and mineral chemical analyses are combined in order to elucidate the characteristics of the mantle source, nature of subduction processes, degree of crustal contamination, geodynamic setting of bimodal magmatism in the region, and the metallogenic potential of economic Cu-Ni sulfide deposit at depth. SIMS zircon U-Pb dating of the gabbro yields Permian ages (278.3 ± 1.9 Ma), coeval with the Kalatongke Cu-Ni deposit and with Cu-Ni deposits in the Eastern Tianshan and Beishan areas. Several lines of evidence (positive εHf(t) from + 7.1 to + 13.3, Al2O3, TiO2 and SiO2 contents in clinopyroxene from olivine websterite, high whole rock TiO2 contents) suggest that the primary magma of the Kemozibayi intrusion was a calc-alkaline basaltic magma derived from depleted mantle, and that the degree of partial melting in the magma source was high. The evolution of the Kemozibayi mafic-ultramafic complex was strongly controlled by fractional crystallization and the crystallization sequence was olivine websterite, norite, and then gabbro. This is evidenced by whole rock Fe2O3 contents that are positively correlated with MgO and negatively correlated with Al2O3, CaO and Na2O, similar LREE enrichment and negative Nb, Ta, Hf anomalies in chondrite and primitive mantle-normalized patterns, and a decrease in total REE and trace elements contents and magnetite content from gabbro through to norite and olivine websterite. Varied and low εHf(t) (+ 7.1 to + 13.3) and high δ18O values (+ 6.4‰ to

  16. Source and Enrichment of Toxic Elements in Coal Seams around Mafic Intrusions: Constraints from Pyrites in the Yuandian Coal Mine in Anhui, Eastern China

    Directory of Open Access Journals (Sweden)

    Yanfei An

    2018-04-01

    Full Text Available Pyrite, a mineral that can cause potential environmental issues in coal mining, is commonly found in coal seams around intrusions. In this paper, pyrites from the Yuandian Coal Mine (Huaibei Coalfield, Anhui, Eastern China were studied using SEM, Raman and LA-ICP-MS. The pyrite morphologic and geochemical data suggest that (1 four pyrite generations are present (framboidal sedimentary pyrites (Py I in the original coal, coarse-grained magmatic pyrites (Py II in the intruding diabase, fine-grained metamorphic pyrites (Py III in the intrusive contact aureole, and spheroid/vein hydrothermal pyrites (Py IV in the cokeite; and (2 concentrations of cobalt, nickel, arsenic, selenium, lead and copper in the metamorphic pyrites are much higher than the other pyrite generations. We propose that mafic magmatism is the main contributor of the toxic elements to the intrusion-related cokeite at Yuandian.

  17. Geological setting, emplacement mechanism and igneous evolution of the Atchiza mafic-ultramafic layered suite in north-west Mozambique

    Science.gov (United States)

    Ibraimo, Daniel Luis; Larsen, Rune B.

    2015-11-01

    The Atchiza mafic and ultramafic-layered suite (hereafter, "Atchiza Suite) crops out in an area 330 km2 west of the Mozambican Tete province. In an early account of the geology of this intrusion, it was considered the continuation of the Great Dyke of Zimbabwe, an idea that was aborted after detailed studies. Nevertheless, the Ni concentrations in the Atchiza outcrop rocks are considerable. Our investigation used field evidence, hand specimens and petrography descriptions, mineral chemistry studies using electron microprobe analysis and tectonic analysis to arrive at a plausible mineralogical composition and understanding of the tectonic setting for the igneous evolution. The mineral composition from the Atchiza Suite indicates that these are cumulates. The magmatic segregation from the petrographic and mineral composition reasoning indicates that dunite-lherzolitic peridotite-olivine gabbro-gabbronorite-gabbro-pegmatitic gabbro is the rock formation sequence. Olivine and chromite were the first phases formed, followed by pyroxene and plagioclase. In addition, it is shown that these minerals are near-liquidus crystallization products of basaltic magma with olivine Fo: 87.06 in dunite, mean values of clinopyroxene are (Wo: 36.4, En: 48.0, Fs: 15.2), orthopyroxene (Wo: 2.95, En: 73.0, Fs: 24.2) and plagioclase An: 71.3, respectively. Opaque minerals comprise Fe-Ti oxides and (Fe, Cr) spinel up to 4.8 vol.%, but chromitite layers are not present. Most of the opaque minerals are interstitial to pyroxene. Sulphides are common in gabbros, with pyrrhotite, pentlandite, chalcopyrite, pyrite and covellite together comprising 0.4-2.0 vol.%. The whole rock Rare Earth Element (REE) concentrations are mainly a result of differentiation, but slight crustal contamination/assimilation contributed to the REE contents. In addition, they also show Eu enrichment, suggesting that plagioclase fractionation was important in the rock. The Atchiza Suite preserves a deep-seated plumbing

  18. The size-isotopic evolution connection among layered mafic instrusions: Clues from a Sr-Nd isotopic study of a small complex

    Science.gov (United States)

    Poitrasson, Franck; Pin, Christian; Duthou, Jean-Louis; Platevoet, Bernard

    1994-05-01

    Several theoretical and experimental works have focused on the processes occuring in continental mafic magma chambers. In contrast, systematic isotopic studies of natural remnants of these latter remain scarce, although they can give fundamental constraints for theoretical studies. This is especially true if different layered complex with contrasting characteristics (e.g., different size) are compared. For this reason, we present the results of a Sr-Nd isotopic profile across a small layered mafic intrusion of Permian age exposed near Fozzano (SW Corsica). In the main zone of the layered section, decreasing Sr-87/Sr(sub i)-86 and increasing Nd-143/Nd(sub i)-144 are observed from less evolved (bottom) to more evolved (top) rocks. This peculiar pattern precludes assimilation and fractional crystallization (AFC) as a dominant mechanism in the petrogenesis of this body. Instead, we interpret this trend as reflecting the dilution of an early stage contaminated magma by several reinjections of fresh basalt in the chamber. In agreement with mineralogical and structural data, every cyclic unit is interpreted as a new magmatic input. On the basis of rough refill and fractional crystallization (RFC) calculations, the average volume for each reinjection is estimated to have been about 0.04 cu km. The cumulative volume of these injections would amount to about 75% of the total volume of the layered complex. This implies that reinjections were accompanied by an important increase of the volume of the chamber or by magma withdrawal by surface eruptions. The RFC mechanism documented within this small layered body constrasts with the isotopic pattern observed between several intrusions at the regional scale in SW Corsica, and within large continental mafic magma chambers elsewhere. In these cases the isotopic evolution is dominated by AFC processes, and there is no clear isotopic evidence for reinjections, unless major influx of fresh magma occurred. It is suggested that there is

  19. Seismic constraints on a large mafic intrusion with implications for the subsidence mechanism of the Danish Basin

    DEFF Research Database (Denmark)

    Sandrin, Alessandro; Thybo, Hans

    2008-01-01

    Gal) positive gravity anomaly known as Silkeborg Gravity High. The intrusion has a minimum volume of 40,000 km3, which implies that the magma influx and the consequent cooling of the lithosphere from high temperature could have had profound effects on the subsidence of the Danish Basin, in particular because...

  20. Postmagmatic magnetite-apatite assemblage in mafic intrusions: a case study of dolerite at Olympic Dam, South Australia

    Science.gov (United States)

    Apukhtina, Olga B.; Kamenetsky, Vadim S.; Ehrig, Kathy; Kamenetsky, Maya B.; McPhie, Jocelyn; Maas, Roland; Meffre, Sebastien; Goemann, Karsten; Rodemann, Thomas; Cook, Nigel J.; Ciobanu, Cristiana L.

    2016-01-01

    An assemblage of magnetite and apatite is common worldwide in different ore deposit types, including disparate members of the iron-oxide copper-gold (IOCG) clan. The Kiruna-type iron oxide-apatite deposits, a subtype of the IOCG family, are recognized as economic targets as well. A wide range of competing genetic models exists for magnetite-apatite deposits, including magmatic, magmatic-hydrothermal, hydrothermal(-metasomatic), and sedimentary(-exhalative). The sources and mechanisms of transport and deposition of Fe and P remain highly debatable. This study reports petrographic and geochemical features of the magnetite-apatite-rich vein assemblages in the dolerite dykes of the Gairdner Dyke Swarm (~0.82 Ga) that intruded the Roxby Downs Granite (~0.59 Ga), the host of the supergiant Olympic Dam IOCG deposit. These symmetrical, only few mm narrow veins are prevalent in such dykes and comprise besides usually colloform magnetite and prismatic apatite also further minerals (e.g., calcite, quartz). The genetic relationships between the veins and host dolerite are implied based on alteration in the immediate vicinity (~4 mm) of the veins. In particular, Ti-magnetite-ilmenite is partially to completely transformed to titanite and magmatic apatite disappears. We conclude that the mafic dykes were a local source of Fe and P re-concentrated in the magnetite-apatite veins. Uranium-Pb ages for vein apatite and titanite associated with the vein in this case study suggest that alteration of the dolerite and healing of the fractures occurred shortly after dyke emplacement. We propose that in this particular case the origin of the magnetite-apatite assemblage is clearly related to hydrothermal alteration of the host mafic magmatic rocks.

  1. Magmatic ore deposits in layered intrusions - Descriptive model for reef-type PGE and contact-type Cu-Ni-PGE deposits

    Science.gov (United States)

    Zientek, Michael L.

    2012-01-01

    Layered, ultramafic to mafic intrusions are uncommon in the geologic record, but host magmatic ore deposits containing most of the world's economic concentrations of platinum-group elements (PGE) (figs. 1 and 2). These deposits are mined primarily for their platinum, palladium, and rhodium contents (table 1). Magmatic ore deposits are derived from accumulations of crystals of metallic oxides, or immiscible sulfide, or oxide liquids that formed during the cooling and crystallization of magma, typically with mafic to ultramafic compositions. "PGE reefs" are stratabound PGE-enriched lode mineralization in mafic to ultramafic layered intrusions. The term "reef" is derived from Australian and South African literature for this style of mineralization and used to refer to (1) the rock layer that is mineralized and has distinctive texture or mineralogy (Naldrett, 2004), or (2) the PGE-enriched sulfide mineralization that occurs within the rock layer. For example, Viljoen (1999) broadly defined the Merensky Reef as "a mineralized zone within or closely associated with an unconformity surface in the ultramafic cumulate at the base of the Merensky Cyclic Unit." In this report, we will use the term PGE reef to refer to the PGE-enriched mineralization, not the host rock layer. Within a layered igneous intrusion, reef-type mineralization is laterally persistent along strike, extending for the length of the intrusion, typically tens to hundreds of kilometers. However, the mineralized interval is thin, generally centimeters to meters thick, relative to the stratigraphic thickness of layers in an intrusion that vary from hundreds to thousands of meters. PGE-enriched sulfide mineralization is also found near the contacts or margins of layered mafic to ultramafic intrusions (Iljina and Lee, 2005). This contact-type mineralization consists of disseminated to massive concentrations of iron-copper-nickel-PGE-enriched sulfide mineral concentrations in zones that can be tens to hundreds

  2. Petrography and trace element signatures in silicates and Fe-Ti-oxides from the Lanjiahuoshan deposit, Panzhihua layered intrusion, Southwest China

    Science.gov (United States)

    Gao, Wenyuan; Ciobanu, Cristiana L.; Cook, Nigel J.; Huang, Fei; Meng, Lin; Gao, Shang

    2017-12-01

    Permian mafic-ultramafic layered intrusions in the central part of the Emeishan Large Igneous Province (ELIP), Southwestern China, host Fe-Ti-V-oxide ores that have features which distinguish them from other large layered intrusion-hosted deposits. The origin of these ores is highly debated. Careful petrographic examination, whole rock analysis, electron probe microanalysis, and measurement and mapping of trace element concentrations by laser ablation inductively coupled plasma mass spectrometry in all major and minor minerals (clinopyroxene, plagioclase, olivine, amphibole, titanomagnetite, ilmenite, pleonaste and pyrrhotite) has been undertaken on samples from the Lanjiahuoshan deposit, representing the Middle, Lower and Marginal Zone of the Panzhihua intrusion. Features are documented that impact on interpretation of intrusion petrology and with implications for genesis of the Fe-Ti-V-oxide ores. Firstly, there is evidence, as symplectites between clinopyroxene and plagioclase, for introduction of complex secondary melts. Secondly, reaction between a late hydrothermal fluid and clinopyroxene is recognized, which has led to formation of hydrated minerals (pargasite, phlogopite), as well as a potassium metasomatic event, postdating intrusion solidification, which led to formation of K-feldspar. Lastly, partitioning of trace elements between titanomagnetite and silicates needs to consider scavenging of metals by ilmenite (Mn, Sc, Zr, Nb, Sn, Hf and Ta) and sulfides, as well as the marked partitioning of Co, Ni, Zn, Ga, As and Sb into spinels exsolved from titanomagnetite. The role of these less abundant phases may have been understated in previous studies, highlighting the importance of petrographic examination of complex silicate-oxide-sulfide assemblages, as well as the need for a holistic approach to trace element analysis, acknowledging all minerals within the assemblage.

  3. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  4. Thermal evolution of magma reservoirs in the shallow crust and incidence on magma differentiation: the St-Jean-du-Doigt layered intrusion (Brittany, France)

    Science.gov (United States)

    Barboni, M.; Bussy, F.; Ovtcharova, M.; Schoene, B.

    2009-12-01

    Understanding the emplacement and growth of intrusive bodies in terms of mechanism, duration, thermal evolution and rates are fundamental aspects of crustal evolution. Recent studies show that many plutons grow in several Ma by in situ accretion of discrete magma pulses, which constitute small-scale magmatic reservoirs. The residence time of magmas, and hence their capacities to interact and differentiate, are controlled by the local thermal environment. The latter is highly dependant on 1) the emplacement depth, 2) the magmas and country rock composition, 3) the country rock thermal conductivity, 4) the rate of magma injection and 5) the geometry of the intrusion. In shallow level plutons, where magmas solidify quickly, evidence for magma mixing and/or differentiation processes is considered by many authors to be inherited from deeper levels. We show however that in-situ differentiation and magma interactions occurred within basaltic and felsic sills at shallow depth (0.3 GPa) in the St-Jean-du-Doigt bimodal intrusion, France. Field evidence coupled to high precision zircon U-Pb dating document progressive thermal maturation within the incrementally built laccolith. Early m-thick mafic sills are homogeneous and fine-grained with planar contacts with neighbouring felsic sills; within a minimal 0.5 Ma time span, the system gets warmer, adjacent sills interact and mingle, and mafic sills are differentiating in the top 40 cm of the layer. Rheological and thermal modelling show that observed in-situ differentiation-accumulation processes may be achieved in less than 10 years at shallow depth, provided that (1) the differentiating sills are injected beneath consolidated, yet still warm basalt sills, which act as low conductive insulating screens, (2) the early mafic sills accreted under the roof of the laccolith as a 100m thick top layer within 0.5 My, and (3) subsequent and sustained magmatic activity occurred on a short time scale (years) at an injection rate of ca. 0

  5. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  6. Creating a two-layered augmented artificial immune system for application to computer network intrusion detection

    Science.gov (United States)

    Judge, Matthew G.; Lamont, Gary B.

    2009-05-01

    Computer network security has become a very serious concern of commercial, industrial, and military organizations due to the increasing number of network threats such as outsider intrusions and insider covert activities. An important security element of course is network intrusion detection which is a difficult real world problem that has been addressed through many different solution attempts. Using an artificial immune system has been shown to be one of the most promising results. By enhancing jREMISA, a multi-objective evolutionary algorithm inspired artificial immune system, with a secondary defense layer; we produce improved accuracy of intrusion classification and a flexibility in responsiveness. This responsiveness can be leveraged to provide a much more powerful and accurate system, through the use of increased processing time and dedicated hardware which has the flexibility of being located out of band.

  7. An example of post-collisional mafic magmatism: the gabbro-anorthosite layered complex from the Tin Zebane area (western Hoggar, Algeria)

    Science.gov (United States)

    Aı̈t-Djafer, Saı̈da; Ouzegane, Khadidja; Paul-Liégeois, Jean; Kienast, Jean Robert

    2003-10-01

    The Tin Zebane gabbro-anorthosite layered mafic intrusion represented by plagioclase-rich cumulates forms a set of small lenticular to round-shaped mainly undeformed bodies intruding the Pan-African high-pressure metamorphic rocks from western Hoggar (Tuareg shield, southwest Algeria). The coarse-grained anorthosites are mainly made of slightly zoned bytownite (An 86-74) with the higher anorthite content at the cores. Anorthosites are interlayered with leucogabbros and gabbros that show preserved magmatic structures and with olivine gabbros characterised by coronitic textures. The primary assemblage in gabbros includes plagioclase (An 93-70), olivine (Fo 77-70), zoned clinopyroxene (En 43-48Fs 05-13Wo 41-49 with Al 2O 3 up to 4.3 wt.%) and rare orthopyroxene (En 73-78). Pyroxenes and olivine are commonly surrounded by Ca-amphibole. The olivine-plagioclase contact is usually marked by a fine orthopyroxene-Cr-spinel-amphibole symplectite. A magnesian pigeonite (En 70-75Fs 19-20Wo 6-10) is also involved in corona. The coronitic minerals have equilibrated with the primary mineral rims at P- T- aH2O conditions of 797 ± 42 °C for aH2O=0.5 and 808 ± 44 °C for aH2O=0.6 at 6.2 ± 1.4 kbar. The Tin Zebane gabbroic rocks are depleted in REE with a positive Eu anomaly, high Sr (>10 ∗ chondrite) and Al 2O 3 concentrations (17-33%) that support plagioclase accumulation with the extreme case represented by the anorthosites. The REE patterns can be modelised using plagioclase, clinopyroxene and orthopyroxene REE signature, without any role played by accessory minerals. High MgO content points to olivine as a major cumulate phase. Anorthositic gabbros Sr and Nd isotopic initial ratios are typical of a depleted mantle source (Sr i=0.70257-0.70278; ɛNd=+5.9 to +7.8). This isotopic signature is identical to that of the 10-km wide 592 Ma old dyke complex composed of alkaline to peralkaline granites and tholeiitic gabbros and one single bimodal complex can be inferred. The source

  8. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  9. Disequilibrium dihedral angles in layered intrusions: the microstructural record of fractionation

    Science.gov (United States)

    Holness, Marian; Namur, Olivier; Cawthorn, Grant

    2013-04-01

    The dihedral angle formed at junctions between two plagioclase grains and a grain of augite is only rarely in textural equilibrium in gabbros from km-scale crustal layered intrusions. The median of a population of these disequilibrium angles, Θcpp, varies systematically within individual layered intrusions, remaining constant over large stretches of stratigraphy with significant increases or decreases associated with the addition or reduction respectively of the number of phases on the liquidus of the bulk magma. The step-wise changes in Θcpp are present in Upper Zone of the Bushveld Complex, the Megacyclic Unit I of the Sept Iles Intrusion, and the Layered Series of the Skaergaard Intrusion. The plagioclase-bearing cumulates of Rum have a bimodal distribution of Θcpp, dependent on whether the cumulus assemblage includes clinopyroxene. The presence of the step-wise changes is independent of the order of arrival of cumulus phases and of the composition of either the cumulus phases or the interstitial liquid inferred to be present in the crystal mush. Step-wise changes in the rate of change in enthalpy with temperature (ΔH) of the cooling and crystallizing magma correspond to the observed variation of Θcpp, with increases of both ΔH and Θcpp associated with the addition of another liquidus phase, and decreases of both associated with the removal of a liquidus phase. The replacement of one phase by another (e.g. olivine ⇔ orthpyroxene) has little effect on ΔH and no discernible effect on Θcpp. An increase of ΔH is manifest by an increase in the fraction of the total enthalpy budget that is the latent heat of crystallization (the fractional latent heat). It also results in an increase in the amount crystallized in each incremental temperature drop (the crystal productivity). An increased fractional latent heat and crystal productivity result in an increased rate of plagioclase growth compared to that of augite during the final stages of solidification

  10. Non-intrusive Packet-Layer Model for Monitoring Video Quality of IPTV Services

    Science.gov (United States)

    Yamagishi, Kazuhisa; Hayashi, Takanori

    Developing a non-intrusive packet-layer model is required to passively monitor the quality of experience (QoE) during service. We propose a packet-layer model that can be used to estimate the video quality of IPTV using quality parameters derived from transmitted packet headers. The computational load of the model is lighter than that of the model that takes video signals and/or video-related bitstream information such as motion vectors as input. This model is applicable even if the transmitted bitstream information is encrypted because it uses transmitted packet headers rather than bitstream information. For developing the model, we conducted three extensive subjective quality assessments for different encoders and decoders (codecs), and video content. Then, we modeled the subjective video quality assessment characteristics based on objective features affected by coding and packet loss. Finally, we verified the model's validity by applying our model to unknown data sets different from training data sets used above.

  11. Zinc Isotopes as Tracers of Crust-Mantle Interactions and Mineralization Processes in Layered Intrusions

    Science.gov (United States)

    Day, J. M.; Moynier, F.

    2016-12-01

    Zinc isotopes are a powerful tool for studying igneous processes and may be useful for distinguishing between mantle or crustal origins for mineralization and for examining crystallization processes. Restricted ranges in δ66Zn for mantle-derived rocks (δ66Zn = 0.28±0.05‰; [{66Zn/64Znsample/66Zn/64ZnJMC-Lyon-1} × 1000] all uncertainties reported are 2SD) contrast the large δ66Zn variations in sedimentary rocks ( 0 to 1‰), or in volcanic and sedimentary hosted ore deposits (e.g., SEDEX; VHMS; MVT = -0.6 to 1.3‰). Here, we use Zn isotopes to investigate magmatic processes in the 1.27 Ga Muskox Intrusion (Canada) and 2.7 Ga Stillwater Intrusion (Montana). The Muskox main chromitite horizon has between 270-330 ppm Zn with δ66Zn ranging from 0.16 to 0.31‰. Zinc isotope compositions negatively correlate with Os isotopes. Chromitite (40a) with the lowest 187Os/188Os (0.132) has δ66Zn of 0.31±0.03‰; indistinguishable from the mantle value. CM19 glass from the co-eval Coppermine Volcanics, which has crust-like O and Nd isotopes but low 187Os/188Os (0.131), has been interpreted as the extrusive manifestation of chromitite genesis. The value of δ66Zn (0.27±0.07‰) for CM19 is within uncertainty of 40A, and permissive of formation during silicic-mafic melt mixing and large-scale chromitite crystallization. Stillwater chromitite seams exhibit a larger range in Zn (166-448 ppm), but generally lower δ66Zn (0.13±0.04‰) than Muskox chromitites, or to a JM Reef bulk sample (69 ppm Zn, δ66Zn = 0.22±0.03‰). These results suggest different sources of Zn for Ultramafic series chromitites versus the JM Reef (Banded series). Correspondingly, variations occur in Os isotopes for PGE poor chromitites (γOs = -2 to +4) versus the PGE-rich JM Reef (γOs = +12 to +34). Zinc isotope variations may be explained by either a mantle source with low δ66Zn that was subsequently contaminated by high δ66Zn crust, or from contamination of the ultramafic series by low δ66Zn

  12. Hydrogeochemistry of deep groundwaters of mafic and ultramafic rocks in Finland

    International Nuclear Information System (INIS)

    Ruskeeniemi, T.; Blomqvist, R.; Lindberg, A.; Ahonen, L.; Frape, S.

    1996-12-01

    The present work reports and interprets the hydrogeochemical and hydrogeological data obtained from deep groundwaters in various mafic-ultramafic formations in Finland. The work is mainly based on the results of the research project 'Geochemistry of deep groundwaters' financed by the Ministry of Trade and Industry and the Geological Survey of Finland. Five sites were selected for this study: (1) Juuka, (2) Keminmaa, (3) Maentsaelae, (4) Ranua, and (5) Ylivieska. Keminmaa and Ranua are located in Early Proterozoic layered intrusions dated at 2.44 Ga. The Juuka site lies within the massive Miihkali serpentinite, which is thought to represent the ultramafic part of a Proterozoic (1.97 Ga) ophiolite complex. The Maentsaelae gabbro represents the deep parts of the Svecofennian volcanic sequence, while the Ylivieska mafic-ultramafic intrusion is one of a group of Svecokarelian Ni-potential intrusions 1.9 Ga in age. For reference, groundwaters from four other sites are also briefly described. Three of these sites are located within the nickel mining regions of Enonkoski, Kotalahti and Vammala, while the fourth is a small Ni mineralization at Hyvelae, Noormarkku. The four reference sites are all of Svecokarelian age. (refs.)

  13. Hydrogeochemistry of deep groundwaters of mafic and ultramafic rocks in Finland

    Energy Technology Data Exchange (ETDEWEB)

    Ruskeeniemi, T.; Blomqvist, R.; Lindberg, A.; Ahonen, L. [Geological Survey of Finland, Espoo (Finland); Frape, S. [Waterloo Univ., ON (Canada)

    1996-12-01

    The present work reports and interprets the hydrogeochemical and hydrogeological data obtained from deep groundwaters in various mafic-ultramafic formations in Finland. The work is mainly based on the results of the research project `Geochemistry of deep groundwaters` financed by the Ministry of Trade and Industry and the Geological Survey of Finland. Five sites were selected for this study: (1) Juuka, (2) Keminmaa, (3) Maentsaelae, (4) Ranua, and (5) Ylivieska. Keminmaa and Ranua are located in Early Proterozoic layered intrusions dated at 2.44 Ga. The Juuka site lies within the massive Miihkali serpentinite, which is thought to represent the ultramafic part of a Proterozoic (1.97 Ga) ophiolite complex. The Maentsaelae gabbro represents the deep parts of the Svecofennian volcanic sequence, while the Ylivieska mafic-ultramafic intrusion is one of a group of Svecokarelian Ni-potential intrusions 1.9 Ga in age. For reference, groundwaters from four other sites are also briefly described. Three of these sites are located within the nickel mining regions of Enonkoski, Kotalahti and Vammala, while the fourth is a small Ni mineralization at Hyvelae, Noormarkku. The four reference sites are all of Svecokarelian age. (refs.).

  14. A Survey on Cross-Layer Intrusion Detection System for Wireless ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... excessive packet collision, artificially increases contention, decrease signal .... Intelligent security architecture was conducted by [36], as an intrusion ... the main disadvantages of this scheme is: The IDS node is static (runs ...

  15. Immiscibility of Fluid Phases at Magmatic-hydrothermal Transition: Formation of Various PGE-sulfide Mineralization for Layered Basic Intrusions

    Science.gov (United States)

    Zhitova, L.; Borisenko, A.; Morgunov, K.; Zhukova, I.

    2007-12-01

    Fluid inclusions in quartz of the Merensky Reef (Bushveld Complex, South Africa) and the Chineisky Pluton (Transbaikal Region, Russia) were studied using cryometry, microthermometry, Raman-spectroscopy, LA ICP- MS, scanning electronic microscopy, gas-chromatography and isotopic methods. This allowed us to document some examples of fluid phase separation resulting in formation of different types of PGE-sulfide mineralization for layered basic intrusions. The results obtained show at least three generations of fluid separated from boiling residual alumosilicate intercumulus liquid of the Merensky Reef. The earliest fluid phase composed of homogenous high-dense methane and nitrogen gas mixture was identified in primary gas and co-existing anomalous fluid inclusions from symplectitic quartz. The next generation, heterophase fluid, composed of brines containing a free low-dense (mostly of carbon dioxide) gas phase, was observed in primary multiphase and coexisting gas-rich inclusions of miarolitic quartz crystals. The latest generation was also a heterophase fluid (low salinity water-salt solution and free low-dense methane gas phase) found in primary water-salt and syngenetic gas inclusions from peripheral zones of miarolitic quartz crystals. For the Chineisky Pluton reduced endocontact magmatogene fluids changed to oxidized low salinity hydrothermal fluids in exocontact zone. This resulted in formation of sulfide-PGE enrichment marginal zones of intrusion. The results obtained give us a possibility to suggest that: 1) Fluid phase separation is a typical feature of magmatogene fluids for layered basic intrusions. 2) Reduced fluids can extract and transport substantial PGE and sulfide concentrations. 3) Oxidation of reduced fluids is one of the most important geochemical barriers causing abundant PGE minerals and sulfides precipitation. This in turn results in both formation of PGE reefs or enriched contact zones of layered basic intrusions. This work was supported by

  16. Layered crust-mantle transition zone below a large crustal intrusion in the Norwegian-Danish basin

    DEFF Research Database (Denmark)

    Sandrin, Alessandro; Nielsen, Lars; Thybo, Hans

    2009-01-01

    the lowermost crust (7.7 km/s) and the uppermost mantle (7.9-8.0 km/s). The seismic data show a "ringing" Moho below the western part of the intrusion. The coda trailing the main PmP reflection is about 1.0 s long and is composed of 4-5 wavelets. We demonstrate that this feature may be explained by a layered......The crust and uppermost mantle below the large positive gravity anomaly in the central part of the Norwegian-Danish Basin, the Silkeborg Gravity High (SGH), is investigated using controlled source seismic data. A more than 80 km long and ~ 20 km thick intrusion is interpreted. The seismic velocity...... transition zone between 30 and 35 km depth, where high-velocity layers of mantle affinity (7.9-8.05 km/s) alternate with layers of typical lower crustal velocity (6.7-7.3 km/s). The characteristics of this layering, which causes thePmP coda, are modelled by matching synthetic seismograms to the observed data...

  17. A Survey on Cross-Layer Intrusion Detection System for Wireless ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... forwarding, and open wireless medium are the factors that make ... Wireless Sensor Network (WSN) is a kind of network that ... These tiny sensors are mainly small sized and have low ..... they were integrated to WSN for intrusion detection in ..... Anomaly Detection Techniques for Smart City Wireless Sensor.

  18. Volcanic source inversion using a genetic algorithm and an elastic-gravitational layered earth model for magmatic intrusions

    Science.gov (United States)

    Tiampo, K. F.; Fernández, J.; Jentzsch, G.; Charco, M.; Rundle, J. B.

    2004-11-01

    Here we present an inversion methodology using the combination of a genetic algorithm (GA) inversion program, and an elastic-gravitational earth model to determine the parameters of a volcanic intrusion. Results from the integration of the elastic-gravitational model, a suite of FORTRAN 77 programs developed to compute the displacements due to volcanic loading, with the GA inversion code, written in the C programming language, are presented. These codes allow for the calculation of displacements (horizontal and vertical), tilt, vertical strain and potential and gravity changes on the surface of an elastic-gravitational layered Earth model due to the magmatic intrusion. We detail the appropriate methodology for examining the sensitivity of the model to variation in the constituent parameters using the GA, and present, for the first time, a Monte Carlo technique for evaluating the propagation of error through the GA inversion process. One application example is given at Mayon volcano, Philippines, for the inversion program, the sensitivity analysis, and the error evaluation. The integration of the GA with the complex elastic-gravitational model is a blueprint for an efficient nonlinear inversion methodology and its implementation into an effective tool for the evaluation of parameter sensitivity. Finally, the extension of this inversion algorithm and the error assessment methodology has important implications to the modeling and data assimilation of a number of other nonlinear applications in the field of geosciences.

  19. Alteration of Eudialyte and implications for the REE, ZR, and NB resources of the layered Kakortokites in the ILÍMAUSSAQ intrusion, South West Greenland

    DEFF Research Database (Denmark)

    Borst, Anouk Margaretha; Waight, Tod Earle; Smit, Matthijs Arjen

    2014-01-01

    The layered kakortokites in the southern part of the Ilímaussaq Intrusion are of great economic interest due to their high concentrations of REE, Zr, Nb and Ta. The prospective metals are largely contained in eudialyte, a complex sodium‐zirconosilicate and one of the major cumulus phases. Eudialyte...

  20. Stratigraphy, distribution, and evidence for mafic triggering of the ca. 8.5 ka Driftwood Pumice eruption, Makushin Volcano, Alaska, U.S.A

    Science.gov (United States)

    Lerner, Allan H.; Crowley, Peter D.; Nicolaysen, Kirsten P.; Hazlett, Richard W.

    2018-05-01

    Makushin Volcano on Unalaska Island, Alaska, threatens the Aleutian's largest population centers (Unalaska and Dutch Harbor), yet its eruption mechanisms are poorly known. This study presents a detailed stratigraphic and geochemical investigation of Makushin's most recent highly explosive event: the ca. 8.5 ka Driftwood Pumice eruption. The Driftwood Pumice has measured thicknesses of over 2.5 m, and isopach reconstructions estimate a total deposit volume of 0.3 to 1.6 km3, indicating a VEI 4-5 eruption. Proximal deposits consist of normally-graded, tan, dacitic to andesitic pumice, capped by a thinner dark layer of lower-silica andesitic scoria mixed with abundant lithic fragments. This stratigraphy is interpreted as an initial vent-clearing eruption that strengthened into a climactic ejection of pumice and ash and concluded with vent destabilization and the eruption of somewhat more mafic, gas-poor magma. Within the pumice, geochemical trends, disequilibrium mineral populations, and mineral zonation patterns show evidence of magma mixing between a bulk silicic magma and a mafic melt. Euhedral high-Ca plagioclase (An68-91) and high-Mg olivine (Fo69-77) phenocrysts are in disequilibrium with trachydacitic glass (65-68 wt% SiO2) and more abundant sodic plagioclase (An34-55), indicating the former originally crystallized in a more mafic melt. Tephra whole rock compositions become more mafic upwards through the deposit, ranging from a basal low-silica dacite to an andesite (total range: 60.8-63.3 wt% SiO2). Collectively, these compositional variations suggest magma mixing in the Driftwood Pumice (DWP) magma reservoir, with a systematic increase in the amount of a mafic component (up to 25%) upward through the deposit. Olivine-liquid and liquid-only thermometry indicate the mafic magma intruded at temperatures 140-200 °C hotter than the silicic magma. Diffusion rates calculated for 5-7 μm thick, lower-Mg rims on the olivine phenocrysts (Fo60 rim vs Fo76 bulk) suggest

  1. Understanding the monotonous life of open vent mafic volcanoes

    Science.gov (United States)

    Costa Rodriguez, F.; Ruth, D. C. S.; Bornas, M.; Rivera, D. J. V. I.

    2016-12-01

    Mafic open vent volcanoes display prominent degassing plumes during quiescence but also erupt frequently, every few months or years. Their small and mildly explosive eruptions (volatile contents indicate that the magma reservoir system extends at least to 5 km depth. Mg/Fe pyroxene zoning and diffusion modeling suggests that mafic magma intrusion in a shallow, crystal-rich and more evolved reservoir has occurred repeatedly. The time scale for this process is the same for all 9 events, starting about 2 years prior and continuing up to eruption. We estimate the relative proportions of injecting to resident magma that vary from about 0.2 to 0.7, probably reflecting the local crystal-melt interaction during intrusion. The near constant magma composition is probably the result of buffering of new incoming magma by a crystal-rich upper reservoir, and erupted magmas are physical mixtures. However, we do not find evidence of large-scale crystal recycling from one eruption to another, implying the resetting of the system after each event. The recurrent eruptions and intrusions could be driven by the near continuous degassing of the volcano that induces a mass imbalance which leads to magma movement from depth to the shallow system [e.g., 1]. [1] Girona et al. (2016). Science Reports doi:10.1038/srep18212

  2. Metasomatized and hybrid rocks associated with a Palaeoarchaean layered ultramafic intrusion on the Johannesburg Dome, South Africa

    Science.gov (United States)

    Anhaeusser, Carl R.

    2015-02-01

    The Johannesburg Dome occurs as an inlier of Palaeoarchaean-Mesoarchaean granitic rocks, gneisses and greenstones in the central part of the Kaapvaal Craton, South Africa. In the west-central part of the dome a large greenstone remnant is surrounded and intruded by ca. 3114 Ma porphyritic granodiorites. Referred to locally as the Zandspruit greenstone remnant, it consists of a shallow-dipping ultramafic complex comprised of a number of alternating layers of harzburgite and pyroxenite. The ultramafic rocks are metamorphosed to greenschist grade and have largely been altered to serpentinite and amphibolite (tremolite-actinolite). In the granite-greenstone contact areas the porphyritic granodiorite has partially assimilated the greenstones producing a variety of hybrid rocks of dioritic composition. The hybrid rocks contain enclaves or xenoliths of greenstone and, in places, orbicular granite structures. Particularly noteworthy is an unusual zone of potash-metasomatized rock, occurring adjacent to the porphyritic granodiorite, consisting dominantly of biotite and lesser amounts of carbonate, quartz and sericite. Large potash-feldspar megacrysts and blotchy aggregated feldspar clusters give the rocks a unique texture. An interpretation placed on these rocks is that they represent metasomatized metapyroxenites of the layered ultramafic complex. Field relationships and geochemical data suggest that the rocks were influenced by hydrothermal fluids emanating from the intrusive porphyritic granodiorite. The adjacent greenstones were most likely transformed largely by the process of infiltration metasomatism, rather than simple diffusion, as CO2, H2O as well as dissolved components were added to the greenstones. Element mobility appears to have been complex as those generally regarded as being immobile, such as Ti, Y, Zr, Hf, Ta, Nb, Th, Sc, Ni, Cr, V, and Co, have undergone addition or depletion from the greenstones. Relative to all the rocks analyzed from the greenstones

  3. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  4. Mafic inclusions in Yosemite granites and Lassen Pk lavas: records of complex crust-mantle interactions

    Energy Technology Data Exchange (ETDEWEB)

    Reid, J.B. Jr.; Flinn, J.E.

    1985-01-01

    This study compares three small-scale magmatic systems dominated by mafic/felsic interaction that appear to be analogs to the evolution of their larger host systems: mafic inclusions from modern Lassen Pk lavas along with inclusions and related synplutonic dike materials from granitoids in the Tuolumne Intrusive Series. Each system represents quickly chilled mafic melt previously contaminated by digestion of rewarmed, super-solidus felsic hosts. Contaminants occur in part as megacrysts of reworked oligoclase with lesser hb and biot. Within each group MgO-variation diagrams for Fe, Ca, Ti, Si are strikingly linear (r>.96); alkalis are decidedly less regular, and many hybrid rocks show a curious, pronounced Na enrichment. Field data, petrography, and best fit modeling suggests this may result from flow concentration of oligoclase xenocrysts within contaminated synplutonic dikes, and is preserved in the inclusions when dike cores chill as pillows in their felsic host. Dissolution of mafic inclusions erases these anomalies and creates a more regular series of two-component mafic-felsic mixtures in the large host system. The inclusions and dikes thus appear to record a variety of late-stage mafic-felsic interactive processes that earlier and on a larger scale created much of the compositional variety of their intermediate host rocks.

  5. Tectonic setting of the Great Dyke, Chembadzi, Chewore and Atchiza layered complexes in Zimbabwe and Mozambique

    International Nuclear Information System (INIS)

    Master, S.

    1990-01-01

    The Great Dyke of Zimbabwe is one of the largest ultramafic-mafic layered igneous complexexs in the world. Because of the economic importance of large layered intrusions like the Great Dyke, their tectonic setting is of great interest. The Chembadzi complex is a 14 km long, dyke-like layered intrusion up to 800m wide. The Chewore complex, which was thought to have the structure of an irregular lopolith, outcrops over an area of about 200 km in horst blocks in the lower Zambezi Valley in northern Zimbabwe. The Atchiza complex is situated just north of the Cahora Bassa lake and the Zambezi River valley in Mozambique. In considering the tectonic setting of the Great Dyke and its correlatives, most attention has been focussed on events in the Limpopo Mobile Belt, which were responsible for producing the fractures in the Zimbabwe craton that is occupied by the intrusives. 39 refs

  6. Conditions for the formation and atmospheric dispersion of a toxic, heavy gas layer during thermal metamorphism of coal and evaporite deposits by sill intrusion

    Science.gov (United States)

    Storey, Michael; Hankin, Robin K. S.

    2010-05-01

    There is compelling evidence for massive discharge of volatiles, including toxic species, into the atmosphere at the end of the Permian. It has been argued that most of the gases were produced during thermal metamorphism of coal and evaporite deposits in the East Siberia Tunguska basin following sill intrusion (Retallack and Jahren, 2008; Svensen et al., 2009). The release of the volatiles has been proposed as a major cause of environmental and extinction events at the end of the Permian, with venting of carbon gases and halocarbons to the atmosphere leading to global warming and atmospheric ozone depletion (Svensen et al., 2009) Here we consider the conditions required for the formation and dispersion of toxic, heavier than air, gas plumes, made up of a mixture of CO2, CH4, H2S and SO2 and formed during the thermal metamorphism of C- and S- rich sediments. Dispersion models and density considerations within a range of CO2/CH4 ratios and volatile fluxes and temperatures, for gas discharge by both seepage and from vents, allow the possibility that following sill emplacement much of the vast East Siberia Tunguska basin was - at least intermittently - covered by a heavy, toxic gas layer that was unfavorable for life. Dispersion scenarios for a heavy gas layer beyond the Siberian region during end-Permian times will be presented. REFERENCES G. J. Retallack and A. H. Jahren, Methane release from igneous intrusion of coal during Late Permian extinction events, Journal of Geology, volume 116, 1-20, 2008 H. Svensen et al., Siberian gas venting and the end-Permian environmental crisis, Earth and Planetary Science Letters, volume 277, 490-500, 2009

  7. 50 Myr of pulsed mafic magmatism in the High Arctic Large Igneous Province

    Science.gov (United States)

    Pearson, D. G.; Dockman, D. M.; Heaman, L. M.; Gibson, S. A.; Sarkar, C.

    2017-12-01

    Extensive and voluminous Cretaceous mafic magmatism in the Sverdrup Basin of Arctic Canada forms the circum-Arctic High Arctic Large Igneous Province (HALIP). The small number of published high-precision ages for this LIP indicate its eruption over a considerable timespan raising concerns over whether the HALIP can be strictly defined as a single LIP and questioning the role of a single or multiple plumes in its genesis. Here we present an integrated geochemical and geochronological study to better constrain the timing and cause of mafic magma genesis in the Canadian HALIP. Six new U-Pb and four 40Ar/39Ar ages of mafic lavas and intrusive sheets range from 121 Ma to 78 Ma. The U-Pb ages are the first analyzed from the mafic intrusions of Axel Heiberg and Ellesmere Islands. The new geochronology, combined with other published high-precision ages, reveal a > 50 Myr duration of mafic magmatism in the HALIP defined by three main pulses. Tholeiites dominate the initial 25 Myr of magmatism, transitioning to coeval emplacement of alkali and tholeiitic basalts. Whole-rock Sr-Nd isotope ratios indicate that both magma types are derived from a similar source dominated by convecting mantle. Rare-earth-element inversion models reveal that the alkalic and tholeiitic magmas were generated beneath a bimodal lithospheric `lid' thickness of 65 ± 5 and 45 ± 4 km, respectively. We suggest that the early 128 - 122 Ma tholeiitic event is primarily plume-generated and correlates across the circum-Arctic with the other HALIP tholeiites. Younger HALIP magmatism, with coeval alkalic and tholeiitic magmas erupting over 25 Myr, may be explained by alternating modes of edge-driven mantle convection as the primary control on magma genesis. A distal plume may have intensified magma production by edge-driven convection.

  8. Mathematical analysis of a viscoelastic-gravitational layered earth model for magmatic intrusion in the dynamic case

    Directory of Open Access Journals (Sweden)

    Alicia Arjona

    2015-11-01

    Full Text Available Volcanic areas present a lower effective viscosity than usually in the Earth's crust. It makes necessary to consider inelastic properties in deformation modelling. As a continuation of work done previously by some of the authors, this work is concerned with the proof that the perturbed equations representing the viscoelastic-gravitational displacements resulting from body forces embedded in a layered Earth model leads to a well-posed problem even for any kind of domains, with the natural boundary and transmission conditions. A homogeneous or stratified viscoelastic half-space has often been used as a simple earth model to calculate the displacements and gravity changes. Here we give a constructive proof of the existence of weak solutions and we show the uniqueness and the continuous dependence with respect to the initial data of weak solutions of the dynamic coupled viscoelastic-gravitational field equations.

  9. Impact of aerosol intrusions on sea-ice melting rates and the structure Arctic boundary layer clouds

    Science.gov (United States)

    Cotton, W.; Carrio, G.; Jiang, H.

    2003-04-01

    The Los Alamos National Laboratory sea-ice model (LANL CICE) was implemented into the real-time and research versions of the Colorado State University-Regional Atmospheric Modeling System (RAMS@CSU). The original version of CICE was modified in its structure to allow module communication in an interactive multigrid framework. In addition, some improvements have been made in the routines involved in the coupling, among them, the inclusion of iterative methods that consider variable roughness lengths for snow-covered ice thickness categories. This version of the model also includes more complex microphysics that considers the nucleation of cloud droplets, allowing the prediction of mixing ratios and number concentrations for all condensed water species. The real-time version of RAMS@CSU automatically processes the NASA Team SSMI F13 25km sea-ice coverage data; the data are objectively analyzed and mapped to the model grid configuration. We performed two types of cloud resolving simulations to assess the impact of the entrainment of aerosols from above the inversion on Arctic boundary layer clouds. The first series of numerical experiments corresponds to a case observed on May 4 1998 during the FIRE-ACE/SHEBA field experiment. Results indicate a significant impact on the microstructure of the simulated clouds. When assuming polluted initial profiles above the inversion, the liquid water fraction of the cloud monotonically decreases, the total condensate paths increases and downward IR tends to increase due to a significant increase in the ice water path. The second set of cloud resolving simulations focused on the evaluation of the potential effect of aerosol concentration above the inversion on melting rates during spring-summer period. For these multi-month simulations, the IFN and CCN profiles were also initialized assuming the 4 May profiles as benchmarks. Results suggest that increasing the aerosol concentrations above the boundary layer increases sea-ice melting

  10. C14–22 n-Alkanes in Soil from the Freetown Layered Intrusion, Sierra Leone: Products of Pt Catalytic Breakdown of Natural Longer Chain n-Alkanes?

    Directory of Open Access Journals (Sweden)

    John F. W. Bowles

    2018-03-01

    Full Text Available Soil above a platinum-group element (PGE-bearing horizon within the Freetown Layered Intrusion, Sierra Leone, contains anomalous concentrations of n-alkanes (CnH2n+2 in the range C14 to C22 not readily attributable to an algal or lacustrine origin. Longer chain n-alkanes (C23 to C31 in the soil were derived from the breakdown of leaf litter beneath the closed canopy humid tropical forest. Spontaneous breakdown of the longer chain n-alkanes to form C14–22 n-alkanes without biogenic or abiogenic catalysts is unlikely as the n-alkanes are stable. In the Freetown soil, the catalytic properties of the PGE (Pt in particular may lower the temperature at which oxidation of the longer chain n-alkanes can occur. Reaction between these n-alkanes and Pt species, such as Pt2+(H2O2(OH2 and Pt4+(H2O2(OH4 can bend and twist the alkanes, and significantly lower the Heat of Formation. Microbial catalysis is a possibility. Since a direct organic geochemical source of the lighter n-alkanes has not yet been identified, this paper explores the theoretical potential for abiogenic Pt species catalysis as a mechanism of breakdown of the longer n-alkanes to form C14–22 alkanes. This novel mechanism could offer additional evidence for the presence of the PGE in solution, as predicted by soil geochemistry.

  11. The genesis of Mo-Cu deposits and mafic igneous rocks in the Senj area, Alborz magmatic belt, Iran

    Science.gov (United States)

    Nabatian, Ghasem; Li, Xian-Hua; Wan, Bo; Honarmand, Maryam

    2017-11-01

    The geochemical and isotopic investigations were provided on the Upper Eocene Senj mafic intrusion and Mo-Cu mineralization to better understand the tectono-magmatic evolution and metallogeny of the central part of the Alborz magmatic belt. The Senj mafic intrusion is composed of gabbro to monzodiorite and monzonite in lithology, and intruded as a sill into volcano-sedimentary rocks of the Eocene Karaj Formation. The Karaj Formation consists of volcano-sedimentary rocks, such as altered crystalline to shaly tuffs. The Senj intrusion (39.7 ± 0.4 Ma) shows LILE and LREE enrichment and negative anomaly of Nb, Ta and Ti, the geochemical signatures similar to those from subduction-related mafic magmas. The Hf-O zircon analyses yield ɛHf(t) values of + 4.1 to + 11.1 and δ18O values of + 4.8 to + 6.2‰. The zircon isotopic signatures together with shoshonitic affinity in the Senj mafic samples suggest partial melting of an enriched lithospheric mantle that had already been metasomatized by slab-derived melts and fluids. The Mo-Cu mineralization mainly occurs as veins and veinlets in the volcano-sedimentary rocks of the Karaj Formation and is dominated by molybdenite with minor amounts of chalcopyrite, bornite, pyrite and tetrahedrite-tennantite. The associated gangue minerals are tremolite, actinolite, quartz, calcite, chlorite and epidote. The Senj Mo-Cu deposit formed in volcano-sedimentary rocks following the emplacement of the Late Eocene Senj sill. The source of molybdenite in the Senj deposit is dominantly from crustal materials as it is revealed by Re contents in the molybdenite minerals (0.5 to 0.7 ppm). In fact, the molybdenite occurrence may be a remobilization process related to the emplacement of the Senj mafic magma.

  12. The Mafic Lower Crust of Neoproterozoic age beneath Western Arabia: Implications for Understanding African Lower Crust

    Science.gov (United States)

    Stern, R. J.; Mooney, W. D.

    2011-12-01

    We review evidence that the lower crust of Arabia - and by implication, that beneath much of Africa was formed at the same time as the upper crust, rather than being a product of Cenozoic magmatic underplating. Arabia is a recent orphan of Africa, separated by opening of the Red Sea ~20 Ma, so our understanding of its lower crust provides insights into that of Africa. Arabian Shield (exposed in W. Arabia) is mostly Neoproterozoic (880-540 Ma) reflecting a 300-million year process of continental crustal growth due to amalgamated juvenile magmatic arcs welded together by granitoid intrusions that make up as much as 50% of the Shield's surface. Seismic refraction studies of SW Arabia (Mooney et al., 1985) reveal two layers, each ~20 km thick, separated by a well-defined Conrad discontinuity. The upper crust has average Vp ~6.3 km/sec whereas the lower crust has average Vp ~7.0 km/sec, corresponding to a granitic upper crust and gabbroic lower crust. Neogene (<30 ma) lava fields in Arabia (harrats) extend over 2500 km, from Yemen to Syria. Many of these lavas contain xenoliths, providing a remarkable glimpse of the lower-crustal and upper-mantle lithosphere beneath W. Arabia. Lower crustal xenoliths brought up in 8 harrats in Saudi Arabia, Jordan, and Syria are mostly 2-pyroxene granulites of igneous (gabbroic, anorthositic, and dioritic) origin. They contain plagioclase, orthopyroxene, and clinopyroxene, and a few contain garnet and rare amphibole and yield mineral-equilibrium temperatures of 700-900°C. Pyroxene-rich and plagioclase-rich suites have mean Al2O3 contents of 13% and 19%, respectively: otherwise the two groups have similar elemental compositions, with ~50% SiO2 and ~1% TiO2, with low K2O (<0.5%) and Na2O (1-3%). Both groups show tholeiitic affinities, unrelated to their alkali basalt hosts. Mean pyroxene-rich and plagioclase-rich suites show distinct mean MgO contents (11% vs. 7%), Mg# (67 vs. 55), and contents of compatible elements Ni (169 vs. 66 ppm

  13. Mantle reservoirs (EM-1, OIB, E-MORB and N-MORB), long duration and polystages history for PGE-bearing paleoproterozoic layered intrusions in the N-E part of Fennoscandian Shield.

    Science.gov (United States)

    Bayanova, Tamara; Nerovich, Ludmila; Serov, Pavel; Kunakkuzin, Evgeniy; Elizarov, Dmitriy

    2015-04-01

    Paleoproterozoic layered PGE -bearing intrusions located in the N-E part of the Fennoscandian Shield and have a total are about 2000 km2. Long multidisciplinary studies using isotope Nd-Sr, U-Pb and 3He/4He systematics permit create a big bank of geochemistry data for different part of the intrusions: barren and main Cu-Ni-Cr-Ti-V and PGE phases, dykes complexes and host rocks. Based on U-Pb isotope data (on baddeleyite and zircon) and Sm-Nd mineral isochrones (on rock-forming and sulphides minerals) there is distinguished long magmatic duration from 2.53 to 2.40 Ga. Using precise U-Pb and Sm-Nd data for different part of the intrusions there are established four main impulses: 2.53, 2.50, 2.45, and 2.40 Ga of magmatic (LIP) activities for gabbronorite, anothosite et.set. rocks. The primary reservoir for all precious and multimetal massifs are considered as enriched mantle EM-1 using ɛNd- ISr system with negative ɛNd values and low ISr data for whole rocks of the intrusions. Dyke complexes are presented as three groups: high Ti-ferrodolerites, low Ti and low Fe-gabbronorites. Complex isotope (U-Pb, Sm-Nd) and geochemistry (REE, ɛNd, ISr) data investigations reflect OIB, E-MORB and N-MORB reservoirs for its origin (Nerovich et all., 2014). Isotope 3He/4He and 3He concentrations for accessory minerals ( ilmenite, magnetite et. set ) from the layered paleoproterozoic intrusions reflect significant lower mantle component and upper mantle contribution. According to the model of binary mixing (Jahn et all, 2000) there were calculated mantle and core component into plume magmatic reservoir connected with the origin of the PGE paleoproterozoic intrusions. The mantle contributions lie in the interval from 85 to 93% and core component are very less. All investigations are devoted to memory of academician RAS, professor F.Mitrofanov (Russia), he was a leader of scientific school for geology, geochemistry and metallogenesis of ore deposits. The studies are

  14. Geochemical and isotopic evidence for Carboniferous rifting: mafic dykes in the central Sanandaj-Sirjan zone (Dorud-Azna, West Iran

    Directory of Open Access Journals (Sweden)

    Shakerardakani Farzaneh

    2017-06-01

    Full Text Available In this paper, we present detailed field observations, chronological, geochemical and Sr–Nd isotopic data and discuss the petrogenetic aspects of two types of mafic dykes, of alkaline to subalkaline nature. The alkaline mafic dykes exhibit a cumulate to foliated texture and strike NW–SE, parallel to the main trend of the region. The 40Ar/39Ar amphibole age of 321.32 ± 0.55 Ma from an alkaline mafic dyke is interpreted as an indication of Carboniferous cooling through ca. 550 °C after intrusion of the dyke into the granitic Galeh-Doz orthogneiss and Amphibolite-Metagabbro units, the latter with Early Carboniferous amphibolite facies grade metamorphism and containing the Dare-Hedavand metagabbro with a similar Carboniferous age. The alkaline and subalkaline mafic dykes can be geochemically categorized into those with light REE-enriched patterns [(La/YbN = 8.32–9.28] and others with a rather flat REE pattern [(La/YbN = 1.16] and with a negative Nb anomaly. Together, the mafic dykes show oceanic island basalt to MORB geochemical signature, respectively. This is consistent, as well, with the (Tb/YbPM ratios. The alkaline mafic dykes were formed within an enriched mantle source at depths of ˃ 90 km, generating a suite of alkaline basalts. In comparison, the subalkaline mafic dykes were formed within more depleted mantle source at depths of ˂ 90 km. The subalkaline mafic dyke is characterized by 87Sr/86Sr ratio of 0.706 and positive ɛNd(t value of + 0.77, whereas 87Sr/86Sr ratio of 0.708 and ɛNd(t value of + 1.65 of the alkaline mafic dyke, consistent with the derivation from an enriched mantle source. There is no evidence that the mafic dykes were affected by significant crustal contamination during emplacement. Because of the similar age, the generation of magmas of alkaline mafic dykes and of the Dare-Hedavand metagabbro are assumed to reflect the same process of lithospheric or asthenospheric melting. Carboniferous back-arc rifting is

  15. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  16. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  17. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  18. Time, space, and composition relations among northern Nevada intrusive rocks and their metallogenic implications

    Science.gov (United States)

    duBray, E.A.

    2007-01-01

    Northern Nevada contains ∼360 igneous intrusions subequally distributed among three age groups: middle Tertiary, Cretaceous, and Jurassic. These intrusions are dominantly granodiorite and monzogranite, although some are more mafic. Major-oxide and trace-element compositions of intrusion age groups are remarkably similar, forming compositional arrays that are continuous, overlapping, and essentially indistinguishable. Within each age group, compositional diversity is controlled by a combination of fractional crystallization and two-component mixing. Mafic intrusions represent mixing of mantle-derived magma and assimilated continental crust, whereas intermediate to felsic intrusions evolved by fractional crystallization. Several petrologic parameters suggest that the northern Nevada intrusion age groups formed in a variety of subduction-related, magmatic arc settings: Jurassic intrusions were likely formed during backarc, slab-window magmatism related to breakoff of the Mezcalera plate; Cretaceous magmatism was related to rapid, shallow subduction of the Farallon plate and consequent inboard migration of arc magmatism; and Tertiary magmatism initially swept southward into northern Nevada in response to foundering of the Farallon plate and was followed by voluminous Miocene bimodal magmatism associated with backarc continental rifting.

  19. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  20. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  1. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  2. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  3. Structural control on basaltic dike and sill emplacement, Paiute Ridge mafic intrusion complex, southern Nevada

    International Nuclear Information System (INIS)

    Carter Krogh, K.E.; Valentine, G.A.

    1996-08-01

    Late Miocene basaltic sills and dikes in the Paiute Ridge area of southern nevada show evidence that their emplacement was structurally controlled. Basaltic dikes in this area formed by dilating pre-existing vertical to steeply E-dipping normal faults. Magma propagation along these faults must have required less energy than the creation of a self-propagated fracture at dike tips and the magma pressure must have been greater than the compressive stress perpendicular to the fault surface. N- to NE-trending en echelon dikes formed locally and are not obviously attached to the three main dikes in the area. The en echelon segments are probably pieces of deeper dikes, which are segmented perhaps as a result of a documented rotation of the regional stresses. Alternatively, changes in orientation of principal stresses in the vicinity of each en echelon dike could have resulted from local loads associated with paleotopographic highs or nearby structures. Sills locally branched off some dikes within 300 m of the paleosurface. These subhorizontal bodies occur consistently in the hanging wall block of the dike-injected faults, and intrude Tertiary tuffs near the Paleozoic-Tertiary contact. The authors suggest that the change in stresses near the earth's surface, the material strength of the tuff and paleozoic rocks, and the Paleozoic bedding dip direction probably controlled the location of sill formation and direction of sill propagation. The two largest sills deflected the overlying tuffs to form lopoliths, indicating that the magma pressure exceeded vertical stresses at that location and that the shallow level and large size of the sills allowed interaction with the free (earth's) surface. 32 refs., 4 figs., 1 tab

  4. Geochemistry and origin of metamorphosed mafic rocks from the Lower Paleozoic Moretown and Cram Hill Formations of North-Central Vermont: Delamination magmatism in the western New England appalachians

    Science.gov (United States)

    Coish, Raymond; Kim, Jonathan; Twelker, Evan; Zolkos, Scott P.; Walsh, Gregory J.

    2015-01-01

    The Moretown Formation, exposed as a north-trending unit that extends from northern Vermont to Connecticut, is located along a critical Appalachian litho-tectonic zone between the paleomargin of Laurentia and accreted oceanic terranes. Remnants of magmatic activity, in part preserved as metamorphosed mafic rocks in the Moretown Formation and the overlying Cram Hill Formation, are a key to further understanding the tectonic history of the northern Appalachians. Field relationships suggest that the metamorphosed mafic rocks might have formed during and after Taconian deformation, which occurred at ca. 470 to 460 Ma. Geochemistry indicates that the sampled metamorphosed mafic rocks were mostly basalts or basaltic andesites. The rocks have moderate TiO2 contents (1–2.5 wt %), are slightly enriched in the light-rare earth elements relative to the heavy rare earths, and have negative Nb-Ta anomalies in MORB-normalized extended rare earth element diagrams. Their chemistry is similar to compositions of basalts from western Pacific extensional basins near volcanic arcs. The metamorphosed mafic rocks of this study are similar in chemistry to both the pre-Silurian Mount Norris Intrusive Suite of northern Vermont, and also to some of Late Silurian rocks within the Lake Memphremagog Intrusive Suite, particularly the Comerford Intrusive Complex of Vermont and New Hampshire. Both suites may be represented among the samples of this study. The geochemistry of all samples indicates that parental magmas were generated in supra-subduction extensional environments during lithospheric delamination.

  5. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  6. Petrogenesis of the Alaskan-type mafic-ultramafic complex in the Makkah quadrangle, western Arabian Shield, Saudi Arabia

    Science.gov (United States)

    Habtoor, Abdelmonem; Ahmed, Ahmed Hassan; Harbi, Hesham

    2016-10-01

    -rich and Fe-rich varieties. All spinel varieties in the mafic-ultramafic rocks have high Fe3 + and TiO2 contents. The estimated melt composition in equilibrium with Gabal Taftafan complex is mostly similar to that of the SSZ boninitic magmas. The Taftafan mafic-ultramafic rocks show many similarities with the Alaskan-type mafic-ultramafic complexes, including the internal zonal lithology, bulk rock geochemistry, and mineral chemistry. Thus, it is neither related to a fragment of ophiolite sequence nor to the stratiform mafic-ultramafic intrusion. The location of the Taftafan complex along a major fracture zone parallel to the suture between Jeddah and Asir terranes in addition to the aforementioned striking similarities to the Alaskan-type complexes, suggests a formation in subduction-related setting from a common hydrous mafic magma.

  7. Pseudotachylitic breccia in mafic and felsic rocks

    Science.gov (United States)

    Kovaleva, Elizaveta; Huber, Matthew S.

    2017-04-01

    Impact-produced pseudotachylitic breccia (PTB) is abundant in the core of the Vredefort impact structure and was found in many pre-impact lithologies (e.g., Reimold and Colliston, 1994; Gibson et al., 1997). The mechanisms involved in the process of forming this rock remain highly debated, and various authors have discussed many possible models. We investigate PTB from two different rock types: meta-granite and meta-gabbro and test how lithology controls the development of PTB. We also report on clast transport between different lithologies. In the core of the Vredefort impact structure, meta-granite and meta-gabbro are observed in contact with each other, with an extensive set of PTB veins cutting through both lithologies. Microstructural analyses of the PTB veins in thin sections reveals differences between PTBs in meta-granite and meta-gabbro. In granitic samples, PTB often develops along contacts of material with different physical properties, such as a contact with a migmatite or pegmatite vein. Nucleation sites of PTB have features consistent with ductile deformation and shearing, such as sigmoudal-shaped clasts and dragged edges of the veins. Preferential melting of mafic and hydrous minerals takes place (e.g., Reimold and Colliston, 1994; Gibson et al., 2002). Refractory phases remain in the melt as clasts and form reaction rims. In contrast, PTB in meta-gabbro develop in zones with brittle deformation, and do not exploit existing physical contacts. Cataclastic zones develop along the faults and progressively produce ultracataclasites and melt. Thus, PTB veins in meta-gabbro contain fewer clasts. Clasts usually represent multi-phase fragments of host rock and not specific phases. Such fragments often originate from the material trapped between two parallel or horse-tail faults. The lithological control on the development of PTB does not imply that PTB develops independently in different lithologies. We have observed granitic clasts within PTB veins in meta

  8. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  9. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  10. The Torres del Paine intrusion as a model for a shallow magma chamber

    Science.gov (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  11. High precision ages from the Torres del Paine Intrusion, Chile

    Science.gov (United States)

    Michel, J.; Baumgartner, L.; Cosca, M.; Ovtcharova, M.; Putlitz, B.; Schaltegger, U.

    2006-12-01

    The upper crustal bimodal Torres del Paine Intrusion, southern Chile, consists of the lower Paine-Mafic- Complex and the upper Paine-Granite. Geochronologically this bimodal complex is not well studied except for a few existing data from Halpern (1973) and Sanchez (2006). The aim of this study is to supplement the existing data and to constrain the age relations between the major magmatic pulses by applying high precision U-Pb dating on accessory zircons and 40Ar/39Ar-laser-step-heating-ages on biotites from the Torres del Paine Intrusion. The magmatic rocks from mafic complex are fine to medium-grained and vary in composition from quartz- monzonites to granodiorites and gabbros. Coarse-grained olivine gabbros have intruded these rocks in the west. The granitic body is represented by a peraluminous, biotite-orthoclase-granite and a more evolved leucocratic granite in the outer parts towards the host-rock. Field observations suggest a feeder-zone for the granite in the west and that the granite postdates the mafic complex. Two granite samples of the outermost margins in the Northeast and South were analyzed. The zircons were dated by precise isotope-dilution U-Pb techniques of chemically abraded single grains. The data are concordant within the analytical error and define weighted mean 206/238U ages of 12.59 ± 0.03 Ma and 12.58 ± 0.01 Ma for the two samples respectively. A 40Ar/39Ar-age for the second sample yield a date of 12.37 ± 0.11 Ma. Three 40Ar/39Ar -ages of biotites were obtained for rocks belonging to the mafic complex. A hbl-bio- granodiorite from the central part, approximately 150 m below the subhorizontal contact with the granite, gives an age of 12.81 ± 0.11 Ma. A hbl-bio-granodiorite and an olivine-gabbro west of the feeder-zone date at 12.42 ± 0.14 Ma and 12.49 ± 0.11 Ma, respectively. The obtained older age of 12.81 Ma for the granodiorite in the central part is consistent with structural relationships of brittle fracturing of the mafic

  12. Interaction of coeval felsic and mafic magmas from the Kanker ...

    Indian Academy of Sciences (India)

    66

    20 crystallization of the latter, results in hybrid magmas under the influence of thermal and. 21 chemical exchange. The mechanical exchange occurs between the coexisting magmas due to. 22 viscosity contrast, if the mafic magma enters slightly later into the magma chamber, when the. 23 felsic magma started to crystallize.

  13. Mafic dykes at the southwestern margin of Eastern Ghats belt ...

    Indian Academy of Sciences (India)

    Ghats belt: Evidence of rifting and collision. S Bhattacharya. 1,∗ ... 1.3 Ga, which may have been initiated by intra-plate volcanism. 1. Introduction ... tively, is described as a compressional orogen. Keywords. ... charnockite gneiss, around Naraseraopet, AP (b) Thin mafic ... Sometimes orthopyroxene also occurs at margin of.

  14. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  15. Geochemistry and geodynamics of the Mawat mafic complex in the Zagros Suture zone, northeast Iraq

    Science.gov (United States)

    Azizi, Hossein; Hadi, Ayten; Asahara, Yoshihiro; Mohammad, Youssef Osman

    2013-12-01

    The Iraqi Zagros Orogenic Belt includes two separate ophiolite belts, which extend along a northwest-southeast trend near the Iranian border. The outer belt shows ophiolite sequences and originated in the oceanic ridge or supra-subduction zone. The inner belt includes the Mawat complex, which is parallel to the outer belt and is separated by the Biston Avoraman block. The Mawat complex with zoning structures includes sedimentary rocks with mafic interbedded lava and tuff, and thick mafic and ultramafic rocks. This complex does not show a typical ophiolite sequences such as those in Penjween and Bulfat. The Mawat complex shows evidence of dynamic deformation during the Late Cretaceous. Geochemical data suggest that basic rocks have high MgO and are significantly depleted in LREE relative to HREE. In addition they show positive ɛ Nd values (+5 to+8) and low 87Sr/86Sr ratios. The occurrence of some OIB type rocks, high Mg basaltic rocks and some intermediate compositions between these two indicate the evolution of the Mawat complex from primary and depleted source mantle. The absence of a typical ophiolite sequence and the presence of good compatibility of the source magma with magma extracted from the mantle plume suggests that a mantle plume from the D″ layer is more consistent as the source of this complex than the oceanic ridge or supra-subduction zone settings. Based on our proposed model the Mawat basin represents an extensional basin formed during the Late Paleozoic to younger along the Arabian passive margin oriented parallel to the Neo-Tethys oceanic ridge or spreading center. The Mawat extensional basin formed without creation of new oceanic basement. During the extension, huge volumes of mafic lava were intruded into this basin. This basin was squeezed between the Arabian Plate and Biston Avoraman block during the Late Cretaceous.

  16. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  17. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  18. Petrogenesis of siliceous high-Mg series rocks as exemplified by the Early Paleoproterozoic mafic volcanic rocks of the Eastern Baltic Shield: enriched mantle versus crustal contamination

    Science.gov (United States)

    Bogina, Maria; Zlobin, Valeriy; Sharkov, Evgenii; Chistyakov, Alexeii

    2015-04-01

    The Early Paleoproterozoic stage in the Earth's evolution was marked by the initiation of global rift systems, the tectonic nature of which was determined by plume geodynamics. These processes caused the voluminous emplacement of mantle melts with the formation of dike swarms, mafic-ultramafic layered intrusions, and volcanic rocks. All these rocks are usually considered as derivatives of SHMS (siliceous high-magnesian series). Within the Eastern Baltic Shield, the SHMS volcanic rocks are localized in the domains with different crustal history: in the Vodlozero block of the Karelian craton with the oldest (Middle Archean) crust, in the Central Block of the same craton with the Neoarchean crust, and in the Kola Craton with a heterogeneous crust. At the same time, these rocks are characterized by sufficiently close geochemical characteristics: high REE fractionation ((La/Yb)N = 4.9-11.7, (La/Sm)N=2.3-3.6, (Gd/Yb)N =1.66-2.74)), LILE enrichment, negative Nb anomaly, low to moderate Ti content, and sufficiently narrow variations in Nd isotope composition from -2.0 to -0.4 epsilon units. The tectonomagmatic interpretation of these rocks was ambiguous, because such characteristics may be produced by both crustal contamination of depleted mantle melts, and by generation from a mantle source metasomatized during previous subduction event. Similar REE patterns and overlapping Nd isotope compositions indicate that the studied basaltic rocks were formed from similar sources. If crustal contamination en route to the surface would play a significant role in the formation of the studied basalts, then almost equal amounts of contaminant of similar composition are required to produce the mafic rocks with similar geochemical signatures and close Nd isotopic compositions, which is hardly possible for the rocks spaced far apart in a heterogeneous crust. This conclusion is consistent with analysis of some relations between incompatible elements and their ratios. In particular, the

  19. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  20. Study of the mining possibilities in the surroundings of Mahoma - Guaycuru phase I Feasibility of the mafic body of Mahoma-Guaycuru and of the complex mafic - Stratified ultramafic of the Cerros Negros and San Jose and Colonia provinces

    International Nuclear Information System (INIS)

    Coronel, N.; Techera, J.; Ramos, E.; Pineyro, G.

    1990-01-01

    In Mahoma - Guaycuru area has been carried out regional cartography to place the geologic context, mainly the Mahoma bodies magmatic intrusive s, Guaycuru and Cerros Negros. The area has good mining possibilities due to their geologic environment. They exist also geochemical anomalies in the area that they should be taken as base for future works in the same one. In this environment studies were begun with the bodies magmatic mafic and ultramafic, due to its feasibility in Platino ides, Chromium, Nickel, Cobalt . It intent to adjust in a following stage (it Leaves II) a work methodology in an occurrence of minerals metallic. for future works,la occurrence of metallic minerals it lacks elements of economic interest in concentrations high, just as it demonstrates it the geochemical of rocks carried out, and the lack of anomalies in the geochemical of active silts and of floors. As element of interest single Gold appears in samples alluvial deposits but their source would not be the mafic rocks. Other occurrence of metallic minerals appears

  1. Shallow magma diversions during explosive maar-diatreme eruptions in mafic volcanic fields

    Science.gov (United States)

    Le Corvec, N.; Muirhead, J.; White, J. D. L.

    2017-12-01

    Maar-diatremes are inverted conical structures formed by subterranean excavation and remobilization of country rocks during explosive volcanism and common in mafic volcanic fields. We focus on impacts of excavation and filling of maar-diatremes on the local state of stress, and its subsequent influence on underlying feeder dikes, which are critical for understanding the development of intrusive networks that feed surface eruptions. We address this issue using finite element models in COMSOL Multiphysics®. Inverted conical structures of varying sizes are excavated in a gravitationally loaded elastic half-space, and then progressively filled with volcaniclastic material, resulting in changes in the orientations and magnitudes of stresses generated within surrounding rocks and within the filling portion of the maar-diatreme. Our results show that rapid unloading during maar-diatreme excavation generates a horizontal compressive stress state beneath diatremes. These stresses allow magma to divert laterally as saucer-shaped sills and circumferential dikes at varying depths in the shallow feeder system, and produce intrusion geometries consistent with both field observations from exhumed volcanic fields and conceptual models of diatreme growth. Stresses generated in these models also provide an explanation for the evolving locations of fragmentation zones over the course of diatreme's filling. In particular, results from this study suggest that: (1) extensional stresses at the base of the diatreme fill favor magma ascent in the lower half of the structure, and possibly promote volatile exsolution and magma fragmentation; and (2) increased filling of diatremes creates a shallow compressive stress state that can inhibit magma ascent to the surface, promoting widespread intra-diatreme explosions, efficient mixing of host rock, and upward widening of the diatreme structure.

  2. Devonian granitoids and their hosted mafic enclaves in the Gorny Altai terrane, northwestern Central Asian Orogenic Belt: crust-mantle interaction in a continental arc setting

    Science.gov (United States)

    Chen, Ming; Sun, Min

    2016-04-01

    Granitoids are a major component in the upper continental crust and hold key information on how did the continental crust grow and differentiate. This study focuses on the Yaloman intrusive complex from the Gorny Altai terrane, northwestern Central Asian Orogenic Belt (CAOB). The association of granitoids and mafic enclaves can provide important clues on the source nature, petrogenetic processes and geodynamic setting of the Yaloman intrusive complex, which in turn will shed light on the crustal evolution in the northwestern CAOB. Zircon U-Pb dating shows that the granitoids, including quartz diorites and granodiorites, were emplaced in ca. 389-387 Ma. The moderate Na2O + K2O contents and low A/CNK values indicate that these rocks belong to the sub-alkaline series with metaluminous to weakly peraluminous compositions. The granitoids yield two-stage zircon Hf model ages of ca. 0.79-1.07 Ga and whole-rock Nd model ages of ca. 0.90-0.99 Ga, respectively, implying that they were mainly sourced from Neoproterozoic juvenile crustal materials. The mafic enclaves show an almost identical crystallization age of ca. 389 Ma. The identification of coarse-grained xenocrysts and acicular apatites, together with the fine-grained texture, makes us infer that these enclaves are likely to represent magmatic globules commingled with the host magmas. The low SiO2 and high MgO contents of the mafic enclaves further suggest that substantial mantle-derived mafic melts were probably involved in their formation. Importantly, the SiO2 contents of the granitoids and mafic enclaves are well correlated with other major elements and most of the trace elements. Also a broadly negative correlation exists between the SiO2 contents and whole-rock epsilon Nd (390 Ma) values of the granitoids. Given the observation of reversely zoned plagioclases within the granitoids and the common occurrence of igneous mafic enclaves, we propose that magma mixing probably played an important role in the formation

  3. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  4. Rare-earth element geochemistry in the Luanga Mafic-Ultramafic Complex, Para

    International Nuclear Information System (INIS)

    Suita, M.T.F.; Nilson, A.A.

    1989-01-01

    Six whole-rock samples (harzburgite, orthopyroxenic and norite) of the Luanga Mafic-Ultramafic Complex (Para) were analysed for rare-earth elements (REE) through plasma spectrometry. The Luanga Complex is a deformed and metamorphosed layered mafic-ultramafic body of Archaean age. The Complex underwent medium-grade metamorphism in three stages. The first stage (medium grade) involved local formation of tremolite and reduction of Ca content in plagioclase. The second stage (low grade) consisted of serpentinization of amphibole or ortopyroxene forming bastile and generation of albite + epidote + white mica + actinolite from plagioclase. The third stage involved renewed serpentinization and/or talcification of pre-existing minerals (including serpentine) along fracture and fault surfaces. The analysed rocks display light rare-earth element (LREE) enrichment up to sixty times the composition of the Leedly chondrite and La/Yb ratios from 6.2 to 20.0 they are low in medium rare-earth elements (MREE), displaying discrete to strong negative Eu anomaly even in plagioclase cumulates and are slightly enriched in heavy rare-earth elements (HREE), usually higher than chondrite values. The low MREE area related to the occurrence of orthopyroxene (bronzite) in a way similar to the pattern of alpine periodotites, while HREE enrichment is compatible with the presence of bronzite and Mg-olivine, probably an inherited igneous feature. (author) [pt

  5. Geochronology and geochemistry of mafic dykes from the precambrians of Keonjhar, Orissa

    Energy Technology Data Exchange (ETDEWEB)

    Mallik, A K; Sarkar, Amitabha [Geological Survey of India, Calcutta (India). Geochronology and Isotope Geology Division

    1994-01-01

    Two generations of mafic dolerite dykes with distinct geochemical signatures are recorded in the Champua-Keonjhargarh area of Keonjhar district in the eastern Indian precambrian craton (EIPC) on the basis of geochemical and K-Ar isotopic studies. The younger group-II dykes (ca. 1250 Ma) are mostly Fe-tholeiities, whereas the older group-I dykes (2100 +/- 100 Ma) show a wider compositional spectrum from Mg-Fe tholeiites to komatiitic basalts. The group-I dolerites show higher MgO content, Mg value. CaO/(Na){sub 2}O + K{sub 2}O and lower Fe{sub 2}O{sub 3}(T) and TiO{sub 2} contents compared to those in the group-II dykes. Consistent with their comparatively evolved nature, the group-II dolerites have lower Cr, Ni, total REE, Rb/Sr ratio and incompatible element abundances than those in the group-I dolerite rocks. Both the generations of dolerites, however, reveal enrichment in compatible elements and in this respect are similar to proterozoic dykes elsewhere in the world. Both groups of dykes reveal Fe-enrichment trend typical of tholeiitic intrusions in the FMA diagram- a feature mimicked by plots in the (Y + Zr) - 100 x TiO{sub 2} - Cr diagram. The available isotopic age data pertaining to the newer dolerite suite of Singhbhum - Keonjhar region of the EIPC are reviewed. (author). 29 refs., 15 figs., 4 tabs.

  6. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  7. Petrology, geochemistry and tectonic settings of the mafic dikes and ...

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    margins of the basin, whereas, others are aligned .... areas of mantle upwelling, igneous intrusions, deep ... to and during the sedimentary accumulation, and ...... The development of continental margins in plate tectonic theory; J. Aust. Petrol.

  8. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  9. Intrusion of basaltic magma into a crystallizing granitic magma chamber: The Cordillera del Paine pluton in southern Chile

    Science.gov (United States)

    Michael, Peter J.

    1991-10-01

    The Cordillera del Paine pluton in the southernmost Andes of Chile represents a deeply dissected magma chamber where mafic magma intruded into crystallizing granitic magma. Throughout much of the 10x15 km pluton, there is a sharp and continuous boundary at a remarkably constant elevation of 1,100 m that separates granitic rocks (Cordillera del Paine or CP granite: 69 77% SiO2) which make up the upper levels of the pluton from mafic and comingled rocks (Paine Mafic Complex or PMC: 45 60% SiO2) which dominate the lower exposures of the pluton. Chilled, crenulate, disrupted contacts of mafic rock against granite demonstrate that partly crystallized granite was intruded by mafic magma which solidified prior to complete crystallization of the granitic magma. The boundary at 1,100 m was a large and stable density contrast between the denser, hotter mafic magma and cooler granitic magma. The granitic magma was more solidified near the margins of the chamber when mafic intrusion occurred, and the PMC is less disrupted by granites there. Near the pluton margins, the PMC grades upward irregularly from cumulate gabbros to monzodiorites. Mafic magma differentiated largely by fractional crystallization as indicated by the presence of cumulate rocks and by the low levels of compatible elements in most PMC rocks. The compositional gap between the PMC and CP granite indicates that mixing (blending) of granitic magma into the mafic magma was less important, although it is apparent from mineral assemblages in mafic rocks. Granitic magma may have incorporated small amounts of mafic liquid that had evolved to >60% SiO2 by crystallization. Mixing was inhibited by the extent of crystallization of the granite, and by the thermal contrast and the stable density contrast between the magmas. PMC gabbros display disequilibrium mineral assemblages including early formed zoned olivine (with orthopyroxene coronas), clinopyroxene, calcic plagioclase and paragasite and later-formed amphibole

  10. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  11. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  12. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  13. A hybrid composite dike suite from the northern Arabian Nubian Shield, southwest Jordan: Implications for magma mixing and partial melting of granite by mafic magma

    Science.gov (United States)

    Jarrar, Ghaleb H.; Yaseen, Najel; Theye, Thomas

    2013-03-01

    The Arabian Nubian Shield is an exemplary juvenile continental crust of Neoproterozoic age (1000-542 Ma). The post-collisional rift-related stage (~ 610 to 542 Ma) of its formation is characterized among others by the intrusion of several generations of simple and composite dikes. This study documents a suite of hybrid composite dikes and a natural example of partial melting of granite by a mafic magma from the northernmost extremity of Arabian Nubian Shield in southwest Jordan. The petrogenesis of this suite is discussed on the basis of field, petrographic, geochemical, and Rb/Sr isotopic data. These dikes give spectacular examples of the interaction between basaltic magma and the granitic basement. This interaction ranges from brecciation, partial melting of the host alkali feldspar granite to complete assimilation of the granitic material. Field structures range from intrusive breccia (angular partially melted granitic fragments in a mafic groundmass) to the formation of hybrid composite dikes that are up to 14 m in thickness. The rims of these dikes are trachyandesite (latite) with alkali feldspar ovoids (up to 1 cm in diameter); while the central cores are trachydacite to dacite and again with alkali feldspar ovoids and xenoliths from the dike rims. The granitic xenoliths in the intrusive breccia have been subjected to at least 33% partial melting. A seven-point Rb/Sr isochron from one of these composite dikes yields an age of 561 ± 33 Ma and an initial 87Sr/86Sr ratio of 0.70326 ± 0.0003 (2σ) and MSWD of 0.62. Geochemical modeling using major, trace, rare earth elements and isotopes suggests the generation of the hybrid composite dike suite through the assimilation of 30% to 60% granitic crustal material by a basaltic magma, while the latter was undergoing fractional crystallization at different levels in the continental crust.

  14. Isotopic variation in the Tuolumne Intrusive Suite, central Sierra Nevada, California

    Science.gov (United States)

    Kistler, R.W.; Chappell, B.W.; Peck, D.L.; Bateman, P.C.

    1986-01-01

    Granitoid rocks of the compositionally zoned Late Cretaceous Toulumne Intrusive Suite in the central Sierra Nevada, California, have initial87Sr/86Sr values (Sri) and143Nd/144Nd values (Ndi) that vary from 0.7057 to 0.7067 and from 0.51239 to 0.51211 respectively. The observed variation of both Sri and Ndi and of chemical composition in rocks of the suite cannot be due to crystal fractionation of magma solely under closed system conditons. The largest variation in chemistry, Ndi, and Sri is present in the outer-most equigranular units of the Tuolumne Intrusive Suite. Sri varies positively with SiO2, Na2O, K2O, and Rb concentrations, and negatively with Ndi, Al2O3, Fe2O3, MgO, FeO, CaO, MnO, P2O5, TiO2, and Sr concentrations. This covariation of Sri, Ndi and chemistry can be modeled by a process of simple mixing of basaltic and granitic magmas having weight percent SiO2 of 48.0 and 73.3 respectively. Isotopic characteristic of the mafic magma are Sri=0.7047, Ndi=0.51269 and ??18O=6.0, and of the felsic magma are Sri=0.7068, Ndi=0.51212 and ??18O=8.9. The rocks sampled contain from 50 to 80% of the felsic component. An aplite in the outer equigranular unit of the Tuolumne Intrusive Suite apparently was derived by fractional crystallization of plagioclase and hornblende from magma with granudiorite composition that was a product of mixing of the magmas described above. Siliceous magmas derived from the lower crust, having a maximum of 15 percent mantle-derived mafic component, are represented by the inner prophyritic units of the Tuolumne Intrusive Suite. ?? 1986 Springer-Verlag.

  15. Mafic microgranular enclave swarms in the Chenar granitoid stock, NW of Kerman, Iran: evidence for magma mingling

    Science.gov (United States)

    Arvin, M.; Dargahi, S.; Babaei, A. A.

    2004-10-01

    Mafic microgranular enclaves (MME) are common in the Early to Middle Miocene Chenar granitoid stock, northwest of Kerman, which is a part of Central Iranian Eocene volcanic belt. They occur individually and in homogeneous or heterogeneous swarms. The MME form a number of two-dimensional structural arrangements, such as dykes, small rafts, vortices, folded lens-shapes and late swarms. The enclaves are elongated, rounded to non-elongated and subrounded in shape and often show some size-sorting parallel to direction of flow. Variation in the elongation of enclaves could reflect variations in the viscosity of the enclave, the time available for enclave deformation and differential strain during flow of the host granitoid magma. The most effective mechanism in the formation of enclave swarms in the Chenar granitoid stock was velocity gradient-related convection currents in the granitoid magma chamber. Gravitational sorting and the break-up of heterogeneous dykes also form MME swarms. The MME (mainly diorite to diorite gabbro) have igneous mineralogy and texture, and are marked by sharp contacts next to their host granitoid rocks. The contact is often marked by a chilled margin with no sign of solid state deformation. Evidence of disequilibrium is manifested in feldspars by oscillatory zoning, resorbed rims, mantling and punctuated growth, together with overgrowth of clinopyroxene/amphibole on quartz crystals, the acicular habit of apatites and the development of Fe-Ti oxides along clinopyroxene cleavages. These observations suggest that the MMEs are derived from a hybrid-magma formed as a result of the intrusion of a mafic magma into the base of a felsic magma chamber. The density contrast between hybrid-magma and the overlying felsic magma was reduced by the release of dissolved fluids and the ascent of exsolved gas bubbles from the mafic magma into the hybrid zone. Further convection in the magma chamber dispersed the hybridized magma as globules in the upper parts of

  16. Thermal diffusivity of felsic to mafic granulites at elevated temperatures

    Science.gov (United States)

    Ray, Labani; Förster, H.-J.; Schilling, F. R.; Förster, A.

    2006-11-01

    The thermal diffusivity of felsic and intermediate granulites (charnockites, enderbites), mafic granulites, and amphibolite-facies gneisses has been measured up to temperatures of 550 °C using a transient technique. The rock samples are from the Archean and Pan-African terranes of the Southern Indian Granulite Province. Thermal diffusivity at room temperature ( DRT) for different rock types ranges between 1.2 and 2.2 mm 2 s - 1 . For most of the rocks, the effect of radiative heat transfer is observed at temperatures above 450 °C. However, for few enderbites and mafic granulites, radiative heat transfer is negligible up to 550 °C. In the temperature range of conductive heat transfer, i.e., between 20 ° and 450 °C, thermal diffusivity decreases between 35% and 45% with increasing temperature. The temperature dependence of the thermal diffusivity is directly correlated with the thermal diffusivity at room temperature, i.e., the higher the thermal diffusivity at room temperature, DRT, the greater is its temperature dependence. In this temperature range i.e., between 20 and 450 °C, thermal diffusivity can be expressed as D = 0.7 mm 2 s -1 + 144 K ( DRT - 0.7 mm 2 s -1 ) / ( T - 150 K), where T is the absolute temperature in Kelvin. At higher temperatures, an additional radiative contribution is observed according to CT3, where C varies from 10 - 9 to 10 - 10 depending on intrinsic rock properties (opacity, absorption behavior, grain size, grain boundary, etc). An equation is presented that describes the temperature and pressure dependence thermal diffusivity of rocks based only on the room-temperature thermal diffusivity. Room-temperature thermal diffusivity and its temperature dependence are mainly dependent on the major mineralogy of the rock. Because granulites are important components of the middle and lower continental crust, the results of this study provide important constraints in quantifying more accurately the thermal state of the deeper continental

  17. Panorama Pluton : a composite gabbro-monzodiorite early Ross Orogeny intrusion in southern Victoria Land, Antarctica

    International Nuclear Information System (INIS)

    Mellish, S.D.; Cooper, A.F.; Walker, N.W.

    2002-01-01

    The Koettlitz Glacier Alkaline Province of the Walcott Glacier to Radian Glacier area of the Transantarctic Mountains contains a diverse suite of intrusions ranging from gabbro and diorite to granite, nepheline syenite, and carbonatite. Most of the plutons are alkaline (A-type), although the Panorama Pluton is mafic, comprising both hypersthene normative gabbroic and quartz normative monzodioritic lithologies. The pluton has a composite nature, determined by whole-rock geochemical trends and Nd-Sr isotope data that reflect distinctive source regions for the different components. U-Pb geochronology of zircon and titanite indicates the Panorama Pluton was intruded during the early stages of the Neoproterozoic-early Paleozoic Ross Orogeny at 535 ± 9 Ma, and that it is coeval with the geochemically similar Dromedary Mafic Complex which crops out 10 km to the southeast. The Panorama Pluton is a volumetrically minor mafic component of the Koettlitz Glacier Alkaline Province, which predates, by at least 15 m.y., the dominant calc-alkaline suites that occur along-strike in the Dry Valleys area to the north, and the central Transantarctic Mountains to the south. The Panorama Pluton magmas, and other Koettlitz Glacier Alkaline Province lithologies, are interpreted to have formed in an extensional or transtensional jog that predates the onset of widespread Ross Orogeny subduction. (author). 48 refs., 7 figs., 3 tabs

  18. Petrographic, geochemical and isotopic evidence of crustal assimilation processes in the Ponte Nova alkaline mafic-ultramafic massif, SE Brazil

    Science.gov (United States)

    Azzone, Rogério Guitarrari; Montecinos Munoz, Patricio; Enrich, Gaston Eduardo Rojas; Alves, Adriana; Ruberti, Excelso; Gomes, Celsode Barros

    2016-09-01

    Crustal assimilation plus crystal fractionation processes of different basanite magma batches control the evolution of the Ponte Nova cretaceous alkaline mafic-ultramafic massif in SE Brazil. This massif is composed of several intrusions, the main ones with a cumulate character. Disequilibrium features in the early-crystallized phases (e.g., corrosion and sieve textures in cores of clinopyroxene crystals, spongy-cellular-textured plagioclase crystals, gulf corrosion texture in olivine crystals) and classical hybridization textures (e.g., blade biotite and acicular apatite crystals) provide strong evidence of open-system behavior. All samples are olivine- and nepheline-normative rocks with basic-ultrabasic and potassic characters and variable incompatible element enrichments. The wide ranges of whole-rock 87Sr/86Sri and 143Nd/144Ndi ratios (0.70432-0.70641 and 0.512216-0.512555, respectively) are indicative of crustal contribution from the Precambrian basement host rocks. Plagioclase and apatite 87Sr/86Sr ratios (0.70422-0.70927) obtained for the most primitive samples of each intrusion indicate disequilibrium conditions from early- to principal-crystallization stages. Isotope mixing-model curves between the least contaminated alkaline basic magma and heterogeneous local crustal components indicate that each intrusion of the massif is differentiated from the others by varied degrees of crustal contribution. The primary mechanisms of crustal contribution to the Ponte Nova massif involve the assimilation of host rock xenoliths during the development of the chamber environment and the assimilation of partial melts from the surrounding host rocks. Thermodynamic models using the melts algorithm indicate that parental alkaline basic magmas can be strongly affected by contamination processes subsequently to their initial stages of crystallization when there is sufficient energy to assimilate partial melts of crustal host rocks. The assimilation processes are considered to

  19. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  20. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  1. Multiple alteration events in the East Bull Lake anorthosite-gabbro layered complex, NE Ontario, Canada: evidence from fracture mineralogy and 40Ar-39Ar dating

    International Nuclear Information System (INIS)

    Kamineni, D.C.; McCrank, G.F.; Stone, D.; Geological Survey of Canada, Ottawa, Ontario)

    1987-01-01

    The East Bull Lake anorthosite-gabbro layered complex contains a variety of alteration minerals. Some of the more common ones are calcic amphiboles, biotite, epidote, adularia, quartz, chlorite, calcite, prehnite, pumpellyite, laumontite, gypsum, iron hydroxides and clays. The mode of occurrence and the data related to the stability of the alteration minerals suggest that they were formed under pressure-temperature conditions of: (1) epidote-amphibolite/greenschist facies; (2) prehnite-pumpellyite facies; (3) zeolite facies; and (4) low-temperature mineral facies. 40 Ar- 39 Ar data of hornblende and adularia indicate that the pluton is affected by distinct alteration events. Two mafic dyke intrusions, that overlap the alteration events, are recognised in the pluton. Synthesis of available radiometric ages suggests that the pluton intruded at 2472 +- 70 Ma, and was subjected to alteration as late as the Paleozoic and Cenozoic Eras. (author)

  2. Crustal contamination versus an enriched mantle source for intracontinental mafic rocks: Insights from early Paleozoic mafic rocks of the South China Block

    Science.gov (United States)

    Xu, Wenjing; Xu, Xisheng; Zeng, Gang

    2017-08-01

    Several recent studies have documented that the silicic rocks (SiO2 > 65 wt.%) comprising Silicic Large Igneous Provinces are derived from partial melting of the crust facilitated by underplating/intraplating of "hidden" large igneous province-scale basaltic magmas. The early Paleozoic intracontinental magmatic rocks in the South China Block (SCB) are dominantly granitoids, which cover a combined area of 22,000 km2. In contrast, exposures of mafic rocks total only 45 km2. These mafic rocks have extremely heterogeneous isotopic signatures that range from depleted to enriched (whole rock initial 87Sr/86Sr = 0.7041-0.7102; εNd(t) = - 8.4 to + 1.8; weighted mean zircon εHf(t) = - 7.4 to + 5.2), show low Ce/Pb and Nb/U ratios (0.59-13.1 and 3.5-20.9, respectively), and variable Th/La ratios (0.11-0.51). The high-MgO mafic rocks (MgO > 10 wt.%) tend to have lower εNd(t) values (- 4) and Sm/Nd ratios (> 0.255). The differences in geochemistry between the high-MgO and low-MgO mafic rocks indicate greater modification of the compositions of high-MgO mafic magmas by crustal material. In addition, generally good negative correlations between εNd(t) and initial 87Sr/86Sr ratios, MgO, and K2O, along with the presence of inherited zircons in some plutons, indicate that the geochemical and isotopic compositions of the mafic rocks reflect significant crustal contamination, rather than an enriched mantle source. The results show that high-MgO mafic rocks with fertile isotopic compositions may be indicative of crustal contamination in addition to an enriched mantle source, and it is more likely that the lithospheric mantle beneath the SCB during the early Paleozoic was moderately depleted than enriched by ancient subduction processes.

  3. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  4. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  5. Geochemistry and tectonic implications of the Early Carboniferous Keketuobie intrusion in the West Junggar foldbelt, NW China

    Science.gov (United States)

    Deng, Yu-Feng; Yuan, Feng; Zhou, Taofa; Hollings, Pete; Zhang, Dayu

    2018-06-01

    The Keketuobie intrusion is situated in the northern part of the West Junggar foldbelt at the southern margin of the Central Asian Orogeic Belt. The intrusion consists of medium- to coarse-grained gabbro, fine-grained gabbro and diorite. Igneous zircons from the medium- to coarse-grained gabbro yielded a LA-ICP-MS U-Pb age of 320.8 ± 5.7 Ma, indicating that the intrusion was emplaced in the Early Carboniferous. The intrusive contact between the medium- to coarse-grained gabbro and the fine-grained gabbro indicates they formed from distinct magma pulses. Magnetite crystals from the fine-grained gabbro have lower V2O3 but higher TiO2 and Al2O3 contents than those of the medium- to coarse-grained gabbro, suggesting that the fine-grained gabbro crystallized in a relatively higher fO2 and temperature magma than the medium- to coarse-grained gabbro. The Keketuobie intrusive rocks are characterized by enriched large ion lithophile elements and depleted high field strength elements relative to N-MORB with restricted (87Sr/86Sr)t ratios (0.70370-0.70400) and εNd(t) values (+5.85 to +6.97). The petrography and geochemistry are comparable to those of subduction-related volcanic rocks. The trace elements and isotopic compositions of the mafic intrusive rocks suggest that the primary magmas were derived from mixing of metasomatized lithospheric mantle and depleted asthenospheric melts, perhaps triggered by slab break-off. The Keketuobie intrusion is younger than adjacent ophiolite sequences, island arc volcanic rocks and porphyry deposits, but predates the post-collisional A-type granites and bimodal volcanic rocks in the district, suggesting that the Keketuobie intrusion likely formed in a syn-collisional setting.

  6. Mafic Materials in Scott Crater? A Test for Lunar Reconnaissance Orbiter

    Science.gov (United States)

    Cooper, Bonnie L.

    2007-01-01

    Clementine 750 nm and multispectral ratio data, along with Lunar Orbiter and radar data, were used to study the crater Scott in the lunar south polar region. The multispectral data provide evidence for mafic materials, impact melts, anorthositic materials, and a small pyroclastic deposit. High-resolution radar data and Lunar Orbiter photography for this area show differences in color and surface texture that correspond with the locations of the hypothesized mafic and anorthositic areas on the crater floor. This region provides a test case for the upcoming Lunar Reconnaissance Orbiter. Verification of the existence of a mafic deposit at this location is relevant to future lunar resource utilization planning.

  7. Early Cretaceous high-Ti and low-Ti mafic magmatism in Southeastern Tibet: Insights into magmatic evolution of the Comei Large Igneous Province

    Science.gov (United States)

    Wang, Yaying; Zeng, Lingsen; Asimow, Paul D.; Gao, Li-E.; Ma, Chi; Antoshechkina, Paula M.; Guo, Chunli; Hou, Kejun; Tang, Suohan

    2018-01-01

    The Dala diabase intrusion, at the southeastern margin of the Yardoi gneiss dome, is located within the outcrop area of the 132 Ma Comei Large Igneous Province (LIP), the result of initial activity of the Kerguelen plume. We present new zircon U-Pb geochronology results to show that the Dala diabase was emplaced at 132 Ma and geochemical data (whole-rock element and Sr-Nd isotope ratios, zircon Hf isotopes and Fe-Ti oxide mineral chemistry) to confirm that the Dala diabase intrusion is part of the Comei LIP. The Dala diabase can be divided into a high-Mg/low-Ti series and a low-Mg/high-Ti series. The high-Mg/low-Ti series represents more primitive mafic magma compositions that we demonstrate are parental to the low-Mg/high-Ti series. Fractionation of olivine and clinopyroxene, followed by plagioclase within the low-Mg series, lead to systematic changes in concentrations of mantle compatible elements (Cr, Co, Ni, and V), REEs, HFSEs, and major elements such as Ti and P. Some Dala samples from the low-Mg/high-Ti series contain large ilmenite clusters and show extreme enrichment of Ti with elevated Ti/Y ratios, likely due to settling and accumulation of ilmenite during the magma chamber evolution. However, most samples from throughout the Comei LIP follow the Ti-evolution trend of the typical liquid line of descent (LLD) of primary OIB compositions, showing strong evidence of control of Ti contents by differentiation processes. In many other localities, however, primitive magmas are absent and observed Ti contents of evolved magmas cannot be quantitatively related to source processes. Careful examination of the petrogenetic relationship between co-existing low-Ti and high-Ti mafic rocks is essential to using observed rock chemistry to infer source composition, location, and degree of melting.

  8. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  9. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  10. Possible Mafic Patches in Scott Crater Highlight the Need for Resource Exploration on the Lunar South Polar Region

    Science.gov (United States)

    Cooper, Bonnie L.

    2007-01-01

    Possible areas of mafic material on the rim and floor of Scott crater (82.1 deg S, 48.5 deg E) are suggested by analysis of shadow-masked Clementine false-color-ratio images. Mafic materials common in mare and pyroclastic materials can produce more oxygen than can highlands materials, and mafic materials close to the south pole may be important for propellant production for a future lunar mission. If the dark patches are confirmed as mafic materials, this finding would suggest that other mafic patches may exist, even closer to the poles, which were originally mapped as purely anorthositic.

  11. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  12. The structure of the Okavango giant mafic dyke swarm in the Karoo magmatic province of North Botswana

    Science.gov (United States)

    Le Gall, B.; Tshoso, G.; Tiercelin, J. J.; Dyment, J.; Aubourg, C.; Feraud, G.; Jourdan, F.; Bertrand, H.

    2003-04-01

    Field structural measurements combined to magnetic dataset (including both aero- and ground magnetic records) allow a systematic investigation of the structure of the Okavango giant (2000 x 100 km) mafic dyke swarm in N Botswana. The results are discussed about a 55 km-long projected section lying perpendicular to the densest zone of the swarm and cutting through Proterozoic granito-gneissic host-rocks. A total dyke population of 423 (magnetic records) or 171 (field data) individual intrusions is identified and consists principally of basalts and dolerites. New high-precision dating (Jourdan et al., this congress) demonstrates the composite nature of the Okavango swarm that includes Karoo dykes (70%) and additional (30%) Proterozoic intrusions. The two dyke populations lie with a similar strike and show no discriminant petro-structural features in the field. These new results make it difficult 1) discriminating Karoo versus Proterozoic dyke groups within the total population derived from magnetics, and 2) defining their respective structural characteristics. About the Karoo dyke population (360 intrusions), field structural observations help to constrain the statistical analysis of some of its geometrical parameters, such as the strike (N110°E), dip (vertical), lenght (ca. 5 km), thickness (18-20 m), spacing, or direction of dyke opening. The dyke-induced crustal dilatation is estimated to 6-10% across the 55 km-long reference section. Structural observations also emphazise the control exerted by preexisting basement fabrics (brittle joints and dykes) on Karoo dyke emplacement. Synmagmatic deformation is restricted to wall-parallel tensile joint networks with no evidence for extensional faulting. The Karoo part of the Okavango giant dyke swam is inferred to have been emplaced under an unidirectional extensional stress field (N70°E). Furthermore, analyzing the anisotropy of magnetic susceptibility of a number of dykes (Tshoso et al., this congress) indicates an

  13. The Dovyren Intrusive Complex (Southern Siberia, Russia): Insights into dynamics of an open magma chamber with implications for parental magma origin, composition, and Cu-Ni-PGE fertility

    Science.gov (United States)

    Ariskin, Alexey; Danyushevsky, Leonid; Nikolaev, Georgy; Kislov, Evgeny; Fiorentini, Marco; McNeill, Andrew; Kostitsyn, Yuri; Goemann, Karsten; Feig, Sandrin T.; Malyshev, Alexey

    2018-03-01

    The Dovyren Intrusive Complex (DIC, Northern Baikal region, 728 Ma) includes the layered dunite-troctolite-gabbronorite Yoko-Dovyren massif (YDM), associated mafic-ultramafic sills, and dykes of olivine-rich to olivine-free gabbronorite. Major rock types of the DIC are presented, including a diversity of olivine orthocumulates to olivine-plagioclase and gabbroic adcumulates, carbonate-contaminated ultramafics and Cu-Ni-PGE mineralisation. Detailed comparisons of complete cross-sections of the YDM in its centre and at the NE and SW margins demonstrate differences in the cumulate succession, mineral chemistry, and geochemical structure that likely reflect variations in parental magma compositions. Combining petrochemical reconstructions for most primitive rocks and calculations using the COMAGMAT-5 model, it is shown that the central and peripheral parts of the intrusion formed by olivine-laden parental magmas ranged in their temperatures by 100 °C, approximately from 1290 °C ( 11 wt% MgO, olivine Fo88) to 1190 °C ( 8 wt% MgO, olivine Fo86). Thermodynamic modelling suggests that the most primitive high-Mg magma was S-undersaturated, whereas its derivatives became S-saturated at T piles to generate poorly-mineralised plagiodunite. In the troctolite and gabbroic parts of the Dovyren chamber, sulphide immiscibility likely occurred at lower temperatures, producing Cu-rich sulphide precursors, which gave rise to the 'platinum group mineral' (PGM-containing) troctolite and low-mineralised PGE-rich anorthosite in the Main Reef. The geochemical structure of the YDM demonstrates C-shaped distributions of TiO2, K2O, P2O5, and incompatible trace elements, which are 3-5 fold depleted in the cumulate rocks from the inner horizons of the intrusion with respect to the relatively thin lower and upper contact zones. In addition, a marked misbalance between estimates of the average composition of the YDM and that of the proposed olivine-laden parental magmas is established. This

  14. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  15. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  16. Petrology, geochemistry and tectonic setting of alkaline mafic rocks in the Jalal Abad area in the NW of Zarand (Kerman Province: Evidence for Paleo-Tethys rifting in the Central Iran

    Directory of Open Access Journals (Sweden)

    Yusef Vesali

    2018-03-01

    Full Text Available The Jalal Abad region lies within the southern sector of Posht Badam block near to Jalal Abad, Najaf Abad iron deposits. In this region, several mafic intrusions and associated dyke and sills were intruded within the volcano-sedimentary unit of Rizu series and magnetite veins producing a narrow contact metamorphic aureole and overlain by Desu Series dolomites. These intrusion massives include irregular coarse- grained gabbro- diorites stocks and several NW-SE-trending basaltic dykes and sills. Petrographical and geochemical studies on the Jalal Abad mafic units reveal that they are alkaline in nature and based on the tectonic discrimination diagrams are grouped in alkaline basalts field of the intra-continental rift setting. They display LREE enrichment and HREE depletion, and significant enrichment in LILE in comparison to HFSE and HREE. Compositionally, they resemble modern OIB and the Hawaiian alkaline basalts. Magmas of these OIB-type and alkaline rock associations formed from partial melting of garnet- lherzolite facieses in the plume source, during the rift-drift and seafloor spreading evolution of the Proto-Tethys oceanic lithosphere during the Ordovician through Silurian periods.

  17. Intraplate mafic magmatism: New insights from Africa and N. America

    Science.gov (United States)

    Ebinger, C. J.; van der Lee, S.; Tepp, G.; Pierre, S.

    2017-12-01

    Plate tectonic concepts consider that continental interiors are stable, with magmatism and strain localized to plate boundaries. We re-evaluate the role of pre-existing and evolving lithospheric heterogeneities in light of perspectives afforded by surface to mantle results from active and ancient rift zones in Africa and N. America. Our process-oriented approach addresses the localization of strain and magmatism and stability of continental plate interiors. In both Africa and N. America, geophysical imaging and xenolith studies reveal that thick, buoyant, and chemically distinct Archaean cratons with deep roots may deflect mantle flow, and localize magmatism and strain over many tectonic cycles. Studies of the Colorado Plateau and East African rift reveal widespread mantle metasomatism, and high levels of magma degassing along faults and at active volcanoes. The volcanoes and magmatic systems show a strong dependence on pre-existing heterogeneities in plate structure. Syntheses of the EarthScope program ishow that lateral density contrasts and migration of volatiles that accumulated during subduction can refertilize mantle lithosphere, and enable volatile-rich magmatism beneath relatively thick continental lithosphere. For example, the passive margin of eastern N. America shows uplift and magmatism long after the onset of seafloor spreading, demonstrating the dynamic nature of coupling between the lithosphere, asthenosphere, and deeper mantle. As demonstrated by the East African Rift, the Mid-Continent Rift, and other active and ancient rift zones, the interiors of continents, including thick, cold Archaean cratons are not immune to mafic magmatism and tectonism. Recent studies in N. America and Africa reveal ca. 1000 km-wide zones of dynamic uplift, low upper mantle velocities, and broadly distributed strain. The distribution of magmatism and volatile release, in combination with geophysical signals, indicates a potentially convective origin for widespread

  18. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  19. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  20. As, Bi, Hg, S, Sb, Sn and Te geochemistry of the J-M Reef, Stillwater Complex, Montana: constraints on the origin of PGE-enriched sulfides in layered intrusions

    Science.gov (United States)

    Zientek, M.L.; Fries, T.L.; Vian, R.W.

    1990-01-01

    The J-M Reef is an interval of disseminated sulfides in the Lower Banded series of the Stillwater Complex that is enriched in the platinum group elements (PGE). Palladium and Pt occur in solid solution in base-metal sulfides and as discrete PGE minerals. PGE minerals include sulfides, tellurides, arsenides, antimonides, bismuthides, and alloys with Fe, Sn, Hg, and Au. Several subpopulations can be delineated based on whole-rock chemical analyses for As, Bi, Cu, Hg, Pd, Pt, S, Sb and Te for samples collected from and adjacent to the J-M Reef. In general, samples from within the reef have higher Pt/Cu, Pd/Cu, Pd/Pt, Te/Bi and S/(Te+Bi) than those collected adjacent to the reef. Vertical compositional profiles through the reef suggest that Pd/Cu and Pt/Cu decrease systematically upsection from mineralized to barren rock. The majority of samples with elevated As, Sb and Hg occur adjacent to the reef, not within it, or in sulfide-poor rocks. Neither magma mixing nor fluid migration models readily explain why the minor quantities of sulfide minerals immediately adjacent to the sulfide-enriched layers that form the J-M Reef have different element ratios than the sulfide minerals that form the reef. If all the sulfides formed by exsolution during a magma mixing event and the modal proportion of sulfide now in the rocks are simply the result of mechanical processes that concentrated the sulfides into some layers and not others, then the composition of the sulfide would not be expected to be different. Models that rely upon ascending liquids or fluids are incompatible with the presence of sulfides that are not enriched in PGE immediately below or interlayered with the PGE-enriched sulfides layers. PGE-enriched postcumulus fluids should have reacted to the same extent with sulfides immediately outside the reef as within the reef. One explanation is that some of the sulfide minerals in the rocks outside the reef have a different origin than those that make up the reef. The

  1. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  2. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  4. Mafic and ultramafic rocks, and platinum mineralisation potential, in the Longwood Range, Southland, New Zealand

    International Nuclear Information System (INIS)

    Ashley, P.; Craw, D.; Mackenzie, D.; Rombouts, M.; Reay, A.

    2012-01-01

    Intrusive rocks in the Longwood Range represent a component of the Permian Brook Street Terrane. They include diffusely layered, cumulate-textured olivine gabbro, troctolite, and gabbro, and gradations into non-cumulate gabbro and gabbronorite. Volumetrically small ultramafic layers occur (plagioclase wehrlite), and thin veins of felsic rocks ranging from quartz diorite to trondhjemite. Primary olivine, plagioclase, clinopyroxene, and subordinate orthopyroxene and hornblende are commonly altered or metamorphosed to amphiboles, minor spinel, magnetite, chlorite, biotite and clinozoisite, and serpentine in olivine-rich rocks. Accessory primary Ti-bearing magnetite and ilmenite occur, and trace Cr-magnetite is characteristic of olivine-rich rocks. Trace pyrrhotite, chalcopyrite, pentlandite, and pyrite could reflect equilibrated late magmatic, and alteration-derived phases. Key petrochemical characteristics of the rock suite are high Mg, Al, Ca, and Sr contents, and low alkali, LILE, and sulfur contents. Platinum and Pd are locally enriched in drill-hole intercepts, but zones appear unrelated to rock type, magnetic properties, or to S, Cu, Ni, Cr, or Au values. Local platinum group element (PGE) enrichment in altered rocks implies metamorphic and/or hydrothermal redistribution. Pervasive PGE enrichment in Longwood rocks is an indicator of potential 'fertility', but evidence is currently lacking for the precipitation of primary stratiform PGE accumulations from a sulfide liquid saturated magma. (author). 41 refs., 11 figs., 2 tabs.

  5. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  6. Platinum-Group Minerals in Chromitites of the Niquelândia Layered Intrusion (Central Goias, Brazil: Their Magmatic Origin and Low-Temperature Reworking during Serpentinization and Lateritic Weathering

    Directory of Open Access Journals (Sweden)

    Nelson Angeli

    2012-10-01

    Full Text Available A variety of platinum-group-minerals (PGM have been found to occur associated with the chromitite and dunite layers in the Niquelândia igneous complex. Two genetically distinct populations of PGM have been identified corresponding to phases crystallized at high temperatures (primary, and others formed or modified during post-magmatic serpentinization and lateritic weathering (secondary. Primary PGM have been found in moderately serpentinized chromitite and dunite, usually included in fresh chromite grains or partially oxidized interstitial sulfides. Due to topographically controlled lateritic weathering, the silicate rocks are totally transformed to a smectite-kaolinite-garnierite-amorphous silica assemblage, while the chromite is changed into a massive aggregate of a spinel phase having low-Mg and a low Fe3+/Fe2+ ratio, intimately associated with Ti-minerals, amorphous Fe-hydroxides, goethite, hematite and magnetite. The PGM in part survive alteration, and in part are corroded as a result of deep chemical weathering. Laurite is altered to Ru-oxides or re-crystallizes together with secondary Mg-ilmenite. Other PGM, especially the Pt-Fe alloys, re-precipitate within the altered chromite together with kaolinite and Fe-hydroxides. Textural evidence suggests that re-deposition of secondary PGM took place during chromite alteration, controlled by variation of the redox conditions on a microscopic scale.

  7. U-Pb zircon geochronology of intrusive and basement rocks in the Jacurici Valley region, Sao Francisco Craton, BA, Brazil

    International Nuclear Information System (INIS)

    Silveira, Carlos Jose Sobrinho da; Frantz, Jose Carlos; Marques, Juliana Charao; Roos, Siegbert; Peixoto, Vinicius Medina

    2015-01-01

    The Jacurici Complex, located in the NE of the Sao Francisco Craton, is constituted by several Cr-mineralized mafic-ultramafic N-S bodies, possible fragments of a single sill disrupted during deformation. Some works suggest it is intruded on the Serrinha Block while others consider it in the Salvador-Curaca Belt. The basement on this region is informally divided into paragneisses and orthogneisses; the latter is supposed to be younger considering it is less deformed. Petrography revealed that some of the paragneisses are alkali-feldspar granite strongly milonitized. The orthogneisses occur at the north and consist, at least in part, of monzogranites with heterogeneous deformation, locally of low temperature. U-Pb zircon dating were performed for five representative samples. Just three provided good concordia ages. A mafic rock produced a 2102 ± 5 Ma age and it is petrographically similar to the metanorites described in the Jacurici Complex, being interpreted as the record of the first pulses of the mafic magmatism. A monzogranite yielded a 2995 ± 15 Ma age, older than expected, related to the Serrinha Block. The alkali-feldspar granite yielded a 2081 ± 3 Ma age. The Itiuba Syenite and the pegmatites that crosscut the Jacurici Complex have similar ages. Considering the lack of information about the supracrustal sequence that hosts the intrusive alkaline and mafic-ultramafic rocks at the Ipueira and the Medrado areas, it is possible that part of the terrain belongs to the Salvador-Curaca Belt. We suggest that the Jacurici Complex could be intruded after the tectonic amalgamation between the Serrinha Block and the older part of the Salvador-Curaca Belt and, therefore, could be hosted by both terrains. (author)

  8. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  9. K-Ar geochronology of mafic dyke swarms from the meridional part of Sao Francisco craton and implications on tectonic context

    International Nuclear Information System (INIS)

    Teixeira, W.; Kawashita, K.; Pecchio, M.; Tame, N.R.

    1988-01-01

    The southern region of the Sao Francisco Craton is made up of gneissic-granitoid terranes (mainly of amphibolite facies) associated with supracrustals, which can be separed into two crustal provinces, the oldest formed during the Archean (3-2-2.6 Ga.), and the youngest in the Early Proterozoic (2.4-2.0 Ga.). Mafic dyke swarms inject the basement complexes in the area west of Belo Horizonte city, but not the Late proterozoic Bambui sedimentary cover. These dykes show NNW, NW, WNW, NNE and ENE trends and are of anorogenic character. Most dykes are tholeiitic in composition. Metamorphic recrystallization at greenschist to amphibolite facies as well as minor hidrothermal and/or deuteric transformations are characteristics in the majority of the these dykes. About sixty K/Ar determinations have been performed on plagioclases, amphiboles and whole rocks. They are interpretated combining the use of K/Ar diagrams and histogram, and according to the crustal evolution proposed for the craton. The available radiometric data suggest that the main period of mafic intrusions took place in the Early proterozoic as supported by the apparent ages on amphiboles. However, the beginning of the Middle Proterozoic (1.7-1.5 Ga.) probably corresponds to a period of tensional tectonics as well. On the other hand, most ages obtained on plagioclases and whole rocks, can be associated with Late Proterozoic processes of argon gain or loss. The results are tectonicaly associated with crustal rifting of the continental mass. This two radiometric groupings are characteristic for the evolution of the Early proterozoic crustal provine and of the Mid-Proterozoic intracratonic Espinhaco System respectively. The youngest Late Proterozoic apparent ages associated with the reflections of the contemporaneous evolution of the Braziliano marginal mobile belt which is also suggested by the partial resetting of the K/Ar ages of basement rocks within the eastern part of the Sao Francisco Craton. (author) [pt

  10. Multiple magmatism in an evolving suprasubduction zone mantle wedge: The case of the composite mafic-ultramafic complex of Gaositai, North China Craton

    Science.gov (United States)

    Yang, Fan; Santosh, M.; Tsunogae, T.; Tang, Li; Teng, Xueming

    2017-07-01

    The suprasubduction zone mantle wedge of active convergent margins is impregnated by melts and fluids leading to the formation of a variety of magmatic and metasomatic rock suites. Here we investigate a composite mafic-ultramafic intrusion at Gaositai, in the northern margin of the North China Craton (NCC). The hornblende gabbro-serpentinite-dunite-pyroxenite-gabbro-diorite suite surrounded by hornblendites of this complex has long been considered to represent an "Alaskan-type" zoned pluton. We present petrologic, mineral chemical, geochemical and zircon U-Pb and Lu-Hf data from the various rock types from Gaositai including hornblende gabbro, serpentinite, dunite, pyroxenite, diorite and the basement hornblendite which reveal the case of multiple melt generation and melt-peridotite interaction. Our new mineral chemical data from the mafic-ultramafic suite exclude an "Alaskan-type" affinity, and the bulk geochemical features are consistent with subduction-related magmatism with enrichment of LILE (K, Rb, and Ba) and LREE (La and Ce), and depletion of HFSE (Nb, Ta, Zr, and Hf) and HREE. Zircon U-Pb geochronology reveals that the hornblendites surrounding the Gaositai complex are nearly 2 billion years older than the intrusive complex and yield early Paleoproterozoic emplacement ages (2433-2460 Ma), followed by late Paleoproterozoic metamorphism (1897 Ma). The serpentinites trace the history of a long-lived and replenished ancient sub-continental lithospheric mantle with the oldest zircon population dated as 2479 Ma and 1896 Ma, closely corresponding with the ages obtained from the basement rock, followed by Neoproterozoic and Phanerozoic zircon growth. The oldest member in the Gaositai composite intrusion is the dunite that yields emplacement age of 755 Ma, followed by pyroxenite formed through the interaction of slab melt and wedge mantle peridotite at 401 Ma. All the rock suites also carry multiple population of younger zircons ranging in age from Paleozoic to

  11. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  12. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  13. Timing of mafic magmatism in the Tapajós Province (Brazil) and implications for the evolution of the Amazon Craton: evidence from baddeleyite and zircon U Pb SHRIMP geochronology

    Science.gov (United States)

    Santos, João Orestes Schneider; Hartmann, Léo Afraneo; McNaughton, Neal Jesse; Fletcher, Ian Robert

    2002-09-01

    The precise timing and possible sources of the mafic rocks in the Amazon craton are critical for reconstruction of the Atlantica supercontinent and correlation of mafic magmatism worldwide. New SHRIMP U-Pb baddeleyite and zircon ages and the reinterpretation of 207 existing dates indicate one orogenic (Ingarana) and four postorogenic (Crepori, Cachoeira Seca, Piranhas, and Periquito) basaltic events in the Tapajós Province, south central Amazon craton. Orogenic gabbro dikes that host gold mineralization are 1893 Ma and interpreted as associated with the Ingarana gabbro intrusions of the bimodal calk-alkalic Parauari intrusive suite. The age of 1893 Ma can be used as a guide to discriminate older and mineralized orogenic dikes from younger and nonmineralized Crepori- and Cachoeira Seca-related mafic dikes. The baddeleyite U-Pb age of the postorogenic Crepori dolerite (gabbro-dolerite sills and dikes) is 1780±9 Ma, ˜150 my older than the ages provided by K-Ar. This value correlates well with the Avanavero tholeiitic intrusions in the Roraima group, in the northern part of the craton in Guyana, Venezuela, and Roraima in Brazil. Early Statherian tholeiitic magmatism was widespread not only in the Amazon craton, but also in the La Plata craton of southern South America, where it is known as the giant Piedra Alta swarm of Uruguay and the post-Trans-Amazonian dikes of Tandil in Argentina. The Cachoeira Seca troctolite represents laccoliths, Feixes, and São Domingos, whose baddeleyite U-Pb age is 1186±12 Ma, 120-150 my older than the known K-Ar ages. This age is comparable to other Stenian gabbroic rocks with alkalic affinity in the craton, such as the Seringa Formation in NE Amazonas and the basaltic flows of the Nova Floresta formation in Rondônia. Dolerite from the giant Piranhas dike swarm in the western Tapajós Province has a Middle Cambrian age (507±4 Ma, baddeleyite) and inherited zircons in the 2238-1229 Ma range. The Piranhas dikes fill extensional NNE and

  14. Geochemistry of PGE in mafic rocks of east Khasi Hills, Shillong ...

    Indian Academy of Sciences (India)

    study area. The studied mafic rocks of east Khasi Hills cover an area of about 4 km2 and represent .... In contrast to the global scenario, attempts for ..... chemical. Sp. no. structural mo de. Mineral comp o sition classification. M g#*. (wt%). (wt%).

  15. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  16. Contact metamorphic effects of the basic intrusive rocks on the Proterozoic uraniferous dolostone in Cuddapah basin, Andhra Pradesh: implications on uranium mobilisation

    International Nuclear Information System (INIS)

    Roy, Minati; Panda, Arjuna; Dhana Raju, R.

    1997-01-01

    Mafic intrusive rocks in the Vempalle formation of the mid-Proterozoic Cuddapah basin occur as sills and dykes. These include minor bodies of gabbro, olivine gabbro, olivine norite, basalt and mainly dolerite with basaltic andesite. The metamorphic effects of these intrusive rocks on the uraniferous phosphatic siliceous dolostone are mainly mineralogical (thermal) with subordinate changes in chemistry. These are manifested by (a) formation of plagioclase-hornblende hornfels, (b) notable mineralogical changes in the dolostone leading to enrichment of magnetite, epidote, anatase and de-dolomitised calcite, (c) decrease in specific gravity of dolostone from 3.0 to 2.8 due to volatilisation reaction products of epidote and smectite, and (d) formation of wollastonite, chalcedony, and secondary uranium minerals (autunite and uranophane) at places, in the contact aureole that led to notable changes in the chemistry of the intrusive body and the host rock. Intrusive rocks at the contact show enrichment in Fe 2+ , Mg, Cu, Cr, Pb, Zn, Ni, and depletion in Ca and Fe 3+ , whereas the dolostone shows enrichment in Ti, Ca, and depletion in Si, Al, alkalies and P. Depletion of uranium in the affected parts (0.003% U 3 O 8 ) of mineralised dolostone (0.062% U 3 O 8 ) adjacent to the basic intrusive rocks suggests its mobilisation, due to increase in temperature, resulting in baking. This phenomenon is also manifested, at places, in the formation of secondary uranium minerals - result of remobilisation of uranium from primary phases and its subsequent precipitation. (author)

  17. Non-traditional stable isotope behaviors in immiscible silica-melts in a mafic magma chamber.

    Science.gov (United States)

    Zhu, Dan; Bao, Huiming; Liu, Yun

    2015-12-01

    Non-traditional stable isotopes have increasingly been applied to studies of igneous processes including planetary differentiation. Equilibrium isotope fractionation of these elements in silicates is expected to be negligible at magmatic temperatures (δ(57)Fe difference often less than 0.2 per mil). However, an increasing number of data has revealed a puzzling observation, e.g., the δ(57)Fe for silicic magmas ranges from 0‰ up to 0.6‰, with the most positive δ(57)Fe almost exclusively found in A-type granitoids. Several interpretations have been proposed by different research groups, but these have so far failed to explain some aspects of the observations. Here we propose a dynamic, diffusion-induced isotope fractionation model that assumes Si-melts are growing and ascending immiscibly in a Fe-rich bulk magma chamber. Our model offers predictions on the behavior of non-traditional stable isotope such as Fe, Mg, Si, and Li that are consistent with observations from many A-type granitoids, especially those associated with layered intrusions. Diffusion-induced isotope fractionation may be more commonly preserved in magmatic rocks than was originally predicted.

  18. Geochemistry and tectonomagmatic setting of the Kharaju gabbroic intrusions (South Azarshahr, East Azerbaijan province

    Directory of Open Access Journals (Sweden)

    Abdolnaser Fazlnia

    2016-12-01

    Full Text Available Kharaju mafic intrusions (south Azarshahr; East Azarbaijan are gabbro in composition. The rocks with Eocene age intruded the northwest part of Urumieh -Dokhtar magmatic belt with a trend of NW-SE. These rocks contain mostly of minerals such as plagioclase, quartz, pyroxene, titanite, apatite and magnetite. The rocks are moderate to high calc-alkaline. The gabbros were produced as a result of the partial melting of mantle wedge with spinel lherzolite and after emplacement into the crustal magma chamber underwent fractional crystallization. Injection of the Kharaju intrusions is in relation to the last stages of Neotethys subduction activity under Central Iran. Negative anomaly in the high ionic strength elements (HFSE like, Nb, Ta, P, Hf and Zr and mild positive anomalies of Eu and Sr with moderate increases in values of K, Sr, Rb, Ba, Pb and U show oblique subduction beneath Central Iran might be willing to make the appropriate space on the edge of central Iran and as a result, partial melting in the mantle wedge occurred due to reduce the pressure as decompression.

  19. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  20. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  1. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  2. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  3. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  4. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  5. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  6. Oxygen intrusion into anoxic fjords leads to increased methylmercury availability

    Science.gov (United States)

    Veiteberg Braaten, Hans Fredrik; Pakhomova, Svetlana; Yakushev, Evgeniy

    2013-04-01

    Mercury (Hg) appears in the oxic surface waters of the oceans at low levels (sub ng/L). Because inorganic Hg can be methylated into the toxic and bioaccumulative specie methylmercury (MeHg) levels can be high at the top of the marine food chain. Even though marine sea food is considered the main risk driver for MeHg exposure to people most research up to date has focused on Hg methylation processes in freshwater systems. This study identifies the mechanisms driving formation of MeHg during oxygen depletion in fjords, and shows how MeHg is made available in the surface water during oxygen intrusion. Studies of the biogeochemical structure in the water column of the Norwegian fjord Hunnbunn were performed in 2009, 2011 and 2012. In autumn of 2011 mixing flushing events were observed and lead to both positive and negative effects on the ecosystem state in the fjord. The oxygenated water intrusions lead to a decrease of the deep layer concentrations of hydrogen sulfide (H2S), ammonia and phosphate. On the other hand the intrusion also raised the H2S boundary from 8 m to a shallower depth of just 4 m. Following the intrusion was also observed an increase at shallower depths of nutrients combined with a decrease of pH. Before flushing events were observed concentrations of total Hg (TotHg) increased from 1.3 - 1.7 ng/L in the surface layer of the fjord to concentrations ranging from 5.2 ng/L to 6.4 ng/L in the anoxic zone. MeHg increased regularly from 0.04 ng/L in the surface water to a maximum concentration of 5.2 ng/L in the deeper layers. This corresponds to an amount of TotHg present as MeHg ranging from 2.1 % to 99 %. The higher concentrations of MeHg in the deeper layer corresponds to an area where no oxygen is present and concentrations of H2S exceeds 500 µM, suggesting a production of MeHg in the anoxic area as a result of sulphate reducing bacteria activity. After flushing the concentrations of TotHg showed a similar pattern ranging from 0.6 ng/L in the

  7. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  8. Partitioning of Cu between mafic minerals, Fe-Ti oxides and intermediate to felsic melts

    Science.gov (United States)

    Liu, Xingcheng; Xiong, Xiaolin; Audétat, Andreas; Li, Yuan

    2015-02-01

    This study used improved capsule technique i.e., Pt95Cu05 or Au95Cu05 alloy capsules as Cu sources to determine Cu partitioning between mafic minerals, Fe-Ti oxides and intermediate to felsic melts at 0.5-2.5 GPa, 950-1100 °C and various oxygen fugacities (fO2). In combination with the data from the mafic composition systems, the results demonstrate that Cu is generally highly incompatible in mafic minerals and moderately incompatible to compatible in Fe-Ti oxides. The general order of mineral/melt Cu partition coefficients (DCu) is garnet (0.01-0.06) ⩽ olivine (0.04-0.20) ≈ opx (0.04-0.24) ≈ amphibole (0.04-0.20) ⩽ cpx (0.04-0.45) ⩽ magnetite, titanomagnetite and Cr-spinel (0.18-1.83). The variations in DCu depend mainly on temperature, fO2 or mineral composition. In general, DCu for olivine (and perhaps opx) increases with decreasing temperature and increasing fO2. DCu increases for cpx with Na+ (pfu) in cpx, for magnetite and Cr-spinel with Fe3+ (pfu) in these phases and for titanomagnetite with Ti4+ (pfu) in this phase. The large number of DCu data (99 pairs) serves as a foundation for quantitatively understanding the behavior of Cu during magmatic processes. The generation of intermediate to felsic magmas via fractional crystallization or partial melting of mafic rocks (magmas) at deep levels of crust involves removal of or leaving assemblages of mafic minerals + Fe-Ti oxides ± sulfides. With our DCu data on mafic minerals and Fe-Ti oxides, DCubulk values around 0.2 were obtained for the sulfide-free assemblages. Cu will thus be concentrated efficiently in the derived melts during these two processes if sulfides are absent or negligible, explaining that high fO2 and sulfide-destabilization are favorable to formation of the porphyry Cu system.

  9. Jurassic ash-flow sheets, calderas, and related intrusions of the Cordilleran volcanic arc in southeastern Arizona: implications for regional tectonics and ore deposits

    Science.gov (United States)

    Lipman, P.W.; Hagstrum, J.T.

    1992-01-01

    Volcanologic, petrologic, and paleomagnetic studies of widespread Jurassic ash-flow sheets in the Huachuca-southern Dragoon Mountains area have led to identification of four large source calderas and associated comagnetic intracaldera intrusions. Stratigraphic, facies, and contact features of the caldera-related tuffs also provide constraints on the locations, lateral displacements, and very existence for some major northwest-trending faults and inferred regional thrusts in southeastern Arizona. Silicic alkalic compositions of the Jurassic caldera-related, ash-flow tuffs; bimodal associated mafic magmatism; and interstratified coarse sedimentary deposits provide evidence for synvolcanic extension and rifting within the Cordilleran magmatic arc. Gold-copper mineralization is associated with subvolcanic intrusions at several of the Jurassic calderas. -from Authors

  10. Platinum-bearing chromite layers are caused by pressure reduction during magma ascent.

    Science.gov (United States)

    Latypov, Rais; Costin, Gelu; Chistyakova, Sofya; Hunt, Emma J; Mukherjee, Ria; Naldrett, Tony

    2018-01-31

    Platinum-bearing chromitites in mafic-ultramafic intrusions such as the Bushveld Complex are key repositories of strategically important metals for human society. Basaltic melts saturated in chromite alone are crucial to their generation, but the origin of such melts is controversial. One concept holds that they are produced by processes operating within the magma chamber, whereas another argues that melts entering the chamber were already saturated in chromite. Here we address the problem by examining the pressure-related changes in the topology of a Mg 2 SiO 4 -CaAl 2 Si 2 O 8 -SiO 2 -MgCr 2 O 4 quaternary system and by thermodynamic modelling of crystallisation sequences of basaltic melts at 1-10 kbar pressures. We show that basaltic melts located adjacent to a so-called chromite topological trough in deep-seated reservoirs become saturated in chromite alone upon their ascent towards the Earth's surface and subsequent cooling in shallow-level chambers. Large volumes of these chromite-only-saturated melts replenishing these chambers are responsible for monomineralic layers of massive chromitites with associated platinum-group elements.

  11. A model for the dynamics of crater-centered intrusion: Application to lunar floor-fractured craters

    Science.gov (United States)

    Thorey, Clément; Michaut, Chloé

    2014-01-01

    Lunar floor-fractured craters are a class of craters modified by post-impact mechanisms. They are defined by distinctive shallow floors that are convex or plate-like, sometimes with a wide floor moat bordering the wall region. Radial, concentric, and polygonal floor fractures suggest an endogenous process of modification. Two mechanisms have been proposed to account for such deformations: viscous relaxation and spreading of a magma intrusion at depth below the crater. To test the second assumption and bring more constraints on the intrusion process, we develop a model for the dynamics of magma spreading below an elastic overlying layer with a crater-like topography. As predicted in earlier more qualitative studies, the increase in lithostatic pressure at the crater wall zone prevents the intrusion from spreading laterally, leading to the thickening of the intrusion. Additionally, our model shows that the final crater floor appearance after the uplift, which can be convex or flat, with or without a circular moat bordering the wall zone, depends on the elastic thickness of the layer overlying the intrusion and on the crater size. Our model provides a simple formula to derive the elastic thickness of the overlying layer hence a minimum estimate for the intrusion depth. Finally, our model suggests that crust redistribution by cratering must have controlled magma ascent below most of these craters.

  12. Orogenic potassic mafic magmatism, a product of alkaline-peraluminous mixing ? Variscan 'calc-alkaline' rocks from the Central Iberian and Ossa Morena Zones, Central Spain.

    Science.gov (United States)

    Scarrow, Jane H.; Cambeses, Aitor; Bea, Fernando; Montero, Pilar; Molina, José F.; Moreno, Juan Antonio

    2013-04-01

    Orogenic magmatic rocks provide information about mantle and crust melt-generation and -interaction processes. In this context, minor potassic mafic stocks which are formed of enriched mantle and crustal components and are common as late-orogenic intrusions in granitic plutons give insight into the timing of new crust formation and crustal recycling. Potassic mafic stocks are prevalent, albeit low volume, constituents of granite batholiths all through the European Variscan (350-280 Ma). In the Central Iberia Zone, Spanish Central System, crustal-melt, S-type, granitoid plutons are intruded by minor concomitant ultramafic-intermediate appinitic-vaugneritic stocks. Notwithstanding their whole-rock calc-alkaline composition, the stocks apparently did not have a subduction-related origin. Recent studies have attributed their genesis to mixing of alkaline mantle and peraluminous crustal melts. Their primary alkaline character, as indicated by amphibole and biotite mineral chemistry data, points, rather, towards an extension-related genesis. In the Ossa Morena Zone, south of the Central Iberian Zone, the igneous rocks also have a whole-rock calc-alkaline composition which has been considered to be the result of northward subduction of the South Portuguese Zone. Nevertheless, identification of a 'sill' of significant volume of mafic magma in the middle crust, the ´IBERSEIS reflective body', in a seismic profile across the Ossa Morena and South Portuguese Zones has cast doubt upon the calc-alkaline magmatism-subduction model; leading, instead, to the magmatism being attributed to intra-orogenic extension related to a mantle plume active from 340 Ma to 330 Ma. The aim here, then, is to reinvestigate the petrogenesis and age of the calc-alkaline rocks of the Ossa Morena Zone to determine their tectonomagmatic context be it subduction-, plume- or extension-related, and establish what they may reveal about mantle-crust interactions. Focussing, initially, on the Valencia del

  13. Aleutian tholeiitic and calc-alkaline magma series I: The mafic phenocrysts

    Science.gov (United States)

    Kay, S. Mahlburg; Kay, Robert W.

    1985-07-01

    Diagnostic mafic silicate assemblages in a continuous spectrum of Aleutian volcanic rocks provide evidence for contrasts in magmatic processes in the Aleutian arc crust. Tectonic segmentation of the arc exerts a primary control on the variable mixing, fractional crystallization and possible assimilation undergone by the magmas. End members of the continuum are termed calc-alkaline (CA) and tholeiitic (TH). CA volcanic rocks (e.g., Buldir and Moffett volcanoes) have low FeO/MgO ratios and contain compositionally diverse phenocryst populations, indicating magma mixing. Their Ni and Cr-rich magnesian olivine and clinopyroxene come from mantle-derived mafic olivine basalts that have mixed with more fractionated magmas at mid-to lower-crustal levels immediately preceding eruption. High-Al amphibole is associated with the mafic end member. In contrast, TH lavas (e.g., Okmok and Westdahl volcanoes) have high FeO/MgO ratios and contain little evidence for mixing. Evolved lavas represent advanced stages of low pressure crystallization from a basaltic magma. These lavas contain groundmass olivine (FO 40 50) and lack Ca-poor pyroxene. Aleutian volcanic rocks with intermediate FeO/MgO ratios are termed transitional tholeiitic (TTH) and calc-alkaline (TCA). TCA magmas are common (e.g., Moffett, Adagdak, Great Sitkin, and Kasatochi volcanoes) and have resulted from mixing of high-Al basalt with more evolved magmas. They contain amphibole (high and low-Al) or orthopyroxene or both and are similar to the Japanese hypersthene-series. TTH magmas (e.g., Okmok and Westdahl) contain orthopyroxene or pigeonite or both, and show some indication of upper crustal mixing. They are mineralogically similar to the Japanese pigeonite-series. High-Al basalt lacks Mg-rich mafic phases and is a derivative magma produced by high pressure fractionation of an olivine tholeiite. The low pressure mineral assemblage of high-Al basalt results from crystallization at higher crustal levels.

  14. Mesozoic mafic dikes from the Shandong Peninsula, North China Craton: Petrogenesis and tectonic implications

    International Nuclear Information System (INIS)

    Liu Shen; Hu Ruizhong; Zhao Junhong; Feng Caixia; Zou, Haibo

    2006-01-01

    Mesozoic mafic dikes are widely distributed in Luxi (Mengyin and Zichuan) and Jiaodong regions of the Shandong Peninsula, China, providing an opportunity of investigating the nature of the lost lithospheric mantle beneath the North China Craton (NCC). The mafic dikes are characterized by strong depletion in high field strength elements (HFSE), enrichment in light rare earth elements (LREE), highly variable Th/U ratios, high initial ( 87 Sr/ 86 Sr) i (0.7050-0.7099) and negative ε Nd (T) (-6.0 to -17.6). They were derived from melting of metasomatized portions of the subcontinental lithospheric mantle, followed by fractionation of clinopyroxenes. The similarity in Nd isotopic compositions between the Mengyin gabbro dikes and the Paleozoic peridotite xenoliths suggests that ancient lithospheric mantle was still retained at 120 Ma below Mengyin, although the ancient lithospheric mantle in many other places beneath NCC had been severely modified. There might be multiple enrichment events in the lithospheric mantle. An early-stage (before or during Paleozoic) rutile-rich metasomatism affected the lithospheric mantle below Mengyin, Jiaodong and Zichuan. Since then, the lithospheric mantle beneath Mengyin was isolated. A late-stage metasomatism by silicate melts modified the lithospheric mantle beneath Jiaodong and Zichuan but not Mengyin. The removal of the enriched lithospheric mantle and the generation of the mafic dikes may be mainly related to the convective overturn accompanying Jurassic-Cretaceous subduction of the paleo-Pacific plate. (author)

  15. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  16. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  17. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  18. Review of the geochemistry and metallogeny of approximately 1.4 Ga granitoid intrusions of the conterminous United States

    Science.gov (United States)

    du Bray, Edward A.; Holm-Denoma, Christopher S.; Lund, Karen; Premo, Wayne R.

    2018-03-27

    primitive, mantle-derived components and evolved, crust-derived components.Each compositional subtype can be ascribed to a relatively unique petrogenetic history. The numerically dominant ferroan, peraluminous granites probably represent low-degree, relatively high-pressure partial melting of preexisting, crust-derived, intermediate-composition granitoids. The moderately numerous, weakly magnesian, peraluminous granites probably reflect similar partial melting but at a higher degree and in a lower pressure environment. In contrast, the ferroan but metaluminous granites may be the result of extensive differentiation of tholeiitic basalt. Finally, the peralkaline igneous rocks at Mountain Pass have compositions potentially derived by differentiation of alkali basalt. The varying alkalic character of each subtype probably reflects polybaric petrogenesis and the corresponding effect of diverse mineral stabilities on ultimate melt compositions. Mantle-derived mafic magma and variably assimilated partial melts of mainly juvenile Paleoproterozoic crustal components are required to generate the relatively low initial strontium (87Sr/86Sr) and distinctive neodymium isotope compositions characteristic of the U.S. 1.4 Ga granitoid intrusions. The characteristics of these intrusions are consistent with crustal melting in an extensional/decompressional, intracratonic setting that was triggered by mantle upwelling and emplacement of tholeiitic basaltic magma at or near the base of the crust. Composite magmas, formed by mingling and mixing mantle components with partial melts of Paleoproterozoic crust, produced variably homogenized storage reservoirs that continued polybaric evolution as intrusions lodged at various crustal depths.

  19. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  20. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  1. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  2. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  3. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  4. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  5. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  6. Whole-rock and mineral compositional constraints on the magmatic evolution of the Ni-Cu-(PGE) sulfide ore-bearing Kevitsa intrusion, northern Finland

    Science.gov (United States)

    Luolavirta, Kirsi; Hanski, Eero; Maier, Wolfgang; Santaguida, Frank

    2018-01-01

    The 2.06 Ga mafic-ultramafic Kevitsa intrusion is located in the Central Lapland greenstone belt. The lower ultramafic part of the intrusion hosts a large disseminated Ni-Cu-(PGE) sulfide deposit with Ni tenors ranging widely from architecture, variations in whole-rock and mineral compositions, and the presence of numerous inclusions and xenoliths. The OLPXs are mainly composed of cumulus olivine (Fo77-89) and clinopyroxene (Mg#81-92) with variable amounts of oikocrystic orthopyroxene (Mg#79-84). They comprise the bulk of the ultramafic cumulates and are the dominant host rocks to the sulfide ore. The host rocks to the regular and false ore type are mineralogically and compositionally similar (Fo 80-83, mostly) and show mildly LREE-enriched REE patterns (CeN/YbN 2), characteristic for the bulk of the Kevitsa ultramafic cumulates. The abundance of orthopyroxene and magnetite is lowest in the host rocks to the Ni-PGE ore type, being in line with the mineral compositions of the silicates, which are the most primitive in the intrusion. However, it contrasts with the LREE-enriched nature of the ore type (CeN/YbN 7), indicating significant involvement of crustal material in the magma. The contrasting intrusive stratigraphy in the different parts of the intrusion likely reflects different emplacement histories. It is proposed that the Kevitsa magma chamber was initially filled by stable continuous flow ("single" input) of basaltic magma followed by differentiation in an at least nearly closed system. In the following stage, new magma pulses were repeatedly emplaced into the interior of the intrusion in a dynamic (open) system forming the sulfide ore bodies. To gain the peculiar compositional and mineralogical characteristics of the Ni-PGE ore type, the related magma probably interacted with different country rocks en route to the Kevitsa magma chamber.

  7. Testing alternative conceptual models of seawater intrusion in a coastal aquifer using computer simulation, southern California, USA

    Science.gov (United States)

    Nishikawa, Tracy

    1997-01-01

    Two alternative conceptual models of the physical processes controlling seawater intrusion in a coastal basin in California, USA, were tested to identify a likely principal pathway for seawater intrusion. The conceptual models were tested by using a two-dimensional, finite-element groundwater flow and transport model. This pathway was identified by the conceptual model that best replicated the historical data. The numerical model was applied in cross section to a submarine canyon that is a main avenue for seawater to enter the aquifer system underlying the study area. Both models are characterized by a heterogeneous, layered, water-bearing aquifer. However, the first model is characterized by flat-lying aquifer layers and by a high value of hydraulic conductivity in the basal aquifer layer, which is thought to be a principal conduit for seawater intrusion. The second model is characterized by offshore folding, which was modeled as a very nearshore outcrop, thereby providing a shorter path for seawater to intrude. General conclusions are that: 1) the aquifer system is best modeled as a flat, heterogeneous, layered system; 2) relatively thin basal layers with relatively high values of hydraulic conductivity are the principal pathways for seawater intrusion; and 3) continuous clay layers of low hydraulic conductivity play an important role in controlling the movement of seawater.

  8. Behaviour of the Sm-Nd and Rb-Sr systems of the mafic-ultramafic layered sequence from Ribeirao dos Motas (Archaean), meridional craton Sao Francisco: evidences of mantle source enrichment and isotopic fractionation; Comportamento dos sistemas Sm-Nd e Rb-Sr da sequencia acamadada mafico-ultramafico Ribeirao dos Motas (Arqueano), craton Sao Francisco Meridional: evidencias de enriquecimento mantelico e fracionamento isotopico

    Energy Technology Data Exchange (ETDEWEB)

    Carneiro, Mauricio Antonio; Carvalho Junior, Irneu Mendes de; Oliveira, Arildo Henrique de [Ouro Preto Univ., (UFOP), MG (Brazil). Dept. de Geologia]. E-mail: mauricio@degeo.ufop.br; Teixeira, Wilson [Sao Paulo Univ., SP (Brazil). Inst. de Geociencias. Dept. de Mineralogia e Geotectonica; Pimentel, Marcio Martins [Brasilia Univ., DF (Brazil). Inst. de Geociencias. Lab. de Geocronologia

    2004-10-15

    The Ribeirao dos Motas layered sequence (SARM) crops out in the southern part of the Sao Francisco Craton, Brazil. This sequence comprises phaneritic meta ultramafic and metamafic rocks, which, although slightly deformed and metamorphosed, retain primary igneous layers. Porphyritic rocks with idiomorphic pyroxene crystals and heteradcumulate and adcumulate textures are also present. Eighteen isotopic analyses were performed in the SARM, comprising rocks with primary (relict) textures, as well as rocks in amphibolite facies and retro-metamorphosed to green-schist facies. Seven samples yield a Sm/Nd isochron age of 2.79 +- 0.30 Ga (MSWD=1.2 e epsilon {sub Ndt}=+0.48), constraining the accretion time of the SARM rocks. The positive epsilon {sub Ndt} value coupled with the Rb/Sr evidence is consistent with mantle source relatively enriched in Nd and Sr isotopes. Nevertheless, some SARM samples display isotopic fractionation and disturbance, which can be ascribed to the following processes or their combinations: a) mobilization of the incompatible elements due to regional high grade metamorphism; b) isotopic changes during upper amphibolite facies overprint; c) isotopic resetting by low-grade fluids associated to the Claudio Shear zone, which is located nearby the SARM. (author)

  9. New Observations of the Gulf of Aden Intermediate Water Intrusion into the Red Sea.

    Science.gov (United States)

    Bower, A.; Abualnaja, Y.

    2012-04-01

    The three-layer exchange flow between the Red Sea and the Indian Ocean during summer is characterized by a thick, northward intrusion of relatively cold, low-salinity and low in dissolved oxygen (Water (GAIW), sandwiched between two thin layers of outflow water. The flux of GAIW into the Red Sea is important in the heat, freshwater and nutrient budgets of the Red Sea, but the structure and pathways of the intrusion are not well-known due to a paucity of hydrographic and direct velocity observations. A research cruise was executed at the eastern side of the Red Sea during September-October 2011 to conduct the first large-scale survey of the intrusion. This mission is part of a series of expeditions in the Red Sea designed to investigate the seasonal Red Sea circulation. Surprisingly, the GAIW intrusion was observed to stretch nearly the entire length of the Red Sea (~1500 km) as a narrow eastern boundary current with subsurface velocity maximum of 0.1-0.3 m/s in the depth range 50-100 m. The intruding layer is weakly stratified compared to the background, possibly an indication of strong vertical mixing as it flows through the strait. Some GAIW was observed to enter deep channels in a coral reef bank (Farasan Banks) located in the southeastern Red Sea, and to enter the Red Sea interior, the latter possibly due to interactions between the boundary current and mesoscale eddies. The pathways and erosion of the GAIW intrusion will likely have major implications for the spatial distribution of biological productivity.

  10. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  11. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  12. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  13. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  14. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  15. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  16. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  17. Potential for saltwater intrusion into the lower Tamiami aquifer near Bonita Springs, southwestern Florida

    Science.gov (United States)

    Shoemaker, W. Barclay; Edwards, K. Michelle

    2003-01-01

    A study was conducted to examine the potential for saltwater intrusion into the lower Tamiami aquifer beneath Bonita Springs in southwestern Florida. Field data were collected, and constant- and variable-density ground-water flow simulations were performed that: (1) spatially quantified modern and seasonal stresses, (2) identified potential mechanisms of saltwater intrusion, and (3) estimated the potential extent of saltwater intrusion for the area of concern. MODFLOW and the inverse modeling routine UCODE were used to spatially quantify modern and seasonal stresses by calibrating a constant-density ground-water flow model to field data collected in 1996. The model was calibrated by assuming hydraulic conductivity parameters were accurate and by estimating unmonitored ground-water pumpage and potential evapotranspiration with UCODE. Uncertainty in these estimated parameters was quantified with 95-percent confidence intervals. These confidence intervals indicate more uncertainty (or less reliability) in the estimates of unmonitored ground-water pumpage than estimates of pan-evaporation multipliers, because of the nature and distribution of observations used during calibration. Comparison of simulated water levels, streamflows, and net recharge with field data suggests the model is a good representation of field conditions. Potential mechanisms of saltwater intrusion into the lower Tamiami aquifer include: (1) lateral inland movement of the freshwater-saltwater interface from the southwestern coast of Florida; (2) upward leakage from deeper saline water-bearing zones through natural upwelling and upconing, both of which could occur as diffuse upward flow through semiconfining layers, conduit flow through karst features, or pipe flow through leaky artesian wells; (3) downward leakage of saltwater from surface-water channels; and (4) movement of unflushed pockets of relict seawater. Of the many potential mechanisms of saltwater intrusion, field data and variable

  18. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  19. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  20. Intrusion of soil covered uranium mill tailings by whitetail prairie dogs and Richardson's ground squirrels

    International Nuclear Information System (INIS)

    Shuman, R.

    1984-01-01

    The primary objective of the reclamation of uranium mill tailings is the long-term isolation of the matrial from the biosphere. Fossorial and semi-fossorial species represent a potentially disruptive influence as a result of their burrowing habits. The potential for intrusion was investigated with respect to two sciurids, the whitetail prairie dog (Cynomys leucurus) and Richardson's ground squirrel (Spermophilus richardsonii). Populations of prairie dogs were established on a control area, lacking a tailings layer, and two experimental areas, underlain by a waste layer, in southeastern Wyoming. Weekly measurements of prairie dog mound surface activities were conducted to demonstrate penetration, or lack thereof, of the tailings layer. Additionally, the impact of burrowing upon radon flux was determined. Limited penetration of the waste layer was noted after which frequency of inhabitance of the intruding burrow system declined. No significant changes in radon flux were detected. In another experiment, it was found that Richardson's ground squirrels burrowed to less extreme depths when confronted by mill tailings. Additional work at an inactive tailings pile in western Colorado revealed repeated intrusion through a shallow cover, and subsequent transport of radioactive material to the ground surface by prairie dogs. Radon flux from burrow entrances was significantly greater than that from undisturbed ground. Data suggested that textural and pH properties of tailings material may act to discourage repeated intrusion at some sites. 58 references

  1. A study on the intrusion model by physical modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jung Yul; Kim, Yoo Sung; Hyun, Hye Ja [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    In physical modeling, the actual phenomena of seismic wave propagation are directly measured like field survey and furthermore the structure and physical properties of subsurface can be known. So the measured datasets from physical modeling can be very desirable as input data to test the efficiency of various inversion algorithms. An underground structure formed by intrusion, which can be often seen in seismic section for oil exploration, is investigated by physical modeling. The model is characterized by various types of layer boundaries with steep dip angle. Therefore, this physical modeling data are very available not only to interpret seismic sections for oil exploration as a case history, but also to develop data processing techniques and estimate the capability of software such as migration, full waveform inversion. (author). 5 refs., 18 figs.

  2. Sr-Nd-Pb isotope compositions of felsic intrusions in the El Teniente and Laguna La Huifa areas, Central Chile

    International Nuclear Information System (INIS)

    Rabbia, O.M.; Hernandez, L.B.; King, R.W.; Lopez Escobar, L

    2001-01-01

    The giant El Teniente porphyry Cu-Mo deposit is located in the Andes foothills of Central Chile (34 o S). In simplistic terms, the igneous rocks at the mine can be grouped in two major units: a felsic suite of silicic intrusives (the porphyries; SiO 2 ≥56wt%) with subvertical stock-like to dyke shapes, and a mafic volcanic to subvolcanic sequence (the Farellones formation; SiO 2 <≤56wt%) with a sub-horizontal nature. The felsic rocks intrude the volcanogenic Farellones formation, which is known at the mine site as 'Andesitas de la mina'. The major felsic intrusives are locally known as the 'Diorita Sewell' and 'Porfido Teniente' bodies, plus a series of minor plugs, apophyses and dikes. According to Cuadra (1986), the age of the main intrusive units spans from Late Miocene ('Diorita Sewell'; 7-8Ma) to Early Pliocene ('Porfido Teniente'; ∼4-5Ma). These felsic intrusives are closely related to copper mineralization ( ∼4-5Ma; Cuadra, 1986), particularly the younger 'Porfido Teniente' (Camus, 1975). Additionally, Skewes and Stern (1996) have suggested the existence of an even slightly younger porphyry pluton, not exposed at surface, but still linked to the ore genesis. Similar felsic intrusive bodies are also present in the Laguna La Huifa area (Reich, 2001), located less than 3 km to the NE from the main El Teniente body. The copper mineralization here, is interpreted to be almost contemporaneous with the El Teniente mineralization (Cuadra, 1986). Based on petrographic and geochemical information on the silicic intrusive suite, Rabbia et al. (2000) suggested that this magmatism could be considered as a Phanerozoic equivalent of an Archean high-Al TTG. Furthermore it may be classified as a modified (Na-rich) 'I' type granitoid, in the sense of Atherton and Petford (1993) and Petford and Atherton (1996). According to these authors, the younger (and hotter) lower Andean crust would be a better candidate than the older (and colder) subducted Nazca plate basalts

  3. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  4. Geochemistry and petrology of mafic Proterozoic and Permian dykes on Bornholm, Denmark:

    DEFF Research Database (Denmark)

    Holm, Paul Martin; Pedersen, Lise E.; Højsteeen, Birte

    2010-01-01

    More than 250 dykes cut the mid Proterozoic basement gneisses and granites of Bornholm. Most trend between NNW and NNE, whereas a few trend NE and NW. Field, geochemical and petrological evidence suggest that the dyke intrusions occurred as four distinct events at around 1326 Ma (Kelseaa dyke...

  5. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  6. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  7. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  8. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  9. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  10. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  11. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  12. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  13. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  14. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  15. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  16. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  17. Physical volcanology of the mafic segment of the subaqueous New Senator caldera, Abitibi greenstone belt, Quebec, Canada

    International Nuclear Information System (INIS)

    Moore, Lyndsay N; Mueller, Wulf U

    2008-01-01

    Archean calderas provide valuable insight into internal geometries of subaqueous calderas. The New Senator caldera, Abitibi greenstone belt, Canada, is an Archean example of a subaqueous nested caldera with a basal stratigraphy dominated by gabbro-diorite dykes and sills, ponded magmas and basalt and andesite lava flows. The aim of our study is to focus on the use of physical volcanology to differentiate between the various mafic units found at the base of the New Senator caldera. Differentiation between these various mafic units is important from an exploration point of view because in modern subaqueous summit calders (e.g. Axial Seamount) margins of ponded magmas are often sites of VMS formation.

  18. Physical volcanology of the mafic segment of the subaqueous New Senator caldera, Abitibi greenstone belt, Quebec, Canada

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Lyndsay N; Mueller, Wulf U [Universite du Quebec a Chicoutimi, 555 boul. du l' Universite, Chicoutimi, Quebec, G7H2B1 (Canada)], E-mail: lyndsay.moore@uqac.ca

    2008-10-01

    Archean calderas provide valuable insight into internal geometries of subaqueous calderas. The New Senator caldera, Abitibi greenstone belt, Canada, is an Archean example of a subaqueous nested caldera with a basal stratigraphy dominated by gabbro-diorite dykes and sills, ponded magmas and basalt and andesite lava flows. The aim of our study is to focus on the use of physical volcanology to differentiate between the various mafic units found at the base of the New Senator caldera. Differentiation between these various mafic units is important from an exploration point of view because in modern subaqueous summit calders (e.g. Axial Seamount) margins of ponded magmas are often sites of VMS formation.

  19. PALEOARCHEAN MAFIC ROCKS OF THE SOUTHWESTERN SIBERIAN CRATON: PRELIMINARY GEOCHRONOLOGY AND GEOCHEMICAL CHARACTERIZATION

    Directory of Open Access Journals (Sweden)

    A. V. Ivanov

    2017-01-01

    Full Text Available The Siberian craton consists of Archean blocks, which were welded up into the same large unit by ca 1.9 Ga [Gladkochub et al., 2006; Rojas-Agramonte et al., 2011]. The history of the constituent Archean blocks is mosaic because of limited number of outcrops, insufficient sampling coverage because of their location in remote regions and deep forest and difficulties with analytical studies of ancient rocks, which commonly underwent metamorphic modifications and secondary alterations. In this short note, we report data on discovery of unusual for Archean mafic rocks of ultimate fresh appearance. These rocks were discovered within southwestern Siberian craton in a region near a boundary between Kitoy granulites of the Sharyzhalgai highgrade metamorphic complex and Onot green-schist belt (Fig. 1. Here we present preliminary data on geochronology of these rocks and provide their geochemical characterization.

  20. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  1. Storage conditions of the mafic and silicic magmas at Cotopaxi, Ecuador

    Science.gov (United States)

    Martel, Caroline; Andújar, Joan; Mothes, Patricia; Scaillet, Bruno; Pichavant, Michel; Molina, Indira

    2018-04-01

    The 2015 reactivation of the Cotopaxi volcano urges us to understand the complex eruptive dynamics of Cotopaxi for better management of a potential major crisis in the near future. Cotopaxi has commonly transitioned from andesitic eruptions of strombolian style (lava flows and scoria ballistics) or nuées ardentes (pyroclastic flows and ash falls) to highly explosive rhyolitic ignimbrites (pumiceous pyroclastic flows), which entail drastically different risks. To better interpret geophysical and geochemical signals, Cotopaxi magma storage conditions were determined via existing phase-equilibrium experiments that used starting materials chemically close to the Cotopaxi andesites and rhyolites. The results suggest that Cotopaxi's most mafic andesites (last erupted products) can be stored over a large range of depth from 7 km to ≥16 km below the summit (pressure from 200 to ≥400 MPa), 1000 °C, NNO +2, and contain 4.5-6.0±0.7 wt% H2O dissolved in the melt in equilibrium with 30-40% phenocrysts of plagioclase, two pyroxenes, and Fe-Ti oxides. These mafic andesites sometimes evolve towards more silicic andesites by cooling to 950 °C. Rhyolitic magmas are stored at 200-300 MPa (i.e. 7-11 km below the summit), 750 °C, NNO +2, and contain 6-8 wt% H2O dissolved in a nearly aphyric melt (<5% phenocrysts of plagioclase, biotite, and Fe-Ti oxides). Although the andesites produce the rhyolitic magmas by fractional crystallization, the Cotopaxi eruptive history suggests reactivation of either reservoirs at distinct times, likely reflecting flux or time fluctuations during deep magma recharge.

  2. Genesis of Soils Formed from Mafic Igneous Rock in the Atlantic Forest Environment

    Directory of Open Access Journals (Sweden)

    Adailde do Carmo Santos

    2016-01-01

    Full Text Available ABSTRACT Different parent materials participate in the formation of soils in the hilly landscape of “Mar de Morros” in the Atlantic Forest environment. Those derived from mafic igneous rock (gabbro frequently show erosion problems because of land use, which is aggravated by the mountainous relief and soil attributes. This study evaluated the main pedogenic processes of soils formed from mafic igneous rock (gabbro in a toposequence in Pinheiral (RJ by characterizing physical, chemical, mineralogical and micromorphological attributes. The profiles are located at different sections in the toposequence: summit (P1, shoulder (P2, backslope (P3 and footslope (P4.They were classified according to the Brazilian System of Soil Classification (SiBCS and correlated to Soil Taxonomy. The soil morphology of profiles P2, P3 and P4 is expressed by a brownish-red color, blocky structure with high to moderate development, clay films and clay loam to clay texture, with a textural B horizon. P1 shows less development, with a shallow profile and the sequence of horizons A-C-Cr. The soils have a slightly low degree of weathering, identified by the presence of pyroxenes and feldspars in the sand fraction and montorillonite in the clay fraction; the sum of bases is from 15 to 24 cmolc kg-1; and cation exchange capacity (CEC is from 12 to 22 cmolc kg-1. A significant presence of clay skins was observed in the field and was confirmed by thin section analysis, which showed features such as argillans, ferriargillans and iron nodules. The soil profile at the summit (P1 was classified as Neossolo Regolítico Órtico (Typic Udorthents, and the other profiles as Chernossolo Argilúvicos Órticos (Typic Argiudolls.

  3. Study on Nd and Sr isotopes of Yianshanian mafic rocks in east Lanling area and their implication

    International Nuclear Information System (INIS)

    Zhang Shuming; Wu Jianhua; Zhou Weixun

    2003-01-01

    East Nanling's Yianshanian mafic magna activity can be divided into four phase. The four phase are the Middle Jurassic, the Late Jurassic, the Early Cretaceous and the Late Cretaceous. They are also four important episodes of extensional activities. The four phase mafic rock possess similar Nd-Sr isotope characteristics, high I Sr (commonly from 0.705 to 0.710) and ε Nd values change range wide (from -7.90 to 5.16). It shows crust-mantle mixed magma origin character. The mafic rock possess the character of within-plate basalts,indicated that they are formed within-plate, and showed there were post-orogenic phase at the early Yianshanian's Middle Jurassic in east Nanling area. The rocks formed pattern is mafic magma rise to the crust bottom, were contaminate by crustal materials, and formed in the setting of lithosphere extended and crust extension. East Nanling's Yianshanian magna activity is mainly magma event concern with mantle magma underplating. (authors)

  4. Geochemistry of Late Mesozoic mafic dykes in western Fujian Province of China:Sr-Nd isotope and trace element constraints

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The Bancun diabase dyke and the Bali hornblende gabbro dyke in western Fuiian Province were emplaced in the Early and Late Cretaceous periods,respectively;the former is designated to calc-alkaline series and the latter to K-high-calc-alkaline rock series.Both the dykes are characterized by such geochemical characteristics as high Al and Na2O>K2O.As for the Bancun dyke,A12O3=16.32%-17.54%and K2O/Na2O=0.65-0.77;as for the Bali dyke,A12O3=16.89%-17.81%and K2O,Na2O=O.93-O.99.Both the Bancun and Bali mafic dykes are relatively endched in LILE and LREE,but depleted in HSFE, displaying the geochemical characteristics of continental marginal arc,with high initial Sr isotopic ratios and low εNd values,The (87Sr/86Sr)i ratios of the Bancun diabase dyke are within the range of 0.708556-0.70903 and their εNd(t)values vary between-6.8 and-6.3;those of the Bali hornblende dyke are within the range of 0.708556-0.710746 and their εNd(t) values are -4.7--4.7,showing the characteristics of enriched mantle EM Ⅱ.The isotope and trace element data showed that the mafic dykes have not experienced obvious crustal contamination,and metasomatism caused by subduction fluids is the main factor leading to LILE and UREE enrichments.The enriched mantle is the source region for the mafic dykes,and mixing of subduction fluid metasomatized enriched mantle and EM Ⅱ-type mantle constituted the mantle source region of both the Bancun and Bali mafic dykes.Upwelling of the asthenosphere mantle provided sufficient heat energy for the generation of magmas.In accordance with the discrimination diagram of their tectonic settings as well as their trace element geochemical characteristics,it is considered that the dykes both at Bancun and Bali possess the characteristics of continental marginal arc,revealing the tectonic environment of formation of the mafic dykes,the continental dynamic background as an intraplate tensional belt in which the mafic dykes were emplaced.Meanwhile,it is also indicated

  5. Effective use of surface-water management to control saltwater intrusion

    Science.gov (United States)

    Hughes, J. D.; White, J.

    2012-12-01

    The Biscayne aquifer in southeast Florida is susceptible to saltwater intrusion and inundation from rising sea-level as a result of high groundwater withdrawal rates and low topographic relief. Groundwater levels in the Biscayne aquifer are managed by an extensive canal system that is designed to control flooding, supply recharge to municipal well fields, and control saltwater intrusion. We present results from an integrated surface-water/groundwater model of a portion of the Biscayne aquifer to evaluate the ability of the existing managed surface-water control network to control saltwater intrusion. Surface-water stage and flow are simulated using a hydrodynamic model that solves the diffusive-wave approximation of the depth-integrated shallow surface-water equations. Variable-density groundwater flow and fluid density are solved using the Oberbeck--Boussinesq approximation of the three-dimensional variable-density groundwater flow equation and a sharp interface approximation, respectively. The surface-water and variable-density groundwater domains are implicitly coupled during each Picard iteration. The Biscayne aquifer is discretized into a multi-layer model having a 500-m square horizontal grid spacing. All primary and secondary surface-water features in the active model domain are discretized into segments using the 500-m square horizontal grid. A 15-year period of time is simulated and the model includes 66 operable surface-water control structures, 127 municipal production wells, and spatially-distributed daily internal and external hydrologic stresses. Numerical results indicate that the existing surface-water system can be effectively used in many locations to control saltwater intrusion in the Biscayne aquifer resulting from increases in groundwater withdrawals or sea-level rise expected to occur over the next 25 years. In other locations, numerical results indicate surface-water control structures and/or operations may need to be modified to control

  6. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  7. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  8. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  9. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  10. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  11. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  12. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  13. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  14. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  15. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    Science.gov (United States)

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    The type examples for the class of deposits termed intrusion-related gold systems occur in the Tombstone-Tungsten belt of Alaska and Yukon, on the eastern side of the Tintina gold province. In this part of the northern Cordillera, extensive mid-Cretaceous postcollisional plutonism took place following the accretion of exotic terranes to the continental margin. The most cratonward of the resulting plutonic belts comprises small isolated intrusive centers, with compositionally diverse, dominantly potassic rocks, as exemplified at Scheelite Dome, located in central Yukon. Similar to other spatially and temporally related intrusive centers, the Scheelite Dome intrusions are genetically associated with intrusion-related gold deposits. Intrusions have exceptional variability, ranging from volumetrically dominant clinopyroxene-bearing monzogranites, to calc-alkaline minettes and spessartites, with an intervening range of intermediate to felsic stocks and dikes, including leucominettes, quartz monzonites, quartz monzodiorites, and granodiorites. All rock types are potassic, are strongly enriched in LILEs and LREEs, and feature high LILE/HFSE ratios. Clinopyroxene is common to all rock types and ranges from salite in felsic rocks to high Mg augite and Cr-rich diopside in lamprophyres. Less common, calcic amphibole ranges from actinolitic hornblende to pargasite. The rocks have strongly radiogenic Sr (initial 87Sr/86Sr from 0.711-0.714) and Pb isotope ratios (206Pb/204Pb from 19.2-19.7), and negative initial εNd values (-8.06 to -11.26). Whole-rock major and trace element, radiogenic isotope, and mineralogical data suggest that the felsic to intermediate rocks were derived from mafic potassic magmas sourced from the lithospheric mantle via fractional crystallization and minor assimilation of metasedimentary crust. Mainly unmodified minettes and spessartites represent the most primitive and final phases emplaced. Metasomatic enrichments in the underlying lithospheric mantle

  16. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    Science.gov (United States)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  17. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  18. Documentation of the seawater intrusion (SWI2) package for MODFLOW

    Science.gov (United States)

    Bakker, Mark; Schaars, Frans; Hughes, Joseph D.; Langevin, Christian D.; Dausman, Alyssa M.

    2013-01-01

    The SWI2 Package is the latest release of the Seawater Intrusion (SWI) Package for MODFLOW. The SWI2 Package allows three-dimensional vertically integrated variable-density groundwater flow and seawater intrusion in coastal multiaquifer systems to be simulated using MODFLOW-2005. Vertically integrated variable-density groundwater flow is based on the Dupuit approximation in which an aquifer is vertically discretized into zones of differing densities, separated from each other by defined surfaces representing interfaces or density isosurfaces. The numerical approach used in the SWI2 Package does not account for diffusion and dispersion and should not be used where these processes are important. The resulting differential equations are equivalent in form to the groundwater flow equation for uniform-density flow. The approach implemented in the SWI2 Package allows density effects to be incorporated into MODFLOW-2005 through the addition of pseudo-source terms to the groundwater flow equation without the need to solve a separate advective-dispersive transport equation. Vertical and horizontal movement of defined density surfaces is calculated separately using a combination of fluxes calculated through solution of the groundwater flow equation and a simple tip and toe tracking algorithm. Use of the SWI2 Package in MODFLOW-2005 only requires the addition of a single additional input file and modification of boundary heads to freshwater heads referenced to the top of the aquifer. Fluid density within model layers can be represented using zones of constant density (stratified flow) or continuously varying density (piecewise linear in the vertical direction) in the SWI2 Package. The main advantage of using the SWI2 Package instead of variable-density groundwater flow and dispersive solute transport codes, such as SEAWAT and SUTRA, is that fewer model cells are required for simulations using the SWI2 Package because every aquifer can be represented by a single layer of cells

  19. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  20. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  1. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  2. Implications of new ^{40}Ar/^{39}Ar age of Mallapur Intrusives on the chronology and evolution of the Kaladgi Basin, Dharwar Craton, India

    Science.gov (United States)

    Pillai, Shilpa Patil; Pande, Kanchan; Kale, Vivek S.

    2018-04-01

    The Kaladgi Basin on the northern edge of the Dharwar craton has characters diverse from the other epicratonic Purana basins of Peninsular India. Sedimentological studies in the basin have established the presence of three cycles of flooding separated by an event of intra-basinal deformation accompanied by low grade incipient metamorphism. The overall structural configuration of the basin indicates its development by supracrustal extension accompanied by shearing in a trans-tensional regime during the Mesoproterozoic. This was followed by sagging that yielded Neoproterozoic sedimentation in a successor nested basin. ^{40}Ar/^{39}Ar dating of an intrusive mafic dyke along the axial plane of a fold has yielded a plateau age of 1154{± }4 Ma. This helps constraint the age of the various events during the evolution of this basin.

  3. Morphologic and hemodynamic analysis of dental pulp in dogs after molar intrusion with the skeletal anchorage system.

    Science.gov (United States)

    Konno, Yuichi; Daimaruya, Takayoshi; Iikubo, Masahiro; Kanzaki, Reiko; Takahashi, Ichiro; Sugawara, Junji; Sasano, Takashi

    2007-08-01

    We have successfully treated skeletal open bite by intruding posterior teeth with the skeletal anchorage system. Our aim in this study was to morphologically and hemodynamically evaluate the changes in pulp tissues when molars are radically intruded. The mandibular fourth premolars of 9 adult beagle dogs were divided into 3 groups: a sham operated group (n = 6, 3 dogs), 4-month intrusion group (n = 6, 3 dogs), and a further 4-month retention group (n = 6, 3 dogs). We evaluated the morphological changes of the pulp and dentin-the amount of vacuolar degeneration in the odontoblast layer, the predentin width and nervous continuity in the pulp tissue, and the pulpal blood-flow response evoked by electrical stimulation in the dental pulp. Extreme molar intrusion with the skeletal anchorage system caused slight degenerative changes in the pulp tissue, followed by recovery after the orthodontic force was released. Circulatory system and nervous functions were basically maintained during the intrusion, although a certain level of downregulation was observed. These morphologic and functional regressive changes in the pulp tissue after molar intrusion improved during the retention period. Histologic changes and changes in pulpal blood flow and function are reversible, even during radical intrusion of molars.

  4. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    Science.gov (United States)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  5. Cl-rich hydrous mafic mineral assemblages in the Highiș massif, Apuseni Mountains, Romania

    Science.gov (United States)

    Bonin, Bernard; Tatu, Mihai

    2016-08-01

    The Guadalupian (Mid-Permian) Highiș massif (Apuseni Mountains, Romania) displays a bimodal igneous suite of mafic (gabbro, diorite) and A-type felsic (alkali feldspar granite, albite granite, and hybrid granodiorite) rocks. Amphibole is widespread throughout the suite, and yields markedly high chlorine contents. Three groups are identified: Cl-rich potassic hastingsite (2.60-3.40 wt% Cl) within A-type felsic rocks and diorite, mildly Cl-rich pargasite to hornblende (0.80-1.90 wt% Cl) within gabbro, and low F-Cl hornblende within gabbro and hybrid granodiorite. Coexisting biotite is either Cl-rich within diorite, or F-Cl-poor to F-rich within A-type felsic rocks. Chlorine and fluorine are distributed in both mafic phases, according to the F-Fe and Cl-Mg avoidance rules. The low-Ti contents suggest subsolidus compositions. Cl-rich amphibole within diorite and A-type felsic rocks yields a restricted temperature range - from 575 °C down to 400 °C, whereas mildly Cl-rich amphibole within gabbro displays the highest range - from 675 to 360 °C. Temperatures recorded by Cl-rich biotite within diorite range from 590 to 410 °C. Biotite within A-type felsic rocks yields higher temperatures than amphibole: the highest values- from 640 to 540 °C - are recorded in low-F-Cl varieties, whereas the lowest values- from 535 to 500 °C - are displayed by F-rich varieties. All data point to halogen-rich hydrothermal fluids at upper greenschist facies conditions percolating through fractures and shear zones and pervasively permeating the whole Highiș massif, with F precipitating as interstitial fluorite and Cl incorporating into amphibole, during one, or possibly several, hydrothermal episodes that would have occurred during a ~ 150 My-long period of time extending from the Guadalupian (Mid-Permian) to the Albian (Mid-Cretaceous).

  6. Geophysical evidence for an extensive Pie de Palo Complex mafic-ultramafic belt, San Juan, Argentina

    Science.gov (United States)

    Chernicoff, Carlos J.; Vujovich, Graciela I.; van Staal, Cees R.

    2009-12-01

    The recent completion of a high-resolution aeromagnetic survey over the Pie de Palo uplift of the western Sierras Pampeanas has revealed an area of large magnetic anomalies associated with the Pie de Palo Complex. The Las Pirquitas thrust, which has transported and uplifted the Pie de Palo Complex, is recognized for at least 30 km in a roughly NE direction along the western boundary of the Pie de Palo Complex, beyond its limited outcrop. The type of sediments of the Caucete Group in the footwall of the Las Pirquitas thrust, which are regarded as the leading edge of the Precordillera terrane, are associated with much less pronounced magnetic anomalies. In addition, a conspicuous, NNE trending, broad magnetic high stands out in the survey, several kilometers to the east of the main outcrops of the Pie de Palo Complex; this broad magnetic anomaly bisects the Pie de Palo basement block, and continues further south at least as far as 32°S, the southern boundary of the latest aeromagnetic survey. This magnetic anomaly is interpreted to represent a structure corresponding to the Grenvillian Precordillera-Pie de Palo tectonic boundary zone, and would comprise the buried largest part of the mafic-ultramafic belt. The geophysical model of the magnetic data indicates that the boundary zone dips to the east, possibly suggesting the existence of a set of synthetic east dipping, west-verging thrusts, of which only one major structure (Las Pirquitas thrust) is exposed; the possibility of other slivers of upthrust boundary zone material cannot be excluded. It is considered that the Pie de Palo Complex represents a small sliver upthrust from the unexposed boundary zone material (containing highly magnetic mafic-ultramafic rocks). The east-dipping, west verging structures associated with the Pie de Palo Complex are suggested to represent an Ordovician reactivation of a Grenvillian suture zone developed when the Precordillera basement and Pie de Palo terrane docked; this

  7. Ladder Structures and Magnetic Surveys: New Insights into the Near Surface, Three-Dimensional Shape and Orientation of Plutonic Structures in the Tuolumne Intrusive Suite, Yosemite National Park, California

    Science.gov (United States)

    Boyd, J. D.

    2017-12-01

    The study of pluton emplacement and growth history offers a window into the evolution of the continental crust. Plutons, however, are often largely homogeneous in outcrop, lacking reliable structural markers for tracking their emplacement and growth through time. The ladder structures exposed on the glacially polished surfaces of the Tuolumne Intrusive Suite (TIS) in Yosemite National Park, California are an exception. Ladder structures (LS) are eye-catching concentrations of alternating mafic and felsic mineral assemblages in dominantly cresent-shaped, meter to sub-meter scale bands in outcrop that locally terminate into a mafic band forming a circular-shaped enclosure. Their geochemistry and modal mineralogy diverge sharply from host rock trends with large quantities of magnetite, titanite, and zircon in the mafic assemblages. The limited exposure of LS in outcrops has led to much debate as to their true geometries and orientations. The high concentration of magnetite in the LS is fortuitous in that it allows these features to be investigated by magnetic techniques. The preliminary results of new high resolution magnetic surveys of these LS are presented here. A grid of total magnetic intensity (TMI) was collected across the ladder structures. The TMI's were then inverted and modeled to determine the orientation of the magnetic bodies with depth using PyGMI freeware. With sufficient contrast in the magnetic susceptibility (Km) between the feature being imaged and the host rock, meter to sub-meter scale features can be resolved. The average Km of the LS mafic bands and the host rock is approximately 200-850 x10-3 and 15-20×10-3 SI units respectively. These measurements along with oriented samples were collected to determine input parameters (e.g. anisotropy and remanence) for the geocellular model used in this study.

  8. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    Science.gov (United States)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  9. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  10. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  11. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  12. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  13. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  14. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  15. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  16. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  17. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  18. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  19. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  20. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  1. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  2. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  3. Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site

    International Nuclear Information System (INIS)

    NSTec Environmental Management

    2007-01-01

    In July1996, BN transmitted Passive Barriers to Inadvertent Human Intrusion for Use at the Nevada Test Site to the United States Department of Energy, under Contract DE-AC08-91NV10833. The 1996 paper had a limited distribution and was not reviewed for public release. In 2007, National Security Technologies LLC (NSTec) made minor revisions to conform to current editorial standards of the NNSA/NSO and to meet current security requirements for public release. The primary purpose of this study was to identify types of engineered passive barriers that could deter future intrusion into buried low-level radioactive waste, particularly intrusion by drilling water wells. The study considered drilling technology, many natural and man-made materials, and both underground and above-ground barriers. Based on cost and effectiveness, the report recommended underground barriers consisting of a layer of rubble or tires. An aboveground barrier mound might also prove effective, but would cost more, and may become an attractive nuisance (e.g., might, after their purpose has been forgotten, encourage exploration for the sake of satisfying curiosity). Advances in drilling technology could render any engineered barriers ineffective if there is motivation to penetrate the barriers

  4. Using a time lapse microgravity model for mapping seawater intrusion around Semarang

    Energy Technology Data Exchange (ETDEWEB)

    Supriyadi,, E-mail: supriyadi@mail.unnes.ac.id; Khumaedi [Physics Department, Semarang State University (UNNES), D7 Building 2nd Floor FMIPA Sekaran Gunungpati (Indonesia); Yusuf, M. [Badan Meteologi Klimatologi Goefisika (BMKG), Jl.Angkasa I No.2 Kemayoran Jakarta Pusat (Indonesia); Agung, W. [Physics Department, Diponegoro University (UNDIP), Jl. Prof. Soedharto, Tembalang, Semarang (Indonesia)

    2016-03-11

    A modeling of time-lapse microgravity anomaly due to sea water intrusion has been conducted. It used field data of aquifer cross section, aquifer thickness and lithology of research area. Those data were then processed using Grav3D and Surfer. Modeling results indicated that the intrusion of sea water resulting in a time-lapse microgravity anomalies of 0.12 to 0.18 mGal, at soil layer density of 0.15 g/cm{sup 3} to 0.3 g/cm{sup 3} and at depth of 30 to 100 m. These imply that the areas experiencing seawater intrusion were Tanjung Mas, SPBE Bandarharjo, Brass, Old Market Boom and Johar as the microgravity measured there were in the range of 0.12 to 0.18 mGal and the density contrast were at 0.15 g/cm{sup 3} to 0.28 g/cm{sup 3}. Areas that experienced fluid reduction were Puri Anjasmoro, Kenconowungu and Puspowarno with microgravity changes from -0.06 mGal to -0.18 mGal.

  5. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  6. Mafic enclaves in dacitic domes and their relation with La Poruña scoria cone, Central Andes, northern Chile

    Science.gov (United States)

    González-Maurel, O. P.; Gallmeyer, G.; Godoy, B.; Menzies, A.; le Roux, P. J.; Harris, C.

    2017-12-01

    Chao Dacite, Chillahuita, Cerro Pabellón, Chanka, Chac-Inca, and Cerro La Torta (or Tocorpuri) are dacitic domes of late Pleistocene age (30 to 140 ka; Renzulli et al., 2006; Tierney et al., 2016) located in Northern Chilean Central Andean province (NCCA; 17°20'S - 27°40'S). While, La Poruña is a 180 m high basaltic-andesite scoria cone erupted ca. 100 ka (Wörner et al., 2000). This scoria cone is also located at the NCCA, 26 km to the SW of Chanka and 45 km to the NW of Chao Dacite. The dacitic domes are generally porphyritic and highly crystalline lavas (30 - 50 vol % phenocrysts, plagioclase > biotite > amphibole > quartz ≥ accessory), with hyalopilitic or intersertal groundmass. These domes contain mafic enclaves, mostly andesite in composition, with plagioclase > amphibole > biotite ≥ clinopyroxene ≥ olivine ≥ accessory phenocryst (10 - 20 vol %) in a lightly oxidized groundmass with intersertal or intergranular textures. In contrast, La Poruña rocks are mostly aphanitic (75 - 85 vol % groundmass) and highly vesicular, with plagioclase > olivine ≥ clinopyroxene ≥ orthopyroxene phenocrysts in an intersertal or hyalopilitic groundmass. Although petrographically different, the composition (57 wt % SiO2; 580 ppm Sr, 87Sr/86Sr = 0.7066) of mafic enclaves from Cerro Pabellón dome are similar to the lava flows and pyroclastic blocks of La Poruña scoria cone (55 - 59 wt % SiO2; 560 - 610 ppm Sr; 0.7062 - 0.7066 87Sr/86Sr). Based on this data and the eruption ages of these volcanic structures, we suggest that the mafic enclaves and La Poruña magmas are co-genetic. Thus, we propose that the genesis of these mafic enclaves is associated with the origin of less evolved parental magmas erupted in the NCCA, such as those from La Poruña. In this case, the mafic enclaves would represent batches of less evolved magmas that ascended from deeper sources and probably contributed in the eruption of the dacitic domes. Renzulli et al., 2006. In XI Congreso Geol

  7. Paleomagnetism of Early Cambrian Itabaiana mafic dikes (NE Brazil) and the final assembly of Gondwana

    Science.gov (United States)

    Trindade, Ricardo I. F.; D'Agrella-Filho, Manoel S.; Epof, Igor; Brito Neves, Benjamim B.

    2006-04-01

    Paleomagnetic analysis on 15 early Cambrian mafic dikes from Itabaiana (Paraíba State) yielded a southern (northwestern) direction with steep upward (downward) inclination ( Dm = 167.5°, Im = - 63.7°, α95 = 7.3°). AF and Thermal demagnetization, thermomagnetic curves, and hysteresis results suggest that this component is dominantly carried by fine-grained SD magnetite. The high stability of this component and positive baked contact tests on three dikes indicate it represents a primary thermoremanent magnetization. Ar-Ar analysis on whole-rock samples from two sites provides a strong constraint on the age of the Itabaiana paleomagnetic pole (134.6° E, 34.9° S; A95 = 7.3, K = 28) defined by plateau ages of 525 ± 5 and 526 ± 4 Ma. This pole completely satisfies six out of the seven quality criteria proposed by Van der Voo [R. Van der Voo, The reliability of paleomagnetic data, Tectonophysics 184 (1990) 1-9.] and permits a tight constraint on the Early Cambrian sector of the Gondwana apparent polar wander path. Paleogeographic reconstructions consistent with the available paleomagnetic and geological record show that Gondwana was sutured along three major orogenies, the Mozambique (Brasilano/Pan-African) Orogeny (800-650 Ma), the Kuunga Orogeny (570-530 Ma) and the Pampean-Araguaia Orogeny (540-520 Ma). We suggest that after rifting away from Laurentia at the end of the Neoproterozoic, opening the Iapetus ocean, the Amazonian craton and minor adjoining blocks, such as Rio Apa and Pampia, collided with the proto-Gondwana by Cambrian times at ca. 530-520 Ma. Unless for small adjustments, Gondwana was completely formed by 525 Ma whose paleogeography is defined by the Itabaiana pole.

  8. Geological characters and petrological characters of metamorphosed medium-acidic intrusive complexes in Ludong Orogenic Belt,China

    Institute of Scientific and Technical Information of China (English)

    凌贤长; 胡庆立; 王丽霞

    2002-01-01

    Ludong orogenic belt in China is an importantal continent collision orogenic belt in eastern Asia, between Sino-Korean landmass and Yangtze landmass. The host rock of the orogenic belt is metamorphosed medium-acidic intrusive complexes, which can be divided into four types, that's, quartz dioritz, granite dioritz, monzonitic granite and undertint monzonitic granite, principal minerals are plagioclases, potassium feldspars and quartzs, minor minerals are hornblendes, biotites, clinopyxenes and garnets, accessory mineral types and assemblages are very similar, specially, various rocks are mainly fine-grained textures. They have the history of regional amphibolite facies metamorphism and deep-middle-shallow structural layer deformation, and are changed into various gneiss and tectonic system. There are many xenolithes of middle Proterozoic eclogite-host rock extrahigh-high pressure metamorphic complexes, a small xenolithes of early Proterozoic layered metamorphite system and granulites, and ultrabasic-basic rocks of various epoches in the metamorphosed medium-acidic intrusive complexes.

  9. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  10. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  11. Preliminary study of the uranium favorability of Mesozoic intrusive and Tertiary volcanic and sedimentary rocks of the Central Mojave Desert, Kern and San Bernardino counties, California

    International Nuclear Information System (INIS)

    Leedom, S.H.; Kiloh, K.D.

    1978-02-01

    Numerous, small, low-grade, supergene uranium deposits are found in Tertiary volcanic and sedimentary rocks in the central Mojave Desert of southern California. Large thorium-to-uranium ratios in samples of Mesozoic intrusive rocks exposed in the area indicate that these rocks have been extensively weathered, eroded, and subsequently leached by ground waters, and that they may have been the primary source of uranium for the deposits. The uranium content of samples of volcanic intrusive and extrusive rocks is average for intermediate to silicic rocks, but samples of basalt flows in the area contain six times the average uranium content of mafic igneous rocks. Devitrified tuffs and tuffaceous sedimentary rocks, interbedded with calcareous units, are additional sources of uranium for supergene uranium deposits found in calcareous units. Uranium is also found in accessory minerals in a few Mesozoic quartz-rich pegmatite dikes. Uranium deposits in the central Mojave Desert have been formed by enrichment during diagenetic replacement of Tertiary carbonate rocks; by supergene enrichment along fractures, joints, and bedding planes in Tertiary volcanic and sedimentary rocks; during formation of Holocene caliche; and by deposition within hydrothermally altered shear zones. Within the area, the diagenetic replacement type of deposit has the greatest potential for large, low-grade uranium occurrences. The other type of uranium deposits are small, erratically distributed, and extensively covered by alluvium

  12. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  13. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  14. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  15. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  16. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  17. Courtright intrusive zone: Sierra National Forest, Fresno County, California.

    Science.gov (United States)

    Bateman, P.C.; Kistler, R.W.; DeGraff, J.V.

    1984-01-01

    This is a field guide to a well-exposed area of plutonic and metamorphic rocks in the Sierra National Forest, Fresno County, California. The plutonic rocks, of which three major bodies are recognized, besides aplite and pegmatite dykes, range 103 to approx 90 m.y. in age. Points emphasized include cataclastic features within the plutonic rocks, schlieren and mafic inclusions. (M.A. 83M/0035).-A.P.

  18. Integrated Experimental and Modeling Studies of Mineral Carbonation as a Mechanism for Permanent Carbon Sequestration in Mafic/Ultramafic Rocks

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Zhengrong [Yale Univ., New Haven, CT (United States); Qiu, Lin [Yale Univ., New Haven, CT (United States); Zhang, Shuang [Yale Univ., New Haven, CT (United States); Bolton, Edward [Yale Univ., New Haven, CT (United States); Bercovici, David [Yale Univ., New Haven, CT (United States); Ague, Jay [Yale Univ., New Haven, CT (United States); Karato, Shun-Ichiro [Yale Univ., New Haven, CT (United States); Oristaglio, Michael [Yale Univ., New Haven, CT (United States); Zhu, Wen-Iu [Univ. of Maryland, College Park, MD (United States); Lisabeth, Harry [Univ. of Maryland, College Park, MD (United States); Johnson, Kevin [Univ. of Hawaii, Honolulu, HI (United States)

    2014-09-30

    A program of laboratory experiments, modeling and fieldwork was carried out at Yale University, University of Maryland, and University of Hawai‘i, under a DOE Award (DE-FE0004375) to study mineral carbonation as a practical method of geologic carbon sequestration. Mineral carbonation, also called carbon mineralization, is the conversion of (fluid) carbon dioxide into (solid) carbonate minerals in rocks, by way of naturally occurring chemical reactions. Mafic and ultramafic rocks, such as volcanic basalt, are natural candidates for carbonation, because the magnesium and iron silicate minerals in these rocks react with brines of dissolved carbon dioxide to form carbonate minerals. By trapping carbon dioxide (CO2) underground as a constituent of solid rock, carbonation of natural basalt formations would be a secure method of sequestering CO2 captured at power plants in efforts to mitigate climate change. Geochemical laboratory experiments at Yale, carried out in a batch reactor at 200°C and 150 bar (15 MPa), studied carbonation of the olivine mineral forsterite (Mg2SiO4) reacting with CO2 brines in the form of sodium bicarbonate (NaHCO3) solutions. The main carbonation product in these reactions is the carbonate mineral magnesite (MgCO3). A series of 32 runs varied the reaction time, the reactive surface area of olivine grains and powders, the concentration of the reacting fluid, and the starting ratio of fluid to olivine mass. These experiments were the first to study the rate of olivine carbonation under passive conditions approaching equilibrium. The results show that, in a simple batch reaction, olivine carbonation is fastest during the first 24 hours and then slows significantly and even reverses. A natural measure of the extent of carbonation is a quantity called the carbonation fraction, which compares the amount of carbon removed from solution, during a run, to the maximum amount

  19. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  20. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  1. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  2. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  3. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  4. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  5. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  6. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  7. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  8. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  9. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  10. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  11. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  12. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  13. Effects of interaction between ultramafic tectonite and mafic magma on Nd-Pb-Sr isotopic systems in the Neoproterozoic Chaya Massif, Baikal-Muya ophiolite belt

    Science.gov (United States)

    Amelin, Yuri V.; Ritsk, Eugeni Yu.; Neymark, Leonid A.

    1997-04-01

    Sm-Nd, Rb-Sr and U-Pb isotopic systems have been studied in minerals and whole rocks of harzburgites and mafic cumulates from the Chaya Massif, Baikal-Muya ophiolite belt, eastern Siberia, in order to determine the relationship between mantle ultramafic and crustal mafic sections. Geological relations in the Chaya Massif indicate that the mafic magmas were emplaced into, and interacted with older solid peridotite. Hand picked, acid-leached, primary rock-forming and accessory minerals (olivine, orthopyroxene, clinopyroxene and plagioclase) from the two harzburgite samples show coherent behavior and yield 147Sm/ 144Nd- 143Nd/ 144Nd and 238U/ 204Pb- 206Pb/ 204Pb mineral isochrons, corresponding to ages of 640 ± 58 Ma (95% confidence level) and 620 ± 71 Ma, respectively. These values are indistinguishable from the crystallization age of the Chaya mafic units of 627 ± 25 Ma (a weighted average of internal isochron Sm-Nd ages of four mafic cumulates). The Rb-Sr and Sm-Nd isotopic systems in the harzburgite whole-rock samples were disturbed by hydrothermal alteration. These alteration-related isotopic shifts mimic the trend of variations in primary isotopic compositions in the mafic sequence, thus emphasizing that isotopic data for ultramafic rocks should be interpreted with great caution. On the basis of initial Sr and Nd values, ultramafic and mafic rocks of the Chaya Massif can be divided into two groups: (1) harzburgites and the lower mafic unit gabbronorites withɛ Nd = +6.6 to +7.1 andɛ Sr = -11 to -16; and (2) websterite of the lower unit and gabbronorites of the upper mafic unit:ɛ Nd = +4.6 to +6.1 andɛ Sr = -8 to -9. Initial Pb isotopic ratios are identical in all rocks studied, with mean values of 206Pb/ 204Pb= 16.994 ± 0.023 and 207Pb/ 204Pb= 15.363 ± 0.015. The similarity of ages and initial isotopic ratios within the first group indicates that the isotopic systems in the pre-existing depleted peridotite were reset by extensive interaction with

  14. The formation and evolution of layered structures in porous media: effects of porosity and mechanical dispersion

    NARCIS (Netherlands)

    Schoofs, Stan; Trompert, Ron A.; Hansen, Ulrich

    1999-01-01

    Horizontally layered structures can develop in porous or partially molten environments, such as hydrothermal systems, magmatic intrusions and the early Earth's mantle. The porosity f of these natural environments is typically small. Since dissolved chemical elements unlike heat cannot diffuse

  15. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  16. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  17. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  18. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  19. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  20. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  1. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  2. Modeling the influence of river discharge on salt intrusion and residual circulation in Danshuei River estuary, Taiwan

    Science.gov (United States)

    Liu, W.-C.; Chen, W.-B.; Cheng, R.T.; Hsu, M.-H.; Kuo, A.Y.

    2007-01-01

    A 3-D, time-dependent, baroclinic, hydrodynamic and salinity model was implemented and applied to the Danshuei River estuarine system and the adjacent coastal sea in Taiwan. The model forcing functions consist of tidal elevations along the open boundaries and freshwater inflows from the main stream and major tributaries in the Danshuei River estuarine system. The bottom friction coefficient was adjusted to achieve model calibration and verification in model simulations of barotropic and baroclinic flows. The turbulent diffusivities were ascertained through comparison of simulated salinity time series with observations. The model simulation results are in qualitative agreement with the available field data. The validated model was then used to investigate the influence of freshwater discharge on residual current and salinity intrusion under different freshwater inflow condition in the Danshuei River estuarine system. The model results reveal that the characteristic two-layered estuarine circulation prevails most of the time at Kuan-Du station near the river mouth. Comparing the estuarine circulation under low- and mean flow conditions, the circulation strengthens during low-flow period and its strength decreases at moderate river discharge. The river discharge is a dominating factor affecting the salinity intrusion in the estuarine system. A correlation between the distance of salt intrusion and freshwater discharge has been established allowing prediction of salt intrusion for different inflow conditions. ?? 2007 Elsevier Ltd. All rights reserved.

  3. Large Igneous Provinces, Their Giant Mafic Dyke Swarms, and Links to Metallogeny

    Science.gov (United States)

    Jowitt, S.; Ernst, R. E.

    2017-12-01

    The relationships between large igneous provinces (LIPs), their giant dyke swarms and differing metallogenic systems can be condensed into five distinct although partially overlapping classifications: (1) LIP magmas that directly generate mineral deposits such as orthomagmatic Ni-Cu-PGE sulfides. Many carbonatites (Nb, Ta REE deposits) and kimberlites (diamonds) are also often LIP related. On the other hand, LIP-related thermal pulses (from a mantle plume) can sometimes destroy diamond potential in the overlying lithosphere. A key locus for Ni-Cu-PGE mineralization is within a few hundred km of the plume center region and plume centers are best located using giant radiating dyke swarms. Dyke subswarms with chalcophile element depletions can also be tracked "upstream" toward the plume center to identify exploration targets. (2) LIP magmas that provide energy, fluids, and/or metals for ore types such as hydrothermal volcanogenic massive sulfide (VMS) and iron oxide-copper-gold (IOCG) deposits. Heat loss from the margins of dykes and sills can also generate local enrichments in key metals (e.g. Co) within the surrounding sedimentary rocks. (3) LIP rocks (particularly sills and dykes) can act barriers to fluid flow and/or as reaction zones that control mineralizing events, act as structural traps within hydrocarbon systems, and form impermeable barriers that control water flow and hence aquifer formation (4) surficial effects, such as the formation of Ni-Co laterites and Al bauxites from tropical weathering of LIP mafic-ultramafic rocks (including volcanics fed by radiating dykes as well as the dykes themselves). This category also includes LIP-related anoxia events that generate hydrocarbon source rocks; and (5) indirect links between LIPs and ore deposits, where continental breakup-related LIP events define a `barcode' record (usually dominated by dyke swarms) that can be used to correlate and reconstruct Precambrian supercontinents. This fifth classification type

  4. Mg isotope systematics during magmatic processes: Inter-mineral fractionation in mafic to ultramafic Hawaiian xenoliths

    Science.gov (United States)

    Stracke, A.; Tipper, E. T.; Klemme, S.; Bizimis, M.

    2018-04-01

    , the clearly resolvable inter-mineral Mg isotope differences imply that crystallization or preferential melting of isotopically distinct minerals such garnet, spinel, and clinopyroxene should cause Mg isotope fractionation between bulk melt and residue. Calculated Mg isotope variations during partial mantle melting indeed predict differences between melt and residue, but these are analytically resolvable only for melting of mafic lithologies, that is, garnet pyroxenites. Contributions from garnet pyroxenite melts may thus account for some of the isotopically light δ26Mg observed in ocean island basalts and trace lithological mantle heterogeneity. Consequently, applications for high-temperature Mg isotope fractionations are promising and diverse, and recent advances in analytical precision may allow the full petrogenetic potential inherent in the sub per mill variations in δ26Mg in magmatic rocks to be exploited.

  5. An isotopic study of mafic microgranular enclaves in the Katsuragi adakitic tonalite, southwestern Japan.

    Science.gov (United States)

    Tezuka, N.; Tsuboi, M.; Asahara, Y.

    2017-12-01

    The Cretaceous Katsuragi tonalite in southwestern Japan has been regarded as adakite formed by the partial melting of lower crust a) b). The tonalite is 10 x 15 km in areal extent, is composed of hornblende-biotite tonalite with a mineral assemblage of plagioclase, biotite, quartz and hornblende, and contains mafic microgranular enclaves (MME). The MME has dioritic composition with a mineral assemblage of plagioclase, biotite, hornblende and quartz. The boundary between the tonalite and the MME is sharp. To reveal the relationship between the MME and adakitic feature of the host tonalite, we have focused on the chemical and Sr-Nd isotopic compositions of the MME in the Katsuragi tonalite. Three models have been proposed for the origin of MME: restite, magma-mixing, and cumulate c). In the restite model, MME is regarded as a residual material of partial melting, and therefore chemical compositions of MME and host should show a linear trend on the Harker's diagram. However, the Katsuragi tonalite and its MME do not show one linear trend. Based on mixing of two magmas, initial 87Sr/86Sr (SrI) value of MME is basically different from that of its host. However, the SrI value of the MME is 0.70725-0.70749 and is identical to the value of 0.70728 in the Katsuragi tonalite d), indicating one magma source for the MME and its host. According to the cumulate model, MME forms from cumulate piles by subsequent feeding of congenetic magma immediately after the early crystallized minerals are solidified. The concordance of the age and SrI between the Katsuragi tonalite and its MME strongly indicate the cumulate origin c). Furthermore, the mineral assemblage of the MME resembles with the common mineral assemblage of andesitic cumulate such as plagioclase, hornblende and quartz c), and this is consistent with the cumulate model. Based on the cumulate origin of the MME, the adakitic feature of chemical composition in the host rock is potentially formed by the separation of cumulate

  6. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  7. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  8. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  9. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  10. Petrology and oxygen isotope geochemistry of the Pucon ignimbrite - Southern Andean volcanic zone, Chile: Implications for genesis of mafic ignimbrites

    International Nuclear Information System (INIS)

    McCurry, Michael; Schmidt, Keegan

    2001-01-01

    Although mafic components of dominantly intermediate to silicic ignimbrites are rather common, voluminous, dominantly mafic ignimbrites are rare (e.g., Smith, 1979; cf. Freundt and Schmincke, 1995). Volcan Villarrica, the most active composite volcano in South America, located in the Southern Andean Volcanic Zone (SAVZ, Lopez-Escobar and Moreno, 1994a), has produced two such ignimbrites, respectively the Lican and Pucon Ignimbrites, in the last 14,000 years (Clavero, 1996). The two ignimbrites are low-Si andesite and basaltic-andesite to low-Si andesite, respectively, the former about twice as voluminous as the later (10 and 5 km 3 ). Eruption of the ignimbrites produced calderas respectively 5 and 2 km in diameter (Moreno, 1995; Clavero, 1996). In addition to its mafic bulk composition, the Pucon Ignimbrite (PI) is also distinguished by numerous xenolithic fragments among and also within magmatic pyroclasts. Many of these are fragments of granitoid rocks. Volcan Villarrica has also produced numerous smaller mafic ignimbrites and pyroclastic surge deposits, as well as dominantly basaltic fallout and lava flows (Lopez-Escobar and Moreno, 1994; Moreno, 1995; Clavero, 1996; Hickey-Vargas et al., 1989; Tormey et al., 1991). Reasons for the unusual style of mafic explosive activity at Volcan Villarrica are unclear. Clavero (1996), based upon an exemplary thesis-study of the physical volcanology and petrology of the PI, suggests it formed in response to a sequence of events beginning with injection of a shallow basaltic andesite magma chamber by hotter basaltic magma. In his model mixing and heat transfer between the two magmas initiated a violent Strombolian eruption that destabilized the chamber causing infiltration of large amounts of meteoric-water saturated country rocks. The Pucon Ignimbrite formed in response to subsequent phreatomagmatic interactions. In contrast, Lopez-Escobar and Moreno (1994) infer on geochemical grounds that volatiles leading to the explosive

  11. Geology, petrography, alteration, mineralization and petrogenesis of intrusive bodies in the Hamech prospect area, Southwest of Birjand

    Directory of Open Access Journals (Sweden)

    Abbas Etemadi

    2018-04-01

    Full Text Available Introduction The Hamech prospect area is located in the eastern Iran, 85 kilometers southwest of Birjand. The study area coordinates between 58¬¬˚¬53΄¬00 ˝ to 59˚¬00΄¬00˝ latitude and 32˚¬22΄¬30 ˝ to 32˚¬26΄¬00˝ longitude. Due to the high volume of magmatism and the presence of geo-structure special condition in the Lut Block at a different time, a variety of metal (copper, lead, zinc, gold, etc. and non-metallic mineralization has been formed (Karimpour et al., 2012. The studied area (Hamech includes Paleocene-Eocene igneous outcrops which contain a wide range of subvolcanic bodies (diorite to monzonite porphyry associated with mafic intrusives, volcanic units (andesite, volcaniclastic and sedimentary rocks. Material and Methods This study was done in two parts including field and laboratory works. Sampling and structural studies were done during field work. Geological and alteration maps for the study area were also prepared. 200 thin and 60 polished sections for petrographic purpose were studied. The number of 200 thin sections and 60 polished sections were prepared and studied in order to investigate petrography and mineralogy. Major oxides (XRF method- East Amethyst Laboratory in Mashhad, rare earth elements and trace (ICP-MS method-ACME Laboratory in Vancouver, Canada elements were analyzed for 13 samples that included subvolcanic units and intrusive bodies. Data processing and geological and alteration mapping is done by the GCD.kit and Arcgis software. Discussion and Results Based on lab work and XRF analysis, the rocks in the area are composed of intrusive-subvolcanic bodies and volcanic rocks (andesite, trachyandesite and dacite together with volcano-classic and sedimentary rocks. Also, alteration zones consist of a variety of argillic, silicified, quartz-sericite-pyrite (QSP, propylitic and carbonate. Igneous rock textures are mainly porphyritic for sub-volcanic and granular for intrusive bodies. Phenocrysts

  12. An Integrated Geochronological, Petrological, Geochemical and Paleomagnetic Study of Paleoproterozoic and Mesoproterozoic Mafic Dyke Swarms in the Nain Craton, Labrador

    Science.gov (United States)

    Sahin, Tugce

    The Nain craton comprises the western, Labrador segment of the larger North Atlantic craton (NAC) which exposes Early through Late Archean gneisses. The NAC is bounded on all sides by Paleoproterozoic collisional orogens that involved either considerable structural reworking (Torngat-Nagssugtoqidian-Lewisian) or the accretion of juvenile arc magmas (Ketilidian-Makkovik). The NAC remains poorly understood compared to other Archean crustal blocks now dispersed globally. Compounding this problem is a lack of reliable paleomagnetic poles for NAC units that predate its assembly into the supercontinent Laurentia by ca. 1800 Ma, which could be used to test neighboring relationships with other cratonic fragments. In order to understand the history of the NAC as part of a possible, larger supercontinent, the record of mafic dyke swarms affecting the craton, particularly those that postdate the Late Archean terrane assembly, were examined in this study. Diabase or gabbroic dyke swarms are invaluable in such studies because their geometries offer possible locus points, they often have a punctuated emplacement and precisely datable crystallization histories, and they have cooling histories and oxide mineralogy amenable to recovering robust paleopoles. Coastal Labrador exposes a number of mafic dykes, some of which are demonstrably Paleoproterozoic (e.g. 2235 Ma Kikkertavak dykes; 2121 Ma Tikkigatsiagak dykes) or Mesoproterozoic (e.g. 1280-1270 Ma Nain and Harp dykes) in age (U-Pb; baddeleyite or zircon). The southern half of the Nain craton (Hopedale block) in particular preserves a rich array of mafic dykes. Dyke cross-cutting relationships are numerous and relatively well exposed, permitting multiple opportunities for paleomagnetic field tests (e.g. baked contact). The results presented here allow understanding of the tectonic evolution of the NAC with implications for strengthened Labrador-Greenland correlations, and testing possible Paleoproterozoic supercontinent

  13. Rb-Sr and Nd-Sr isotope geochemistry and petrogenesis of the Misho Mountains mafic dikes (NW Iran

    Directory of Open Access Journals (Sweden)

    Maryam Ahankoub

    2017-02-01

    Full Text Available Introduction There are some theories about the Paleotethys event during the Paleozoic that have been proposed by geologists (Metcalfe, 2006. Some scientist offered some pieces of evidence about the northern margin of Gondwana (Zhu et al., 2010. The Paleotethys Ocean and Hercynian orogenic report first in Iran, have been Offered from the Morrow and Misho Mountain (Eftekharnejad, 1981. Misho Mountains is located between the north and south Misho faults and cause the formation of a positive flower structure (Moayyed and Hossainzade, 2011. There is theory about Misho southern fault as the best candidate of the Paleotethys suture zone (Moayyed and Hossainzade, 2011. Geochemistry and Sr –Nd isotopic data of the A2 granitic and Synite rocks of the East Misho, indicate that the magmatism post collision has occurred in the active continental margin by extensional zones of the following the closure of the Paleotethys (Ahankoub, 2012. Granite and syenite rocks have been cut by mafic dikes. Mafic dikes are often formed in extensional tectonic settings related to mantle plume or continental break –up (Zhu et al., 2009. In this paper, we use the geochemistry and Nd-Sr isotope data to determined petrogenesis, tectono-magmatic setting and age of Misho mafic dikes. Materials and methods After petrography study of 30 thin sections of mafic dike rocks, 8 samples were selected for whole-rock chemical analyses using ICP-MS and ICP-AES instruments by ACME Company in Vancouver, Canada. We prepared 6 sample For Sm-Nd and Rb-Sr analysis. Sr and Nd isotope ratios were measured with a thermal ionization mass spectrometer, VG Sector 54–30 at the Nagoya University. The isotope abundances of Rb, Sr, Nd, and Sm were measured by the ID method with a Finnigan MAT Thermoquad THQ thermal ionization quadrupole mass spectrometer at the Nagoya University. NBS987 and JNdi-1 were measured as natural Sr and Nd isotope ratio standards (Tanaka et al., 2000. Averages and 2σ errors

  14. The timing of compositionally-zoned magma reservoirs and mafic 'priming' weeks before the 1912 Novarupta-Katmai rhyolite eruption

    Science.gov (United States)

    Singer, Brad S.; Costa, Fidel; Herrin, Jason S.; Hildreth, Wes; Fierstein, Judith

    2016-01-01

    The June 6, 1912 eruption of more than 13 km3 of dense rock equivalent (DRE) magma at Novarupta vent, Alaska was the largest of the 20th century. It ejected >7 km3 of rhyolite, ~1.3 km3 of andesite and ~4.6 km3 of dacite. Early ideas about the origin of pyroclastic flows and magmatic differentiation (e.g., compositional zonation of reservoirs) were shaped by this eruption. Despite being well studied, the timing of events that led to the chemically and mineralogically zoned magma reservoir remain poorly known. Here we provide new insights using the textures and chemical compositions of plagioclase and orthopyroxene crystals and by reevaluating previous U-Th isotope data. Compositional zoning of the magma reservoir likely developed a few thousand years before the eruption by several additions of mafic magma below an extant silicic reservoir. Melt compositions calculated from Sr contents in plagioclase fill the compositional gap between 68 and 76% SiO2 in whole pumice clasts, consistent with uninterrupted crystal growth from a continuum of liquids. Thus, our findings support a general model in which large volumes of crystal-poor rhyolite are related to intermediate magmas through gradual separation of melt from crystal-rich mush. The rhyolite is incubated by, but not mixed with, episodic recharge pulses of mafic magma that interact thermochemically with the mush and intermediate magmas. Hot, Mg-, Ca-, and Al-rich mafic magma intruded into, and mixed with, deeper parts of the reservoir (andesite and dacite) multiple times. Modeling the relaxation of the Fe-Mg concentrations in orthopyroxene and Mg in plagioclase rims indicates that the final recharge event occurred just weeks prior to the eruption. Rapid addition of mass, volatiles, and heat from the recharge magma, perhaps aided by partial melting of cumulate mush below the andesite and dacite, pressurized the reservoir and likely propelled a ~10 km lateral dike that allowed the overlying rhyolite to reach the surface.

  15. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  16. Geochemical characteristics of granitoids and related mafic granulites from the Pan-African Dahomeyide belt, southeastern Ghana

    International Nuclear Information System (INIS)

    Aidoo, F.

    2012-07-01

    The Dahorneyide orogenic belt marks the southeastern limit of the West Africa craton (WAC). The belt consists of three structural units which include the deformed eastern edge of the WAC with its cover rocks made up of the Togo and the Buern Structural Units (external nappes), a suture zone assemblage of mafic and ultramafic rocks, and granitoid gneiss-rnigmatite assemblages (east of the suture zone). Geochemical and petrographic characteristics of the granitoids from the external nappes and mafic and ultramafic granulites roeks from the suture zone have been studied with the objective of inferring their petrogenesis and tectonic setting in which they were formed. Twenty five (25) representative samples were selected for petrographic studies and fifteen samples for major and trace elements composition using ICP-AES and ICP-MS respectively. The granitoids gneisses are mainly biotite muscovite gneisses, migmatites and granodiorites made up of quartz (25-68%), biotite (7-30%), plagioclase (8-40%), muscovite (4-20%) with some few pyroxene, sericite and calcite observed in some oF the samples. Within these rocks is an amphibole rich gneiss composed of about 45% amphiboles. The granitoid gneisses contain SiO 2 content of 40.60-68.90 wt. % with low Mg# of 36-46. Geochernically, they are classified as I-type, mctaluminous to peraluminous, magnessian to ferroan, calcic to calc alkali granitoids. They exhibit fractionated REE patterns with (La/Sm) N = 1.80-5.85 and (La/Yb) N = 3.76-76.30, and negative to positive Eu anomalies (Eu/Eu*'' = 0.68-2.10. The primitive mantle-normalised, trace element patterns show that the granitoid gneisses are characterised by enrichment in LILE relative to HFSE and in LREE relative HREE. They display subduction-related trace element characteristics of positive Ba and negative Ti, Ta, Nb and Hf anomalies. The mafic granulites are composed of quartz (16-43%), hornblende (12-45%), plagioclase (13-23%), pyroxene (13-17%), garnet (4

  17. Early Jurassic mafic dykes from the Aigao uranium ore deposit in South China: Geochronology, petrogenesis and relationship with uranium mineralization

    Science.gov (United States)

    Zhang, Di; Zhao, Kui-Dong; Chen, Wei; Jiang, Shao-Yong

    2018-05-01

    Mafic dykes are abundant and widely distributed in many granite-hosted uranium ore deposits in South China. However, their geochronology, petrogenesis and relationship with uranium mineralization were poorly constrained. In this study, apatite U-Pb dating, whole-rock major and trace element and Sr-Nd-Pb isotope analysis were conducted for the dolerite dykes from the Aigao uranium ore deposit. Apatite U-Pb isotopic data indicate that the mafic dykes were emplaced at Early Jurassic (189 ± 4 Ma), which provides new evidence for the rarely identified Early Jurassic magmatism in South China. Pyroxene from the dykes is mainly augite, and plagioclase belongs to albite. The dolerite samples have relatively low SiO2 contents (45.33-46.79 wt%), relatively high total alkali contents (K2O + Na2O = 4.11-4.58 wt%) and Al2O3 contents (13.39-13.80 wt%), and medium MgO contents (4.29-5.16 wt%). They are enriched in Nb, Ta, Ti, rare earth elements and depleted in Rb, K, Sr, Th, showing the typical OIB-like geochemical affinity. All the dolerite samples show homogeneous Sr-Nd-Pb isotopic compositions, with (87Sr/86Sr)i varying from 0.706049 to 0.707137, εNd(t) from +4.6 to +5.2, 206Pb/204Pb from 19.032 to 19.126 and 207Pb/204Pb from 15.641 to 15.653. The mafic dykes in the Aigao deposit should be derived from the partial melting of the asthenospheric mantle and formed in a within-plate extensional environment. The emplacement age of the mafic dykes is older than the uranium mineralization age. Therefore, CO2 in ore-forming fluids couldn't originate from the basaltic magma as suggested by previous studies. The dolerite dykes might only provide a favorable reducing environment to promote the precipitation of uraninite from oxidize hydrothermal fluids.

  18. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  19. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  20. Paleomagnetic Results of the 925 Ma Mafic Dykes From the North China Craton: Implications for the Neoproterozoic Paleogeography of Rodinia

    Science.gov (United States)

    Zhao, X.; Peng, P.

    2017-12-01

    Precambrian mafic dyke swarms are useful geologic records for Neoproterozoic paleogeographic reconstruction. We present a paleomagnetic study of the 925 Ma Dashigou dyke swarm from 3 widely separated locations in the central and northern parts of the North China Craton, which are previously unsampled regions. Stepwise thermal and alternating field demagnetizations were successful in isolating two magnetic components. The lower unblocking temperature component represents the recent Earth magnetic field. The higher unblocking temperature component is the characteristic remanent magnetization and yields positive baked contact test. Results from detailed rock magnetic measurements corroborate the demagnetization behavior and show that titanomagnetites are the main magnetic carrier in these rocks. There was no regional event that has reset the remanent magnetization of all the dyke sites, as indicated by the magnetization directions of both overlying and underlying strata. The similarity of the virtual paleomagnetic poles for the 3 sampled regions also argues that the characteristic remanent magnetizations are primary magnetization when the dykes were emplaced. The paleomagnetic poles from the Dashigou dyke swarm of the North China Craton are not similar to those of the identical aged Bahia dykes from the São Francisco Craton, Brazil, indicating that these mafic dykes may be not parts of a common regional magmatic event that affected North China Craton and NE Brazil at about 925 Ma.

  1. Petrogenetic evolution of the felsic and mafic volcanic suite in the Siang window of Eastern Himalaya, Northeast India

    Directory of Open Access Journals (Sweden)

    A. Krishnakanta Singh

    2012-09-01

    Full Text Available The Abor volcanics outcroping in the core of the Siang window in the Eastern Himalaya comprise voluminous mafic volcanics (47%–56% w(SiO2, with subordinate felsic volcanics (67%–75% w(SiO2. The felsic volcanics are dacitic to rhyolitic in composition and are typically enriched in LREE (La/SmN = 3.09–3.90 with high REE contents (256–588 ppm, moderately fractionated REE patterns (CeN/YbN = 6.54–9.52 and pronounced negative Eu anomalies (Eu/Eu* = 0.55–0.72. Wide variations in Rb/Zr, K/Rb and La/Sm ratios suggest that they were derived from magmas which were randomly contaminated with crustal material. Chemical characteristics and petrogenetic modelling indicate that the dacites were generated by ∼15% partial melting of a mafic source leaving a residue with 55% plagioclase, 14% orthoclase, 18% clinopyroxene, 5% orthopyroxene, 8% hornblende. The silica-rich rhyodacites and rhyolites were derived from a dacite magma source by a higher degree (>45% fractional crystallization of an assemblage consisting of 70% plagioclase, 12% clinopyroxene, 7% amphibole and 11% magnetite. The associated LREE-LILE enrichment and pronounced negative anomalies for HFSE (Nb, P, and Ti exhibited by these felsic volcanics are characteristic of continental rift volcanism, implying that they were emplaced during lithospheric extension.

  2. Large-scale circulation associated with moisture intrusions into the Arctic during winter

    Science.gov (United States)

    Woods, Cian; Caballero, Rodrigo; Svensson, Gunilla

    2014-05-01

    Observations during recent decades show that there is a greater near surface warming occurring in the Arctic, particularly during winter, than at lower latitudes. Understanding the mechanisms controlling surface temperature in the Arctic is therefore an important priority in climate research. The surface energy budget is a key proximate control on Arctic surface temperature. During winter, insolation is low or absent and the atmospheric boundary layer is typically very stable, limiting turbulent hear exchange, so that the surface energy budget is almost entirely governed by longwave radiation. The net surface longwave radiation (NetLW) at this time has a strikingly bimodal distribution: conditions oscillate between a 'radiatively clear' state with rapid surface heat loss and a "moist cloudy" state with NetLW ˜ 0 W m-2. Each state can persist for days or weeks at a time but transitions between them happen in a matter of hours. This distribution of NetLW has important implications for the Arctic climate, as even a small shift in the frequency of occupancy of each state would be enough to significantly affect the overall surface energy budget and thus winter sea ice thickness. The clear and cloudy states typically occur during periods of relatively high and low surface pressure respectively, suggesting a link with synoptic-scale dynamics. This suggestion is consistent with previous studies indicating that the formation of low-level and mid-level clouds over the Arctic Ocean is typically associated with cyclonic activity and passing frontal systems . More recent work has shown that intense filamentary moisture intrusion events are a common feature in the Arctic and can induce large episodic increases of longwave radiation into the surface. The poleward transport of water vapor across 70N during boreal winter is examined in the ERA-Interim reanalysis product and 16 of the Coupled Model Intercomparison Project Phase 5 (CMIP5) models, focusing on intense moisture

  3. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  4. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  5. Why seawater intrusion has not yet occurred in the Kaluvelli-Pondicherry basin, Tamil Nadu, India

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2017-09-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is greatest when aquifers are overexploited or when recharge is low due to a semi-arid or arid climate. The Kaluvelli-Pondicherry sedimentary basin in Tamil Nadu (India) presents both these characteristics. Groundwater levels in the Vanur aquifer can reach 50 m below sea level at less than 20 km inland. This groundwater depletion is due to an exponential increase in extraction for irrigation over 35 years. No seawater intrusion has yet been detected, but a sulphate-rich mineralization is observed, the result of upward vertical leakage from the underlying Ramanathapuram aquifer. To characterize the mechanisms involved, and to facilitate effective water management, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been applied to a quasi-3D hydrogeological model, NEWSAM. Recharge had been previously quantified through the inter-comparison of hydrological models, based on climatological and surface-flow field measurements. Sensitivity tests on parameters and boundary conditions associated with the sea were performed. The resulting water balances for each aquifer led to hypotheses of (1) an offshore fresh groundwater stock, and (2) a reversal and increase of the upward leakage from the Ramanathapuram aquifer, thus corroborating the hypothesis proposed to explain geochemical results of the previous study, and denying a seawater intrusion. Palaeo-climate review supports the existence of favourable hydro-climatological conditions to replenish an offshore groundwater stock of the Vanur aquifer in the past. The extent of this fresh groundwater stock was calculated using the Kooi and Groen method.

  6. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  7. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  8. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  10. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  11. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  12. Ages and petrogenesis of Jurassic and Cretaceous intrusive rocks in the Matsu Islands: Implications for lower crust modification beneath southeastern China

    Science.gov (United States)

    Chen, Jing-Yuan; Yang, Jin-Hui; Ji, Wei-Qiang

    2017-12-01

    Major and trace element, whole-rock Sr-, Nd- and Hf-isotope, zircon U-Pb age and Hf-O isotope data are reported for the intrusive rocks from the Matsu Islands in the coastal area of southeastern (SE) China, in order to study the ages, sources and petrogenesis of these rocks and evolution of the lower crust. The rocks include gneissic granite, massive granite, brecciated granite and diabase. Secondary ion mass spectrometer (SIMS) zircon U-Pb dating reveals that the rocks in the Matsu Islands were emplaced at ∼160 Ma, ∼130 Ma and ∼94 Ma. The Jurassic granites (∼160 Ma) have high SiO2 (74.1-74.5 wt%) and K2O + Na2O (8.32-8.33 wt%) contents and high Rb/Sr ratios of 0.6-1.2 and (La/Yb)CN ratios of 12.6-19.4. Their relatively high initial 87Sr/86Sr ratios (0.7074-0.7101), variable and negative εNd(t) values (-9.2 to -5.4), and variable zircon εHf(t) (-17.0 to +5.2) and δ18O (4.7-8.1‰) values indicate they were mainly derived from an ancient lower crustal source, but with involvement of high εHf(t) and low δ18O materials. The Early Cretaceous diabase (∼130 Ma) has SiO2 content of 56.5 wt%, relatively high MgO concentration, low initial 87Sr/86Sr ratio and negative εNd(t) value, similar to geochemical features of other Cretaceous mafic rocks in the coastal area of SE China. Zircons from the diabase have high εHf(t) values (-5.5 to +0.2) and relatively low δ18O values of 4.2-5.0‰. These characteristics indicate that the parental magma of the diabase was generated by partial melting of enriched lithospheric mantle, which have been metasomatised by altered oceanic crust-derived low-δ18O fluids. For the Cretaceous granitoids (∼130 Ma and 94 Ma), they have relatively low SiO2 (68.0-71.3 wt%) and K2O + Na2O (5.30-7.55 wt%) contents and low Rb/Sr ratios and (La/Yb)CN ratios of 5.8-7.1. They have low initial 87Sr/86Sr ratios (0.7071-0.7082), homogeneous εNd(t) (-4.3 to -4.5) and relatively high zircon εHf(t) values (-3.7 to +1.2) and low δ18O values (4

  13. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Geochronology, geochemistry, and petrogenesis of late Permian to early Triassic mafic rocks from Darongshan, South China: Implications for ultrahigh-temperature metamorphism and S-type granite generation

    Science.gov (United States)

    Xu, Wang-Chun; Luo, Bi-Ji; Xu, Ya-Jun; Wang, Lei; Chen, Qi

    2018-05-01

    The role of the mantle in generating ultrahigh-temperature metamorphism and peraluminous S-type granites, and the extent of crust-mantle interaction are topics fundamental to our understanding of the Earth's evolution. In this study we present geochronological, geochemical, and Sr-Nd-Hf isotopic data for dolerites and mafic volcanic rocks from the Darongshan granite complex belt in western Cathaysia, South China. LA-ICP-MS U-Pb zircon analyses yielded magma crystallization ages of ca. 250-248 Ma for the dolerites, which are coeval with eruption of the mafic volcanic rocks, ultrahigh-temperature metamorphism, and emplacement of S-type granites in the Darongshan granite complex belt. The mafic volcanic rocks are high-K calc-alkaline or shoshonitic, enriched in Th, U, and light rare earth elements, and depleted in Nb, Ta and Ti. The dolerites are characterized by high Fe2O3tot (11.61-20.39 wt%) and TiO2 (1.62-3.17 wt%), and low MgO (1.73-4.38 wt%), Cr (2.8-10.8 ppm) and Ni (2.5-11.4 ppm). Isotopically, the mafic volcanic rocks have negative whole-rock εNd(t) values (-6.7 to -9.0) and high ISr values (0.71232 to 0.71767), which are slightly depleted compared with the dolerite samples (εNd(t) = -10.3 to -10.4 and ISr = 0.71796 to 0.71923). Zircons in the dolerites have εHf(t) values of -7.6 to -10.9. The mafic volcanic rocks are interpreted to have resulted from the partial melting of an enriched lithospheric mantle source with minor crustal contamination during ascent, whereas the dolerites formed by late-stage crystallization of enriched lithospheric mantle-derived magmas after fractionation of olivine and pyroxene. The formation of these mantle-derived mafic rocks may be attributed to transtension along a NE-trending strike-slip fault zone that was related to oblique subduction of the Paleo-Pacific plate beneath South China. Such underplated mafic magmas would provide sufficient heat for the generation of ultrahigh-temperature metamorphism and S-type granites, and

  15. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  16. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  17. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  18. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  19. U-Pb zircon geochronology of intrusive and basement rocks in the Jacurici Valley region, Sao Francisco Craton, BA, Brazil; Geocronologia U-Pb em zircao de rochas intrusivas e de embasamento na regiao do Vale do Jacurici, Craton do Sao Francisco, BA

    Energy Technology Data Exchange (ETDEWEB)

    Silveira, Carlos Jose Sobrinho da; Frantz, Jose Carlos; Marques, Juliana Charao; Roos, Siegbert; Peixoto, Vinicius Medina, E-mail: silveira.carlosjose@hotmail.com, E-mail: jose.frantz@propesq.ufrgs.br, E-mail: juliana.marques@ufrgs.br, E-mail: sig_duda@yahoo.com.br, E-mail: vinimpeixoto@hotmail.com [Universidade Federal do Rio Grande do Sul (UFRGS), Porto Alegre, RS (Brazil). Laboratorio de Geologia Isotopica; Queiroz, Waldemir Jose Alves de, E-mail: waldemirqueiroz@hotmail.com [Companhia de Ferro Ligas da Bahia (FERBASA), Pojuca, BA (Brazil)

    2015-09-15

    The Jacurici Complex, located in the NE of the Sao Francisco Craton, is constituted by several Cr-mineralized mafic-ultramafic N-S bodies, possible fragments of a single sill disrupted during deformation. Some works suggest it is intruded on the Serrinha Block while others consider it in the Salvador-Curaca Belt. The basement on this region is informally divided into paragneisses and orthogneisses; the latter is supposed to be younger considering it is less deformed. Petrography revealed that some of the paragneisses are alkali-feldspar granite strongly milonitized. The orthogneisses occur at the north and consist, at least in part, of monzogranites with heterogeneous deformation, locally of low temperature. U-Pb zircon dating were performed for five representative samples. Just three provided good concordia ages. A mafic rock produced a 2102 ± 5 Ma age and it is petrographically similar to the metanorites described in the Jacurici Complex, being interpreted as the record of the first pulses of the mafic magmatism. A monzogranite yielded a 2995 ± 15 Ma age, older than expected, related to the Serrinha Block. The alkali-feldspar granite yielded a 2081 ± 3 Ma age. The Itiuba Syenite and the pegmatites that crosscut the Jacurici Complex have similar ages. Considering the lack of information about the supracrustal sequence that hosts the intrusive alkaline and mafic-ultramafic rocks at the Ipueira and the Medrado areas, it is possible that part of the terrain belongs to the Salvador-Curaca Belt. We suggest that the Jacurici Complex could be intruded after the tectonic amalgamation between the Serrinha Block and the older part of the Salvador-Curaca Belt and, therefore, could be hosted by both terrains. (author)

  20. Evaluation of geologic materials to limit biological intrusion of low-level waste site covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; White, G.C.; Karlen, E.M.

    1982-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. This paper reports the preliminary results of a screening study to-determine the effectiveness of four biobarrier materials to stop plant root and animal penetration into simulated low-level wastes. Experiments employed 288 lysimeters consisting of 25-cm-diam PVC pipe, with four factors tested: plant species (alfalfa, barley, and sweet clover); top soil thickness (30 and 60 cm); biobarrier material (crushed tuff, bentonite clay, cobble, and cobble-gravel); and biobarrier thickness (clay-15, 30, and 45 cm, others 30, 60, and 90 cm). The crushed tuff, a sandy backfill material, offers little resistance to root and animal intrusion through the cover profile, while bentonite clay, cobble, and cobble-gravel combinations do reduce plant root and animal intrusion thorugh cover profiles. However, dessication of the clay barrier by invading plant roots may limit the usefulness of this material as a moisture and/or biological barrier. The cobble-gravel combination appears to be the best candidate for further testing on a larger scale because the gravel helps impede the imgration of soil into the cobble layer - the probable cause of failure of cobble-only biobarriers

  1. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ranjeeth Kumar Sundararajan

    2015-01-01

    Full Text Available In wireless sensor network (WSN, the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

  2. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  3. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  4. Geochronology and geochemistry of early Paleozoic intrusive rocks from the Khanka Massif in the Russian Far East: Petrogenesis and tectonic implications

    Science.gov (United States)

    Xu, Ting; Xu, Wen-Liang; Wang, Feng; Ge, Wen-Chun; Sorokin, A. A.

    2018-02-01

    This paper presents new geochronological and geochemical data for early Paleozoic intrusive rocks from the Khanka Massif in the Russian Far East, with the aim of elucidating the Paleozoic evolution and tectonic attributes of the Khanka Massif. New U-Pb zircon data indicate that early Paleozoic magmatism within the Khanka Massif can be subdivided into at least four stages: 502, 492, 462-445, and 430 Ma. The 502 Ma pyroxene diorites contain 58.28-59.64 wt% SiO2, 2.84-3.69 wt% MgO, and relatively high Cr and Ni contents. Negative εHf(t) values (- 1.8 to - 0.4), along with other geochemical data, indicate that the primary magma was derived from partial melting of mafic lower crust with the addition of mantle material. The 492 Ma syenogranites have high SiO2 and K2O contents, and show positive Eu anomalies, indicating the primary magma was generated by partial melting of lower crust at relatively low pressure. The 445 Ma Na-rich trondhjemites display high Sr/Y ratios and positive εHf(t) values (+ 1.8 to + 3.9), indicating the primary magma was generated by partial melting of thickened hydrous mafic crust. The 430 Ma granitoids have high SiO2 and K2O contents, zircon εHf(t) values of - 5.4 to + 5.8, and two-stage model ages of 1757-1045 Ma, suggesting the primary magma was produced by partial melting of heterogeneous Proterozoic lower crustal material. The geochemistry of these early Paleozoic intrusive assemblages indicates their formation in an active continental margin setting associated with the subduction of a paleo-oceanic plate beneath the Khanka Massif. The εHf(t) values show an increasingly negative trend with increasing latitude, revealing a lateral heterogeneity of the lower crust beneath the Khanka Massif. Regional comparisons of the magmatic events indicate that the Khanka Massif in the Russian Far East has a tectonic affinity to the Songnen-Zhangguangcai Range Massif rather than the adjacent Jiamusi Massif.

  5. Petrochemical and Sr-Nd isotope investigations of Cretaceous intrusive rocks and their enclaves in the Togouchi-Yoshiwa district, northwest Hiroshima prefecture, SW Japan

    International Nuclear Information System (INIS)

    Ishioka, Jun; Iizumi, Shigeru

    2003-01-01

    Petrographic, petrochemical and Sr-Nd isotopic data are presented for granitoids and microdioritic enclaves from two Cretaceous stocks (Togouchi granodiorite and Tateiwayama granite porphyry) from the Togouchi-Yoshiwa district, northwest Hiroshima prefecture, SW Japan. The data are used to examine the genetic relationships between the microdioritic enclaves and their granitoid hosts. The granodiorite, granite porphyry and the microdioritic enclaves are all calc-alkaline in nature, and belong to the I-type ilmenite series. The Togouchi graniodiorite has a Rb-Sr whole rock isochron age of 85.6±4.7 Ma with an initial Sr isotope ratio (SrI) of 0.70634±0.00012 (2σ). The Tateiwayama granite porphyry has a slightly younger Rb-Sr whole isochron age (77.4±3.1 Ma) but similar SrI of 0.70653±0.00015, suggesting that both stocks may have been derived from the same source. Despite diverse whole rock chemistry, the microdioritic enclaves in the respective intrusives have quite similar initial Sr and Nd isotope ratios, suggesting that they formed by fractional crystallization of a single magma, and also that the source of the enclaves in both intrusives had similar geochemical characteristics. In both stocks, however, the enclaves have distinctly lower initial Sr isotope ratios than their respective host rocks, indicating that they were derived from a different source than their hosts. In view of the geochemical and Sr-Nd isotope data, we infer that the enclave magmas were derived from a similar LILE- and LREE-enriched source to that of the Cretaceous basalts and gabbroic-dioritic rocks that are sporadically distributed in SW Japan. Such mafic to intermediate magmas were probably derived from the upper mantle, and transferred both heat and material to the lower crust, thus producing granitic magmas by partial melting. Successive mafic magmas or their differentiates could then have been injected into the granitic magma chamber, trapped and quenched, resulting in the formation

  6. Charnockitic ortho gneisses and mafic granulites of Cerro Olivo complex, proterozoic basement of SE Uruguay, Part 1: Geology

    International Nuclear Information System (INIS)

    Masquelin, H.

    2008-01-01

    Charnockitic ortho gneisses and mafic granulite s exposed in the Cerro Bori Block, in the center of Punta del Este terrain, were the first document occurrence of granulitic rocks from SE sector of the Uruguayan Shield. We present here their main geological features, with the purpose to suggest some petrologic and structural interesting problems for a future lithogeochemical, mineral chemistry, stable isotopes and fluid inclusion studies about these rocks. We propose some speculation form field-based studies considering a cognate magmatic origin of both kinds of rocks, previous to a homogeneous granulitic metamorphism. Some structural evidences indicate that after their uplift, these rocks were located on over thickened crust, at great to medium deepness. A cataclasis during anatexis and amphibolite-facies mineral association stabilization are common phenomena. Other evidences suggest a polycyclic character for the regional geologic evolution

  7. Spinels of Variscan olivine hornblendites related to the Montnegre granitoids revisited (NE Spain): petrogenetic evidence of mafic magma mixing

    Energy Technology Data Exchange (ETDEWEB)

    Galán, G.; Enrique, P.; Butjosa, L.; Fernández-Roig, L.

    2017-07-01

    Olivine hornblendites (cortlandtites) form part of the Montnegre mafic complex related to late-Variscan I-type granitoids in the Catalan Coastal Ranges. Two generations of spinel are present in these hornblendites: Spl1 forms euhedral crystals included in both olivine and Spl2. Spl2 forms euhedral to anhedral crystals associated with phlogopite and fibrous colourless amphibole forming pseudomorphs after olivine. Compositions of Spl1 are picotite-Al chromite (Fe#: 77.78-66.60; Cr#: 30.12-52.22; Fe3+/R3+: 6.99-21.89; 0.10< TiO2%< 0.62). Compositions of Spl2 are pleonaste (Fe#: 37.86-52.12; Cr#: 1.00-15.45; Fe3+/R3+: 0.31-5.21; TiO2% <0.10%). The two types of spinel follow a CrAl trend, mainly due to the substitution (Fe2+)-1Cr-1= MgAl, which is interpreted as the result of mixing between two different mantle-derived melts. The compositions of early Spl1 crystals included in olivine are characteristic of Al-rich basalts. More aluminous Spl2 would result from reaction of olivine with a less evolved, Al and K-rich mantle-derived melt after new refilling of the magma chamber or channel. As a whole, spinels from similar examples of Variscan olivine hronblendites also follow a CrAl trend with high Fe# and starting at higher Cr# than other trends of this type. Cr# heterogeneity in the early spinels from these Variscan hornblendites would be inherited from the variable Al content of the mafic melts involved in their genesis.

  8. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  9. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  10. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  11. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  12. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  13. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  14. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  15. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  16. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  17. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  18. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  19. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  20. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  1. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  2. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  3. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  4. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  5. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  6. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  7. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  8. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  9. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  10. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  11. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  12. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  13. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  14. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  15. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  16. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  17. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  18. Finite element analysis of ground deformation due to dike intrusion with applications to Mt. Etna volcano

    Directory of Open Access Journals (Sweden)

    G. La Rosa

    2004-06-01

    Full Text Available A 2D finite elements study was carried out to analyse the effects caused by dike intrusion inside a heterogeneous medium and with a realistic topography of Mt. Etna volcano. Firstly, the method (dimension domain, elements type was calibrated using plane strain models in elastic half-spaces; the results were compared with those obtained from analytical dislocation models. Then the effects caused both by the topographic variations and the presence of multi-layered medium on the surface, were studied. In particular, an application was then considered to Mt. Etna by taking into account the real topography and the stratification deduced from seismic tomography. In these conditions, the effects expected by the dike, employed to model the 2001 eruption under simple elastic half-space medium conditions, were computed, showing that topography is extremely important, at least in the near field.

  19. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  20. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  1. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  2. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  3. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  4. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  5. A Thermodynamic Approach for Modeling H2O-CO2 Solubility in Alkali-rich Mafic Magmas at Mid-crustal Pressures

    Science.gov (United States)

    Allison, C. M.; Roggensack, K.; Clarke, A. B.

    2017-12-01

    Volatile solubility in magmas is dependent on several factors, including composition and pressure. Mafic (basaltic) magmas with high concentrations of alkali elements (Na and K) are capable of dissolving larger quantities of H2O and CO2 than low-alkali basalt. The exsolution of abundant gases dissolved in alkali-rich mafic magmas can contribute to large explosive eruptions. Existing volatile solubility models for alkali-rich mafic magmas are well calibrated below 200 MPa, but at greater pressures the experimental data is sparse. To allow for accurate interpretation of mafic magmatic systems at higher pressures, we conducted a set of mixed H2O-CO2 volatile solubility experiments between 400 and 600 MPa at 1200 °C in six mafic compositions with variable alkali contents. Compositions include magmas from volcanoes in Italy, Antarctica, and Arizona. Results from our experiments indicate that existing volatile solubility models for alkali-rich mafic magmas, if extrapolated beyond their calibrated range, over-predict CO2 solubility at mid-crustal pressures. Physically, these results suggest that volatile exsolution can occur at deeper levels than what can be resolved from the lower-pressure experimental data. Existing thermodynamic models used to calculate volatile solubility at different pressures require two experimentally derived parameters. These parameters represent the partial molar volume of the condensed volatile species in the melt and its equilibrium constant, both calculated at a standard temperature and pressure. We derived these parameters for each studied composition and the corresponding thermodynamic model shows good agreement with the CO2 solubility data of the experiments. A general alkali basalt solubility model was also constructed by establishing a relationship between magma composition and the thermodynamic parameters. We utilize cation fractions from our six compositions along with four compositions from the experimental literature in a linear

  6. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  7. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Directory of Open Access Journals (Sweden)

    K. Iyer

    2018-01-01

    Full Text Available Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene–Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary

  8. SILLi 1.0: a 1-D numerical tool quantifying the thermal effects of sill intrusions

    Science.gov (United States)

    Iyer, Karthik; Svensen, Henrik; Schmid, Daniel W.

    2018-01-01

    Igneous intrusions in sedimentary basins may have a profound effect on the thermal structure and physical properties of the hosting sedimentary rocks. These include mechanical effects such as deformation and uplift of sedimentary layers, generation of overpressure, mineral reactions and porosity evolution, and fracturing and vent formation following devolatilization reactions and the generation of CO2 and CH4. The gas generation and subsequent migration and venting may have contributed to several of the past climatic changes such as the end-Permian event and the Paleocene-Eocene Thermal Maximum. Additionally, the generation and expulsion of hydrocarbons and cracking of pre-existing oil reservoirs around a hot magmatic intrusion are of significant interest to the energy industry. In this paper, we present a user-friendly 1-D finite element method (FEM)-based tool, SILLi, which calculates the thermal effects of sill intrusions on the enclosing sedimentary stratigraphy. The model is accompanied by three case studies of sills emplaced in two different sedimentary basins, the Karoo Basin in South Africa and the Vøring Basin off the shore of Norway. An additional example includes emplacement of a dyke in a cooling pluton which forgoes sedimentation within a basin. Input data for the model are the present-day well log or sedimentary column with an Excel input file and include rock parameters such as thermal conductivity, total organic carbon (TOC) content, porosity and latent heats. The model accounts for sedimentation and burial based on a rate calculated by the sedimentary layer thickness and age. Erosion of the sedimentary column is also included to account for realistic basin evolution. Multiple sills can be emplaced within the system with varying ages. The emplacement of a sill occurs instantaneously. The model can be applied to volcanic sedimentary basins occurring globally. The model output includes the thermal evolution of the sedimentary column through time and

  9. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  10. Field-trip guide to mafic volcanism of the Cascade Range in Central Oregon—A volcanic, tectonic, hydrologic, and geomorphic journey

    Science.gov (United States)

    Deligne, Natalia I.; Mckay, Daniele; Conrey, Richard M.; Grant, Gordon E.; Johnson, Emily R.; O'Connor, Jim; Sweeney, Kristin

    2017-08-16

    The Cascade Range in central Oregon has been shaped by tectonics, volcanism, and hydrology, as well as geomorphic forces that include glaciations. As a result of the rich interplay between these forces, mafic volcanism here can have surprising manifestations, which include relatively large tephra footprints and extensive lava flows, as well as water shortages, transportation and agricultural disruption, and forest fires. Although the focus of this multidisciplinary field trip will be on mafic volcanism, we will also look at the hydrology, geomorphology, and ecology of the area, and we will examine how these elements both influence and are influenced by mafic volcanism. We will see mafic volcanic rocks at the Sand Mountain volcanic field and in the Santiam Pass area, at McKenzie Pass, and in the southern Bend region. In addition, this field trip will occur during a total solar eclipse, the first one visible in the United States in more than 25 years (and the first seen in the conterminous United States in more than 37 years).The Cascade Range is the result of subduction of the Juan de Fuca plate underneath the North American plate. This north-south-trending volcanic mountain range is immediately downwind of the Pacific Ocean, a huge source of moisture. As moisture is blown eastward from the Pacific on prevailing winds, it encounters the Cascade Range in Oregon, and the resulting orographic lift and corresponding rain shadow is one of the strongest precipitation gradients in the conterminous United States. We will see how the products of the volcanoes in the central Oregon Cascades have had a profound influence on groundwater flow and, thus, on the distribution of Pacific moisture. We will also see the influence that mafic volcanism has had on landscape evolution, vegetation development, and general hydrology.

  11. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  12. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  13. Catchment-wide weathering and erosion rates of mafic, ultramafic, and granitic rock from cosmogenic meteoric 10Be/9Be ratios

    Science.gov (United States)

    Dannhaus, N.; Wittmann, H.; Krám, P.; Christl, M.; von Blanckenburg, F.

    2018-02-01

    Quantifying rates of weathering and erosion of mafic rocks is essential for estimating changes to the oceans alkalinity budget that plays a significant role in regulating atmospheric CO2 levels. In this study, we present catchment-wide rates of weathering, erosion, and denudation measured with cosmogenic nuclides in mafic and ultramafic rock. We use the ratio of the meteoric cosmogenic nuclide 10Be, deposited from the atmosphere onto the weathering zone, to stable 9Be, a trace metal released by silicate weathering. We tested this approach in stream sediment and water from three upland forested catchments in the north-west Czech Republic. The catchments are underlain by felsic (granite), mafic (amphibolite) and ultramafic (serpentinite) lithologies. Due to acid rain deposition in the 20th century, the waters in the granite catchment exhibit acidic pH, whereas waters in the mafic catchments exhibit neutral to alkaline pH values due to their acid buffering capability. The atmospheric depositional 10Be flux is estimated to be balanced with the streams' dissolved and particulate meteoric 10Be export flux to within a factor of two. We suggest a correlation method to derive bedrock Be concentrations, required as an input parameter, which are highly heterogeneous in these small catchments. Derived Earth surface metrics comprise (1) Denudation rates calculated from the 10Be/9Be ratio of the "reactive" Be (meaning sorbed to mineral surfaces) range between 110 and 185 t km-2 y-1 (40 and 70 mm ky-1). These rates are similar to denudation rates we obtained from in situ-cosmogenic 10Be in quartz minerals present in the bedrock or in quartz veins in the felsic and the mafic catchment. (2) The degree of weathering, calculated from the fraction of 9Be released from primary minerals as a new proxy, is about 40-50% in the mafic catchments, and 10% in the granitic catchment. Lastly, (3) erosion rates were calculated from 10Be concentrations in river sediment and corrected for sorting

  14. Origin of Fe-Ti Oxide Mineralization in the Middle Paleoproterozoic Elet'ozero Syenite-Gabbro Intrusive Complex (Northern Karelia, Russia)

    Science.gov (United States)

    Sharkov, E. V.; Chistyakov, A. V.; Shchiptsov, V. V.; Bogina, M. M.; Frolov, P. V.

    2018-03-01

    Magmatic oxide mineralization widely developed in syenite-gabbro intrusive complexes is an important Fe and Ti resource. However, its origin is hotly debatable. Some researchers believe that the oxide ores were formed through precipitation of dense Ti-magnetite in an initial ferrogabbroic magma (Bai et al., 2012), whereas others consider them as a product of immiscible splitting of Fe-rich liquid during crystallization of Fe-Ti basaltic magma (Zhou et al., 2013). We consider this problem with a study of the Middle Paleoproterozoic (2086 ± 30 Ma) Elet'ozero Ti-bearing layered intrusive complex in northern Karelia (Baltic Shield). The first ore-bearing phase of the complex is mainly made up of diverse ferrogabbros, with subordinate clinopyroxenites and peridotites. Fe-Ti oxides (magnetite, Ti-magnetite, and ilmenite) usually account for 10-15 vol %, reaching 30-70% in ore varieties. The second intrusive phase is formed by alkaline and nepheline syenites. Petrographical, mineralogical, and geochemical data indicate that the first phase of the intrusion was derived from a moderately alkaline Fe-Ti basaltic melt, while the parental melt of the second phase was close in composition to alkaline trachyte. The orebodies comprise disseminated and massive ores. The disseminated Fe-Ti oxide ores make up lenses and layers conformable to general layering. Massive ores occur in subordinate amounts as layers and lenses, as well as cross-cutting veins. Elevated Nb and Ta contents in Fe-Ti oxides makes it possible to consider them complex ores. It is shown that the Fe-Ti oxide mineralization is related to the formation of a residual (Fe,Ti)-rich liquid, which lasted for the entire solidification history of the first intrusive phase. The liquid originated through multiple enrichment of Fe and Ti in the crystallization zone of the intrusion owing to the following processes: (1) precipitation of silicate minerals in the crystallization zone with a corresponding increase in the Fe and

  15. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  16. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  17. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  18. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  19. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  20. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  1. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  2. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  3. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  4. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  5. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  6. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  7. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  8. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  9. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  10. Growth of plutons by incremental emplacement of sheets in crystal-rich host: Evidence from Miocene intrusions of the Colorado River region, Nevada, USA

    Science.gov (United States)

    Miller, C.F.; Furbish, D.J.; Walker, B.A.; Claiborne, L.L.; Koteas, G.C.; Bleick, H.A.; Miller, J.S.

    2011-01-01

    Growing evidence supports the notion that plutons are constructed incrementally, commonly over long periods of time, yet field evidence for the multiple injections that seem to be required is commonly sparse or absent. Timescales of up to several million years, among other arguments, indicate that the dominant volume does not remain largely molten, yet if growing plutons are constructed from rapidly solidifying increments it is unlikely that intrusive contacts would escape notice. A model wherein magma increments are emplaced into melt-bearing but crystal-rich host, rather than either solid or crystal-poor material, provides a plausible explanation for this apparent conundrum. A partially solidified intrusion undoubtedly comprises zones with contrasting melt fraction and therefore strength. Depending on whether these zones behave elastically or ductilely in response to dike emplacement, intruding magma may spread to form sheets by either of two mechanisms. If the melt-bearing host is elastic on the relevant timescale, magma spreads rather than continuing to propagate upward, where it encounters a zone of higher rigidity (higher crystal fraction). Similarly, if the dike at first ascends through rigid, melt-poor material and then encounters a zone that is weak enough (poor enough in crystals) to respond ductilely, the ascending material will also spread because the dike tip ceases to propagate as in rigid material. We propose that ascending magma is thus in essence trapped, by either mechanism, within relatively crystal-poor zones. Contacts will commonly be obscure from the start because the contrast between intruding material (crystal-poorer magma) and host (crystal-richer material) is subtle, and they may be obscured even further by subsequent destabilization of the crystal-melt framework. Field evidence and zircon zoning stratigraphy in plutons of the Colorado River region of southern Nevada support the hypothesis that emplacement of magma replenishments into a

  11. Solution-mass transfer and grain boundary sliding in mafic shear zones - comparison between experiments and nature

    Science.gov (United States)

    Marti, Sina; Heilbronner, Renée; Stünitz, Holger; Plümper, Oliver; Drury, Martyn

    2017-04-01

    Grain size sensitive creep (GSSC) mechanisms are widely recognized to be the most efficient deformation mechanisms in shear zones. With or without initial fracturing and fluid infiltration, the onset of heterogeneous nucleation leading to strong grain size reduction is a frequently described process for the initiation of GSSC. Phase mixing due to reaction and heterogeneous nucleation during GSSC impedes grain growth, sustaining small grain sizes as a prerequisite for GSSC. Here we present rock deformation experiments on 'wet' plagioclase - pyroxene mixtures at T=800°C, P=1.0 and 1.5GPa and strain rates of 2e-5 - 2e-6 1/s, performed with a Griggs-type solid medium deformation apparatus. Microstructural criteria are used to show that both, grain boundary sliding (GBS) and solution-mass transfer processes are active and are interpreted to be the dominant strain accommodating processes. Displacement is localized within shear bands formed by fine-grained ( 300 - 500nm) plagioclase (Pl) and the syn-kinematic reaction products amphibole (Amph), quartz (Qz) and zoisite (Zo). We compare our experiments with a natural case - a sheared mafic pegmatite (P-T during deformation 0.7 - 0.9 GPa, 610 - 710 °C; Getsinger et al., 2013) from Northern Norway. Except for the difference in grain size of the experimental and natural samples, microstructures are strikingly alike. The experimental and natural P- and especially T-conditions are very similar. Consequently, extrapolation from experiments to nature must be made without a significant 'temperature-time' trade-off, which is normally taken advantage of when relating experimental to natural strain rates. We will discuss under which assumptions extrapolation to nature in our case is likely feasible. Syn-kinematic reactions during GBS and solution-mass transport are commonly interpreted to result in an ordered (anticlustered) phase mixture. However, phase mixing in our case is restricted: Mixing is extensive between Pl + Zo + Qz and

  12. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  13. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated

  14. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  15. Mass memory formatter subsystem of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-09-01

    The Mass Memory Formatter was developed as part of the Adaptive Intrusion Data System (AIDS) to control a 2.4-megabit mass memory. The data from a Memory Controlled Processor is formatted before it is stored in the memory and reformatted during the readout mode. The data is then transmitted to a NOVA 2 minicomputer-controlled magnetic tape recorder for storage. Techniques and circuits are described

  16. Respon Konsumen pada Mobile Advergames: Intrusiveness dan Irritation

    Directory of Open Access Journals (Sweden)

    Sony Kusumasondjaja

    2016-12-01

    Full Text Available Abstract. Increasing adoption of mobile advergames to deliver marketing messages has not been followed by empirical findings to support its effectiveness. This research attempts to examine the effect of mobile advergames intrusiveness on consumer irritation, attitudes, and purchase intention. This investigation on mobile advergame effectiveness was based on the increasing use of mobile media to deliver marketing messages to consumers from different demographic background. Conceptual framework was developed based on Advertising Avoidance Theory. For data collection, self-administered survey was conducted by adopting purposive sampling involving 213 respondents residing in Surabaya who have had experience in playing mobile game as respondents. Results indicate that intrusiveness positively affects consumer irritation. Consumer irritation negatively affects attitude towards the mobile advergames and attitude towards the advertised product. The better the consumer attitude towards the mobile advergames, the more positive the attitude towards the advertised product. Moreover, the more positive the attitude towards the advertised product, the greater the consumer intention to purchase. Interestingly, consumer attitude toward the mobile advergames has insignificant influence on purchase intention. Findings of the study offer significant contribution to marketing practices using mobile advergames as media placement in their advertising strategy. Keywords: intrusiveness, irritation, mobile advergames, attitude, advertising

  17. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  18. Treatment of Intrusive Suicidal Imagery Using Eye Movements

    Directory of Open Access Journals (Sweden)

    Jaël S. van Bentum

    2017-06-01

    Full Text Available Suicide and suicidal behavior are major public health concerns, and affect 3–9% of the population worldwide. Despite increased efforts for national suicide prevention strategies, there are still few effective interventions available for reducing suicide risk. In this article, we describe various theoretical approaches for suicide ideation and behavior, and propose to examine the possible effectiveness of a new and innovative preventive strategy. A model of suicidal intrusion (mental imagery related to suicide, also referred to as suicidal flash-forwards is presented describing one of the assumed mechanisms in the etiology of suicide and the mechanism of therapeutic change. We provide a brief rationale for an Eye Movement Dual Task (EMDT treatment for suicidal intrusions, describing techniques that can be used to target these suicidal mental images and thoughts to reduce overall behavior. Based on the available empirical evidence for the mechanisms of suicidal intrusions, this approach appears to be a promising new treatment to prevent suicidal behavior as it potentially targets one of the linking pins between suicidal ideation and suicidal actions.

  19. Active Low Intrusion Hybrid Monitor for Wireless Sensor Networks.

    Science.gov (United States)

    Navia, Marlon; Campelo, Jose C; Bonastre, Alberto; Ors, Rafael; Capella, Juan V; Serrano, Juan J

    2015-09-18

    Several systems have been proposed to monitor wireless sensor networks (WSN). These systems may be active (causing a high degree of intrusion) or passive (low observability inside the nodes). This paper presents the implementation of an active hybrid (hardware and software) monitor with low intrusion. It is based on the addition to the sensor node of a monitor node (hardware part) which, through a standard interface, is able to receive the monitoring information sent by a piece of software executed in the sensor node. The intrusion on time, code, and energy caused in the sensor nodes by the monitor is evaluated as a function of data size and the interface used. Then different interfaces, commonly available in sensor nodes, are evaluated: serial transmission (USART), serial peripheral interface (SPI), and parallel. The proposed hybrid monitor provides highly detailed information, barely disturbed by the measurement tool (interference), about the behavior of the WSN that may be used to evaluate many properties such as performance, dependability, security, etc. Monitor nodes are self-powered and may be removed after the monitoring campaign to be reused in other campaigns and/or WSNs. No other hardware-independent monitoring platforms with such low interference have been found in the literature.

  20. Coplanar capacitance sensors for detecting water intrusion in composite structures

    International Nuclear Information System (INIS)

    Nassr, Amr A; El-Dakhakhni, Wael W; Ahmed, Wael H

    2008-01-01

    Composite materials are becoming more affordable and widely used for retrofitting, rehabilitating and repairing reinforced concrete structures designed and constructed under older specifications. However, the mechanical properties and long-term durability of composite materials may degrade severely in the presence of water intrusion. This study presents a new non-destructive evaluation (NDE) technique for detecting the water intrusion in composite structures by evaluating the dielectric properties of different composite system constituent materials. The variation in the dielectric signatures was employed to design a coplanar capacitance sensor with high sensitivity to detect such defects. An analytical model was used to study the effect of the sensor geometry on the output signal and to optimize sensor design. A finite element model was developed to validate analytical results and to evaluate other sensor design-related parameters. Experimental testing of a concrete specimen wrapped with composite laminate and containing a series of pre-induced water intrusion defects was conducted in order to validate the concept of the new technique. Experimental data showed excellent agreement with the finite element model predictions and confirmed sensor performance

  1. A Nuisance Alarm Data System for evaluation of intrusion detectors

    International Nuclear Information System (INIS)

    Ream, W.K.

    1990-01-01

    A Nuisance Alarm Data System (NADS) was developed to gather long-term background alarm data on exterior intrusion detectors as part of their evaluation. Since nuisance alarms play an important part in the selection of intrusion detectors for use at Department of Energy (DOE) facilities, an economical and reliable way to monitor and record these alarms was needed. NADS consists of an IBM personal computer and printer along with other commercial units to communicate with the detectors, to gather weather data, and to record video for assessment. Each alarm, its assessment, and the weather conditions occurring at alarm time are placed into a data base that is used in the evaluation of the detector. The operating software is written in Turbo Pascal for easy maintenance and modification. A portable system, based on the NADS design, has been built and shipped to other DOE locations to do on-site alarm monitoring. This has been valuable for the comparison of different detectors in the on-site environment and for testing new detectors when the appropriate conditions do not exist or cannot be simulated at the Exterior Intrusion Detection Testbed

  2. Biological intrusion of low-level-waste trench covers

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Gladney, E.S.

    1981-01-01

    The long-term integrity of low-level waste shallow land burial sites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. Past research on low-level waste shallow land burial methods has emphasized physical (i.e., water infiltration, soil erosion) and chemical (radionuclide leaching) processes that can cause waste site failure and subsequent radionuclide transport. The purpose of this paper is to demonstrate the need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatments. Plants and animals not only can transport radionuclides to the ground surface via root systems and soil excavated from the cover profile by animal burrowing activities, but they modify physical and chemical processes within the cover profile by changing the water infiltration rates, soil erosion rates and chemical composition of the soil. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and soil overburden depth. The rate of biological intrusion through the various barrier materials is being evaluated through the use of activatable stable tracers

  3. Kissing Bug ( spp. Intrusion into Homes: Troublesome Bites and Domiciliation

    Directory of Open Access Journals (Sweden)

    Stephen A. Klotz

    2016-01-01

    Full Text Available Kissing bugs ( Triatoma spp. frequently enter homes and bite human and pet occupants. Bites may lead to severe allergic reactions and, in some cases, death. Kissing bugs are also vectors of Trypanosoma cruzi , the cause of Chagas disease. In general, modern houses in the United States are not conducive to domiciliation of kissing bugs (bugs living out their entire life within the home with the presence of eggs, nymphs, adults, and exuviae. Construction features such as concrete foundations, solid walls and ceilings, window screens, tight thresholds for doors and windows, and other measures impede bug entry into homes, and air conditioning reduces the need for open doors and windows. Where Chagas disease is endemic in Mexico and Central and South America, homes often have thatch roofs, adobe walls, and open doors and windows. We investigated numerous instances of kissing bug intrusions into homes in Southern Arizona, California, and Louisiana and documented the reactions to kissing bug bites. Our work confirms the importance of modern home construction in limiting kissing bug intrusions. Older homes, especially those lacking modern screening, caulking, and weather stripping to reduce air leakage, may be subject to kissing bug intrusions and domiciliation. We describe a community in Southern Arizona where domiciliation of homes by Triatoma recurva is common. We also provide recent data regarding kissing bug bites and allergic reactions to the bites.

  4. Data mining approach to web application intrusions detection

    Science.gov (United States)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  5. Numerical Continuation Methods for Intrusive Uncertainty Quantification Studies

    Energy Technology Data Exchange (ETDEWEB)

    Safta, Cosmin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Najm, Habib N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Phipps, Eric Todd [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    Rigorous modeling of engineering systems relies on efficient propagation of uncertainty from input parameters to model outputs. In recent years, there has been substantial development of probabilistic polynomial chaos (PC) Uncertainty Quantification (UQ) methods, enabling studies in expensive computational models. One approach, termed ”intrusive”, involving reformulation of the governing equations, has been found to have superior computational performance compared to non-intrusive sampling-based methods in relevant large-scale problems, particularly in the context of emerging architectures. However, the utility of intrusive methods has been severely limited due to detrimental numerical instabilities associated with strong nonlinear physics. Previous methods for stabilizing these constructions tend to add unacceptably high computational costs, particularly in problems with many uncertain parameters. In order to address these challenges, we propose to adapt and improve numerical continuation methods for the robust time integration of intrusive PC system dynamics. We propose adaptive methods, starting with a small uncertainty for which the model has stable behavior and gradually moving to larger uncertainty where the instabilities are rampant, in a manner that provides a suitable solution.

  6. An Automata Based Intrusion Detection Method for Internet of Things

    Directory of Open Access Journals (Sweden)

    Yulong Fu

    2017-01-01

    Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.

  7. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  8. Abstracting massive data for lightweight intrusion detection in computer networks

    KAUST Repository

    Wang, Wei

    2016-10-15

    Anomaly intrusion detection in big data environments calls for lightweight models that are able to achieve real-time performance during detection. Abstracting audit data provides a solution to improve the efficiency of data processing in intrusion detection. Data abstraction refers to abstract or extract the most relevant information from the massive dataset. In this work, we propose three strategies of data abstraction, namely, exemplar extraction, attribute selection and attribute abstraction. We first propose an effective method called exemplar extraction to extract representative subsets from the original massive data prior to building the detection models. Two clustering algorithms, Affinity Propagation (AP) and traditional . k-means, are employed to find the exemplars from the audit data. . k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA) and one-class Support Vector Machine (SVM) are used for the detection. We then employ another two strategies, attribute selection and attribute extraction, to abstract audit data for anomaly intrusion detection. Two http streams collected from a real computing environment as well as the KDD\\'99 benchmark data set are used to validate these three strategies of data abstraction. The comprehensive experimental results show that while all the three strategies improve the detection efficiency, the AP-based exemplar extraction achieves the best performance of data abstraction.

  9. Metamorphic P-T path and zircon U-Pb dating of HP mafic granulites in the Yushugou granulite-peridotite complex, Chinese South Tianshan, NW China

    Science.gov (United States)

    Zhang, Lu; Zhang, Lifei; Xia, Bin; Lü, Zeng

    2018-03-01

    Co-existing granulite and peridotite may represent relics of the paleo-suture zone and provides an optimal opportunity for better understanding of orogeny between two blocks. In this study, we carried out petrological and U-Pb zircon dating investigation on the HP mafic granulites associated with peridotite complex at Yushugou in Chinese South Tianshan. The studied samples include garnet-bearing high-pressure mafic granulites which can be subdivided into two types: Type I orthopyroxene-free and Type II orthopyroxene-bearing granulites and amphibolite. Type I granulite (Y21-2) has a mineral assemblage of garnet (33 vol.%), clinopyroxene (32 vol.%) and plagioclase (30 vol.%); and Type II granulite (Y18-8) has a mineral assemblage of garnet (22 vol.%), clinopyroxene (10 vol.%), orthopyroxene (14 vol.%), plagioclase (45 vol.%) and quartz. Garnet in both granulites exhibits core-rim structure characterized by increasing grossular and decreasing pyrope from core to rim. Petrographic observations and phase equilibrium modeling using THERMOCALC in the NCFMASHTO system for the mafic granulites (Y21-2 and Y18-8) show three stages of metamorphism: Stage I (granulite facies) was recognized by the large porphyroblastic garnet core, with P-T conditions of 9.8-10.4 Kbar and 860-900 °C (Y21-2) and 9.9-10.6 Kbar and 875-890 °C (Y18-8), respectively; Stage II (HP granulite facies) has peak P-T conditions of 12.1 Kbar at 755 °C (Y21-2) and 13.8 Kbar at 815 °C (Y18-8) using mineral assemblages combining with garnet rim compositions with maximum grossular and minimum pyrope contents; Stage III (amphibolite facies) was characterized by the development of calcic amphibole in granulites with temperature of 446-563 °C. Therefore, an anticlockwise P-T path characterized by simultaneous temperature-decreasing and pressure-increasing was inferred for the Yushugou HP mafic granulite. Studies of zircon morphology and inclusions, combined with zircon U-Pb dating and REE geochemistry

  10. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    Science.gov (United States)

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  11. A Late Holocene explosive mafic eruption of Villarrica volcano, Southern Andes: The Chaimilla deposit

    Science.gov (United States)

    Costantini, L.; Pioli, L.; Bonadonna, C.; Clavero, J.; Longchamp, C.

    2011-03-01

    Villarrica (Chile) is one of the most active volcanoes in South America having erupted about 60 times in the last 460 years. Although its historical eruptive activity has been mainly effusive and weakly explosive, it had strong explosive behaviour in postglacial times. Chaimilla (activity. The deposit is dispersed over an area of 250 km 2 and consists of 8 units (A-H) which were grouped into four sequences. Stratigraphic data suggest that the eruption had a relatively short duration and evolved from i) an Opening phase, dispersing ash, lapilli clasts, accretionary lapilli, blocks and bombs, to ii) a Pulsatory phase, originating a series of magmatic explosions, to iii) a Collapsing phase, characterised by unstable plumes which emplaced a series of pyroclastic density currents intercalated with thin fallout layers and finally to iv) a Climactic phase forming a more sustained plume which eventually collapsed generating the final pyroclastic density currents. The deposit (fall and flow) has a minimum cumulative volume of 0.6 km 3, with the main sustained phase being associated with a VEI 4 and the flow units having a minimum estimated total volume of 0.04 km 3. The erupted material has a homogenous chemical composition but displays a remarkable variability in both textural and physical properties. The density distribution of juvenile products shows a clear bimodality characterised by two main populations: P1 and P2. Population P1 consists of highly vesicular clasts (modal density around 1000 kg m - 3 ) with mostly sub-spherical bubbles and moderately crystallised groundmass with large-sized microlites. Clasts from population P2 are poorly vesicular (modal density around 1600 kg m - 3 ) with irregular to collapsed bubbles and numerous smaller microlites. The variability of both vesicularity and microlite characteristics suggests the involvement of two magma batches with distinct pre-eruptive degassing and rising histories. Our eruption conceptual model implies the

  12. Innovative methods to reduce salt water intrusion in harbours

    Science.gov (United States)

    Groenenboom, J.; Uittenbogaard, R.; Hulsen, L.; van der Kaaij, T.; Kielen, N.

    2017-12-01

    The availability of fresh water in densely populated estuarine environments will in the future more often be threatened due to both human (e.g. channel deepening) and natural (sea-level rise, storm surges, extremely low river discharges) causes. Here, the salt water intrusion into the New Waterway, the main navigation channel of the port of Rotterdam, is used as a case study to elaborate on two innovative ways to mitigate the effects of salt water intrusion. The first method is based on the concept that vertical mixing of a salt wedge reduces its intrusion length. The idea is to equip a vessel with cranes that hold perforated tubes close to the bed alongside the vessel. By connecting compressors to the perforated tubes, a bubble screen with an adjustable vertical location can be created. Since the horizontal location of the bubble screens is not fixed, the vessel can sail in the vicinity of the moving salt wedge therewith increasing the effectiveness of the method. Another advantage of this intervention is that it can be deployed temporarily when the urgency for the prevention of salt water intrusion is high. The second method originates from the Port of Rotterdam Authority and is inspired by a small bypass that is present between two parallel channels (New Waterway and Caland Canal) connecting the North Sea to the Port of Rotterdam. Due to the different hydrodynamic characteristics of the hinterland of both channels, a difference in salinity and water level is present between both ends of the bypass. As a result, a lateral inflow of water into the New Waterway occurs at the same moment that the flood velocities transport saline water landwards. The lateral inflow of water into this channel has no momentum in the landward direction and therefore decreases the landward flow velocity and therewith the salt water intrusion. In addition, the inflow drives a vertical circulation that mixes the water column close to the bypass. Similar to the bubble screens mentioned

  13. Fluid Inclusion Study of Quartz Xenocrysts in Mafic Dykes from Kawant Area, Chhota Udaipur District, Gujarat, India

    Directory of Open Access Journals (Sweden)

    Randive Kirtikumar

    2015-09-01

    Full Text Available Unusual mafic dykes occur in the proximity of the Ambadongar Carbonatite Complex, Lower Narmada Valley, Gujarat, India. The dykes contain dense population of quartz xenocrysts within the basaltic matrix metasomatised by carbonate-rich fluids. Plagioclase feldspars, relict pyroxenes, chlorite, barite, rutile, magnetite, Fe-Ti oxides and glass were identified in the basaltic matrix. Quartz xenocrysts occur in various shapes and sizes and form an intricate growth pattern with carbonates. The xenocrysts are fractured and contain several types of primary and secondary, single phase and two-phase fluid inclusions. The two-phase inclusions are dominated by aqueous liquid, whereas the monophase inclusions are composed of carbonic gas and the aqueous inclusions homogenize to liquid between 226°C and 361°C. Majority of the inclusions are secondary in origin and are therefore unrelated to the crystallization of quartz. Moreover, the inclusions have mixed carbonic-aqueous compositions that inhibit their direct correlation with the crustal or mantle fluids. The composition of dilute CO2-rich fluids observed in the quartz xenocrysts appear similar to those exsolved during the final stages of evolution of the Amba Dongar carbonatites. However, the carbonates are devoid of fluid inclusions and therefore their genetic relation with the quartz xenocrysts cannot be established.

  14. Aspects of cold intrusions over Greece during autumn

    Science.gov (United States)

    Mita, Constantina; Marinaki, Aggeliki; Zeini, Konstantina; Konstantara, Metaxia

    2010-05-01

    This study is focused on the description of atmospheric disturbances that caused intense cold intrusions over Greece during autumn for a period of 25 years (1982-2006). The study was based on data analysis from the meteorological station network of the Hellenic National Meteorological Service (HNMS) and the European Centre for Medium Range Weather Forecasts (ECMWF). Initially, the days with temperature at the isobaric surface of 850 hPa less or equal to the mean temperature for the 10-day period the day under investigation belongs to are isolated, composing a new confined data set which was further used. An event of intense cold intrusion is identified based on a subjective set of criteria, considering the temperature decrease at the level of 850 hPa and its duration. In particular, the criteria that were used to identify a cold intrusion were: temperature variation between two successive days at the isobaric level of 850 hPa being equal or greater than 50 C at least once during the event and duration of the event of at least two successive days with continuous temperature decrease. Additionally, the synoptic analysis of the atmospheric disturbances involved using weather charts from ECMWF, revealed that all cases were related to low pressure systems at the level of 500 hPa, accompanied by cold air masses. Moreover, a methodology proposed to classify the cold intrusions based on general circulation characteristics of the atmosphere, resulted in seven major categories. More than half of the events belong in two categories, originated northwest of the greater Greek area (Greece and parts of neighbouring countries), between 400 and 600 N. Further analysis indicated that the frequency of events increases from September to November and the majority of the events lasted two to three days. Additionally, the non-parametric Mann-Kendall test was used for the investigation of the statistical significance of the trends appearing in the results. The tests revealed that over

  15. Springtime high surface ozone events over the western United States: Quantifying the role of stratospheric intrusions

    Science.gov (United States)

    Fiore, A. M.; Lin, M.; Cooper, O. R.; Horowitz, L. W.; Naik, V.; Levy, H.; Langford, A. O.; Johnson, B. J.; Oltmans, S. J.; Senff, C. J.

    2011-12-01

    As the National Ambient Air Quality (NAAQS) standard for ozone (O_{3}) is lowered, it pushes closer to policy-relevant background levels (O_{3} concentrations that would exist in the absence of North American anthropogenic emissions), making attainment more difficult with local controls. We quantify the Asian and stratospheric components of this North American background, with a primary focus on the western United States. Prior work has identified this region as a hotspot for deep stratospheric intrusions in spring. We conduct global simulations at 200 km and 50 km horizontal resolution with the GFDL AM3 model, including a stratospheric O_{3} tracer and two sensitivity simulations with anthropogenic emissions from Asia and North America turned off. The model is evaluated with a suite of in situ and satellite measurements during the NOAA CalNex campaign (May-June 2010). The model reproduces the principle features in the observed surface to near tropopause distribution of O_{3} along the California coast, including its latitudinal variation and the development of regional high-O_{3} episodes. Four deep tropopause folds are diagnosed and we find that the remnants of these stratospheric intrusions are transported to the surface of Southern California and Western U.S. Rocky Mountains, contributing 10-30 ppbv positive anomalies relative to the simulated campaign mean stratospheric component in the model surface layer. We further examine the contribution of North American background, including its stratospheric and Asian components, to the entire distribution of observed MDA8 O_{3} at 12 high-elevation CASTNet sites in the Mountain West. We find that the stratospheric O_{3} tracer constitutes 50% of the North American background, and can enhance surface maximum daily 8-hour average (MDA8) O_{3} by 20 ppb when observed surface O_{3} is in the range of 60-80 ppbv. Our analysis highlights the potential for natural sources such as deep stratospheric intrusions to contribute

  16. Effect of ultramafic intrusions and associated mineralized rocks on the aqueous geochemistry of the Tangle Lakes Area, Alaska: Chapter C in Studies by the U.S. Geological Survey in Alaska, 2011

    Science.gov (United States)

    Wang, Bronwen; Gough, Larry P.; Wanty, Richard B.; Lee, Gregory K.; Vohden, James; O’Neill, J. Michael; Kerin, L. Jack

    2013-01-01

    Stream water was collected at 30 sites within the Tangle Lakes area of the Delta mineral belt in Alaska. Sampling focused on streams near the ultramafic rocks of the Fish Lake intrusive complex south of Eureka Creek and the Tangle Complex area east of Fourteen Mile Lake, as well as on those within the deformed metasedimentary, metavolcanic, and intrusive rocks of the Specimen Creek drainage and drainages east of Eureka Glacier. Major, minor, and trace elements were analyzed in aqueous samples for this reconnaissance aqueous geochemistry effort. The lithologic differences within the study area are reflected in the major-ion chemistry of the water. The dominant major cation in streams draining mafic and ultramafic rocks is Mg2+; abundant Mg and low Ca in these streams reflect the abundance of Mg-rich minerals in these intrusions. Nickel and Cu are detected in 84 percent and 87 percent of the filtered samples, respectively. Nickel and Cu concentrations ranged from Ni life criteria; however, Cu concentrations exceed the hardness-based criteria for both chronic and acute exposure at some sites. The entire rare earth element (REE) suite is found in samples from the Specimen Creek sites MH5, MH4, and MH6 and, with the exception of Tb and Tm, at site MH14. These samples were all collected within drainages containing or downstream from Tertiary gabbro, diabase, and metagabbro (Trgb) exposures. Chondrite and source rock fractionation profiles for the aqueous samples were light rare earth element depleted, with negative Ce and Eu anomalies, indicating fractionation of the REE during weathering. Fractionation patterns indicate that the REE are primarily in the dissolved, as opposed to colloidal, phase.

  17. Petrology of the gabbro and sheeted basaltic intrusives at North Cape, New Zealand

    International Nuclear Information System (INIS)

    Hopper, D.J.; Smith, I.E.M.

    1996-01-01

    The North Cape massif consists of a semi-conformable sequence of serpentinite, gabbro, sheeted sill and dike units, and pillow lavas. Although structurally disrupted, they can be interpreted in terms of an idealised ophiolite sequence and represent the most complete sequence in the Northland Ophiolite. Their age is considered to be Late Cretaceous-Paleocene on the basis of microfossils in associated sediments. Early Miocene K-Ar ages from igneous rocks are thought to reflect the time of emplacement as a thrust sheet of oceanic crust and upper mantle. The gabbros are divided into a lower unit characterised by well-developed cumulate layering and an upper unit which is massive; the sheeted sills and dikes are quartz-diorite and microgabbro interleaved with minor pillow lava. Two phases of alteration are observed, a pervasive low-grade greenschist metamorphism attributed to sea-water interaction after formation as oceanic crust, and an overprinting zeolitic alteration which is possibly post-emplacement. Their tholeiitic nature as well as overlapping geochemical compositions suggest that the gabbros and sheeted dikes and sills represent different components of a single magmatic system related by simple fractionation processes. Several lines of evidence suggest that the magmas that formed the North Cape gabbro and sheeted intrusives have subduction-related chemical characteristics. In the gabbro, calcic plagioclase (An 86-92 ) and depleted Zr and Y abundances, and in the sheeted intrusives depleted high field strength element abundances relative to typical MORB, is indicative of a subduction signature. The presence of subduction-related characteristics within the Northland Ophiolite suggests that it may have originated at a back-arc basin rather than a major ocean ridge spreading centre. (author). 64 refs., 12 figs., 7 tabs

  18. Intrusion of Magmatic Bodies Into the Continental Crust: 3-D Numerical Models

    Science.gov (United States)

    Gorczyk, Weronika; Vogt, Katharina

    2018-03-01

    Magma intrusion is a major material transfer process in the Earth's continental crust. Yet the mechanical behavior of the intruding magma and its host are a matter of debate. In this study we present a series of numerical thermomechanical simulations on magma emplacement in 3-D. Our results demonstrate the response of the continental crust to magma intrusion. We observe change in intrusion geometries between dikes, cone sheets, sills, plutons, ponds, funnels, finger-shaped and stock-like intrusions, and injection time. The rheology and temperature of the host are the main controlling factors in the transition between these different modes of intrusion. Viscous deformation in the warm and deep crust favors host rock displacement and plutons at the crust-mantle boundary forming deep-seated plutons or magma ponds in the lower to middle crust. Brittle deformation in the cool and shallow crust induces cone-shaped fractures in the host rock and enables emplacement of finger- or stock-like intrusions at shallow or intermediate depth. Here the passage of magmatic and hydrothermal fluids from the intrusion through the fracture pattern may result in the formation of ore deposits. A combination of viscous and brittle deformation forms funnel-shaped intrusions in the middle crust. Intrusion of low-density magma may more over result in T-shaped intrusions in cross section with magma sheets at the surface.

  19. SEM-MLA-based Investigation of the Composition of Mafic Volcaniclastic Deposits from the Paraná Large Igneous Province, Brazil

    Science.gov (United States)

    Höfig, D. F.; Höfig, T. W.; Licht, O. A. B.; Haser, S.; Valore, L.

    2017-12-01

    Mafic volcaniclastic deposits (MVDs) have been widely reported in Large Igneous Provinces around the world, except for the Paraná Province (review by Ross et al., 2005: J Volcanol Geotherm Res, 145, pp. 281-314). Recent geochemical classification for this unit highlights, however, the occurrence of such deposits, connected to basic lava flows, mostly those High Ti - High P ones (Licht.: J Volcanol Geotherm Res, in press). In southern Brazil, MVDs intercalated with lava flows have been reported at 680 sites, showing conspicuous poorly sorted polymictic breccia at the base, grading to tuff breccias and red silicified tuffs at the top. Newly sampled rocks of Paraná mafic volcanoclastic deposits unravel important information about the composition utilizing Scanning Electron Microscopy-based Mineral Liberation Analysis. Overall, they show similar mineralogy presenting obsidian (25-40%), different phases of iron oxide (5-20%), quartz (10-25%), plagioclase (5-25%), celadonite (5-25%), and chlorite (5-10%). The breccias reveal a greater content of celadonite due to the presence of altered hypohyaline and hypocrystalline basaltic shards, whereas the tuffs are more enriched in glass. Different generations of plagioclase are attributed to various basalt shards and clasts as well vitroclasts found in the matrix. It is proposed that the MVDs were generated by explosive events due the interaction between the ascending mafic magma and deep aquifer systems and its siliciclastic matrix represents the country rock, i.e., the underneath Paleozoic sedimentary sequence of Paraná Basin.

  20. Origin of eclogite and garnet pyroxenite from the Moldanubian Zone of the Bohemian Massif, Czech Republic and its implication to other mafic layers embedded in orogenic peridotites

    Czech Academy of Sciences Publication Activity Database

    Obata, M.; Hirajima, T.; Svojtka, Martin

    2006-01-01

    Roč. 88, 1-2 (2006), s. 321-340 ISSN 0930-0708 R&D Projects: GA AV ČR IAA3013006 Institutional research plan: CEZ:AV0Z30130516 Keywords : eclogite * pyroxenite * Bohemian Massif Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.038, year: 2006

  1. Animal intrusion status report for fiscal year 1990

    International Nuclear Information System (INIS)

    Landeen, D.S.

    1991-03-01

    The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion work conducted by Westinghouse Hanford Company in fiscal year 1990 regarding small mammals and water infiltration. An animal intrusion lysimeter facility was constructed and installed in fiscal year 1988. The facility consists of two outer boxes buried at grade that serve as receptacles for six animal intrusion lysimeters. Small burrowing mammals common to the Hanford Site environs are introduced over a 3- to 4-month period. Supplemental precipitation is added to three of the lysimeters with a rainulator at a rate equivalent to a 100-year storm. Soil moisture samples are taken before and after each test, and soil moisture measurements are also taken with a hydroprobe during the test period. During fiscal year 1990, tests three and four were completed and test five was initiated. Results of test three (summer treatment), which used Townsend ground squirrels and pocket gophers, indicated that the additional 1.5 inches of precipitation that was added with the rainulator was lost during this test. The plots that did not receive any additional precipitation all lost water (5 to 6 percent). Results from test four (winter treatment), which used pocket gophers and pocket mice, indicated that all of the lysimeters except one gained water. The two control lysimeters (rainulator plots and nonrainulator lysimeters with no animals) gained more water than their corresponding animal burrow lysimeters. 4 refs., 9 figs., 3 tabs

  2. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  3. A Proposal for Non-Intrusive Namespaces in OCaml

    OpenAIRE

    Couderc , Pierrick; Canou , Benjamin; Chambart , Pierre; Le Fessant , Fabrice

    2014-01-01

    International audience; We present a work-in-progress about adding namespaces to OCaml. Inspired by other lan-guages such as Scala or C++, our aim is to de-sign and formalize a simple and non-intrusive namespace mechanism without complexifying the core language. Namespaces in our ap-proach are a simple way to define libraries while avoiding name clashes. They are also meant to simplify the build process, clarify-ing and reducing (to zero whenever possible) the responsibility of external tools.

  4. The role of extrusions and intrusions in fatigue crack initiation

    Czech Academy of Sciences Publication Activity Database

    Polák, Jaroslav; Mazánová, Veronika; Heczko, Milan; Petráš, Roman; Kuběna, Ivo; Casalena, L.; Man, Jiří

    2017-01-01

    Roč. 185, NOV (2017), s. 46-60 ISSN 0013-7944 R&D Projects: GA MŠk(CZ) LQ1601; GA MŠk LM2015069; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : Extrusion * Fatigue crack initiation * Intrusion * Persistent slip marking * Stainless steel Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.151, year: 2016

  5. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  6. Neuroscientific Prediction and the Intrusion of Intuitive Metaphysics.

    Science.gov (United States)

    Rose, David; Buckwalter, Wesley; Nichols, Shaun

    2017-03-01

    How might advanced neuroscience-in which perfect neuro-predictions are possible-interact with ordinary judgments of free will? We propose that peoples' intuitive ideas about indeterminist free will are both imported into and intrude into their representation of neuroscientific scenarios and present six experiments demonstrating intrusion and importing effects in the context of scenarios depicting perfect neuro-prediction. In light of our findings, we suggest that the intuitive commitment to indeterminist free will may be resilient in the face of scientific evidence against such free will. Copyright © 2015 Cognitive Science Society, Inc.

  7. Non-intrusive load characterization of an airfoil using PIV

    Energy Technology Data Exchange (ETDEWEB)

    Oudheusden, B.W. van; Scarano, F.; Casimiri, E.W.F. [Dept. of Aerospace Engineering, Delft Univ. of Tech., Delft (Netherlands)

    2006-06-15

    An assessment is made of the feasibility of using PIV velocity data for the non-intrusive aerodynamic force characterization (lift, drag and pitching moment) of an airfoil. The method relies upon the application of control-volume approaches in combination with the deduction of the pressure from the PIV experimental data, by making use of the momentum equation. First, the consistency of the method is verified by means of synthetic data obtained from CFD. Subsequently, the procedure was applied in an experimental investigation, in which the PIV approach is validated against standard pressure-based methods (surface pressure distribution and wake rake). (orig.)

  8. Environnements de tests d’intrusion pour mobiles et tablettes

    OpenAIRE

    Vianin, Jérémie; Bocchi, Yann

    2017-01-01

    L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet. Dans ce travail, nous analysons les possibilités de pentesting mobile avec l’aide d’une tablette de la marque Nexus et un smartphone de la gamme One d’HTC. Nous voyons le pentest mobile sous trois grands angles : OS, package et application.

  9. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  10. The Magma Chamber Simulator: Modeling the Impact of Wall Rock Composition on Mafic Magmas during Assimilation-Fractional Crystallization

    Science.gov (United States)

    Creamer, J. B.; Spera, F. J.; Bohrson, W. A.; Ghiorso, M. S.

    2012-12-01

    Although stoichiometric titration is often used to model the process of concurrent Assimilation and Fractional Crystallization (AFC) within a compositionally evolving magma body, a more complete treatment of the problem involves simultaneous and self-consistent determination of stable phase relationships and separately evolving temperatures of both Magma (M) and Wall Rock (WR) that interact as a composite M-WR system. Here we present results of M-WR systems undergoing AFC forward modeled with the Magma Chamber Simulator (MCS), which uses the phase modeling capabilities of MELTS (Ghiorso & Sack 1995) as the thermodynamic basis. Simulations begin with one of a variety of mafic magmas (e.g. HAB, MORB, AOB) intruding a set mass of Wall Rock (e.g. lherzolite, gabbro, diorite, granite, metapelite), and heat is exchanged as the M-WR system proceeds towards thermal equilibrium. Depending on initial conditions, the early part of the evolution can involve closed system FC while the WR heats up. The WR behaves as a closed system until it is heated beyond the solidus to critical limit for melt fraction extraction (fc), ranging between 0.08 and 0.12 depending on WR characteristics including composition and, rheology and stress field. Once fc is exceeded, a portion of the anatectic liquid is assimilated into the Magma. The MCS simultaneously calculates mass and composition of the mineral assemblage (Magma cumulates and WR residue) and melt (anatectic and Magma) at each T along the equilibration trajectory. Sensible and latent heat lost or gained plus mass gained by the Magma are accounted for by the MCS via governing Energy Constrained- Recharge Assimilation Fractional Crystallization (EC-RAFC) equations. In a comparison of two representative MCS results, consider a granitic WR intruded by HAB melt (51 wt. % SiO2) at liquidus T in shallow crust (0.1 GPa) with a WR/M ratio of 1.25, fc of 0.1 and a QFM oxygen buffer. In the first example, the WR begins at a temperature of 100o

  11. The assessment of human intrusion into underground repositories for radioactive waste Volume 1: Main report

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Asthon, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  12. Review on assessment methodology for human intrusion into a repository for radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-09-15

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

  13. Review on assessment methodology for human intrusion into a repository for radioactive waste

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility

  14. The assessment of human intrusion into underground repositories for radioactive waste Volume 2: Appendices

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Little, R.H.; Ashton, J.; Staunton, G.M.

    1990-01-01

    This report has been prepared with the primary objective of establishing a methodology for the assessment of human intrusion into deep underground repositories for radioactive wastes. The disposal concepts considered are those studied in the performance assessment studies Pagis and Pacoma, coordinated by the CEC. These comprise four types of host rock, namely: clay, granite, salt and the sub-seabed. Following a review of previous assessments of human intrusion, a list of relevant human activities is derived. This forms the basis for detailed characterization of groundwater abstraction and of exploitation of mineral and other resources. Approaches to assessment of intrusion are reviewed and consideration is given to the estimation of probabilities for specific types of intrusion events. Calculational schemes are derived for specific intrusion events and dosimetric factors are presented. A review is also presented of the capacity for reduction of the risks associated with intrusions. Finally, conclusions from the study are presented

  15. Reconstruction of multiple P-T-t stages from retrogressed mafic rocks: Subduction versus collision in the Southern Brasília orogen (SE Brazil)

    Science.gov (United States)

    Tedeschi, Mahyra; Lanari, Pierre; Rubatto, Daniela; Pedrosa-Soares, Antônio; Hermann, Jörg; Dussin, Ivo; Pinheiro, Marco Aurélio P.; Bouvier, Anne-Sophie; Baumgartner, Lukas

    2017-12-01

    The identification of markers of subduction zones in orogenic belts requires the estimation of paleo-geothermal gradients through pressure-temperature-time (P-T-t) estimates in mafic rocks that potentially derive from former oceanic units once. However, such markers are rare in supracrustal sequences specially in deeply eroded and weathered Precambrian orogens, and reconstructing their metamorphic history is challenging because they are commonly retrogressed and only preserve a few mineral relicts of high-pressure metamorphism. Metamorphosed mafic rocks from Pouso Alegre region of the Neoproterozoic Southern Brasília Orogen outcrop as rare lenses within continental gneisses. They have previously been classified as retrograde eclogites, based on the presence of garnet and the characteristic symplectitic texture replacing omphacite. These rocks were interpreted to mark the suture zone between the Paranapanema and São Francisco cratons. To test the possible record of eclogitic conditions in the Pouso Alegre mafic rocks, samples including the surrounding felsic rocks have been investigated using quantitative compositional mapping, forward thermodynamic modeling and in-situ dating of accessory minerals to refine their P-T-t history. In the metamorphosed mafic rocks, the peak pressure assemblage of garnet and omphacite (Jd20, reconstructed composition) formed at 690 ± 35 °C and 13.5 ± 3.0 kbar, whereas local retrogression into symplectite or corona occurred at 595 ± 25 °C and 4.8 ± 1.5 kbar. The two reactions were coupled and thus took place at the same time. A zircon U-Pb age of 603 ± 7 Ma was obtained for metamorphic rims and linked to the retrogression stage. Monazite and metamorphic zircon U-Th-Pb ages for the surrounding rocks are at ca. 630 Ma and linked to peak pressure conditions similar to the one recorded by the mafic rocks. The low maximal pressure of 14 kbar and the high geothermal gradient do not necessarily support subduction process

  16. Peridotites and mafic igneous rocks at the foot of the Galicia Margin: an oceanic or continental lithosphere? A discussion

    Energy Technology Data Exchange (ETDEWEB)

    Korprobst, J.; Chazot, G.

    2016-10-01

    An ultramafic/mafic complex is exposed on the sea floor at the foot of the Galicia Margin (Spain and Portugal). It comprises various types of peridotites and pyroxenites, as well as amphibole-diorites, gabbros, dolerites and basalts. For chronological and structural reasons (gabbros were emplaced within peridotites before the continental break-up) this unit cannot be assigned to the Atlantic oceanic crust. The compilation of all available petrological and geochemical data suggests that peridotites are derived from the sub-continental lithospheric mantle, deeply transformed during Cretaceous rifting. Thus, websterite dykes extracted from the depleted MORB mantle reservoir (DMM), were emplaced early within the lithospheric harzburgites; subsequent boudinage and tectonic dispersion of these dykes in the peridotites, during deformation stages at the beginning of rifting, resulted in the formation of fertile but isotopically depleted lherzolites. Sterile but isotopically enriched websterites, would represent melting residues in the peridotites, after significant partial melting and melt extraction related to the thermal erosion of the lithosphere. The latter melts are probably the source of brown amphibole metasomatic crystallization in some peridotites, as well as of the emplacement of amphibole-diorite dykes. Melts directly extracted from the asthenosphere were emplaced as gabbro within the sub-continental mantle. Mixing these DMM melts together with the enriched melts extracted from the lithosphere, provided the intermediate isotopic melt-compositions - in between the DMM and Oceanic Islands Basalts reservoir - observed for the dolerites and basalts, none of which are characterized by a genuine N-MORB signature. An enriched lithospheric mantle, present prior to rifting of the Galicia margin, is in good agreement with data from the Messejana dyke (Portugal) and more generally, with those of all continental tholeiites of the Central Atlantic Magmatic Province (CAMP

  17. Expansion tunnel characterization and development of non-intrusive microwave plasma diagnostics

    Science.gov (United States)

    Dufrene, Aaron T.

    The focus of this research is the development of non-intrusive microwave diagnostics for characterization of expansion tunnels. The main objectives of this research are to accurately characterize the LENS XX expansion tunnel facility, develop non-intrusive RF diagnostics that will work in short-duration expansion tunnel testing, and to determine plasma properties and other information that might otherwise be unknown, less accurate, intrusive, or more difficult to determine through conventional methods. Testing was completed in LENS XX, a new large-scale expansion tunnel facility at CUBRC, Inc. This facility is the largest known expansion tunnel in the world with an inner diameter of 24 inches, a 96 inch test section, and an end-to-end length of more than 240 ft. Expansion tunnels are currently the only facilities capable of generating high-enthalpy test conditions with minimal or no freestream dissociation or ionization. However, short test times and freestream noise at some conditions have limited development of these facilities. To characterize the LENS XX facility, the first step is to evaluate the facility pressure, vacuum, temperature, and other mechanical restrictions to derive a theoretical testing parameter space. Test condition maps are presented for a variety of parameters and gases based on 1D perfect gas dynamics. Test conditions well beyond 10 km/s or 50 MJ/kg are identified with minimum test times of 200 us. Additionally, a four-chamber expansion tube configuration is considered for extending the stagnation enthalpy range of the facility even further. A microwave shock speed diagnostic measures primary and secondary shock speeds accurately every 30 in. down the entire length of the facility resulting in a more accurate determination of freestream conditions required for computational comparisons. The high resolution of this measurement is used to assess shock speed attenuation as well as secondary diaphragm performance. Negligible shock attenuation is

  18. Non-Intrusive Intelligibility Prediction Using a Codebook-Based Approach

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Kavalekalam, Mathew Shaji; Xenaki, Angeliki

    2017-01-01

    It could be beneficial for users of hearing aids if these were able to automatically adjust the processing according to the speech intelligibility in the specific acoustic environment. Most speech intelligibility metrics are intrusive, i.e., they require a clean reference signal, which is rarely...... a high correlation between the proposed non-intrusive codebookbased STOI (NIC-STOI) and the intrusive STOI indicating that NIC-STOI is a suitable metric for automatic classification of speech signals...

  19. Petrogenesis and metallogenesis of the Wajilitag and Puchang Fe-Ti oxide-rich intrusive complexes, northwestern Tarim Large Igneous Province

    Science.gov (United States)

    Zhang, Dongyang; Zhang, Zhaochong; Huang, He; Cheng, Zhiguo; Charlier, Bernard

    2018-04-01

    The Wajilitag and Puchang intrusive complexes of the Tarim large igneous province (TLIP) are associated with significant resources of Fe-Ti oxide ores. These two mafic-ultramafic intrusions show differences in lithology and mineral chemistry. Clinopyroxenite and melagabbro are the dominant rock types in the Wajilitag complex, whereas the Puchang complex is generally gabbroic and anorthositic in composition with minor plagioclase-bearing clinopyroxenites in the marginal zone. Disseminated Fe-Ti oxide ores are found in the Wajilitag complex and closely associated with clinopyroxenites, whereas the Puchang complex hosts massive to disseminated Fe-Ti oxide ores mainly within its gabbroic rocks. The Wajilitag intrusive rocks are characterized by a restricted range of initial 87Sr/86Sr ratios (0.7038-0.7048) and positive εNd(t) (+0.04 - +3.01), indicating insignificant involvement of continental crustal contamination. The slightly higher initial 87Sr/86Sr ratios (0.7039-0.7059) and lower εNd(t) values (-1.05 - +2.35) of the Puchang intrusive rocks also suggest that the isotopic characteristics was controlled primarily by their mantle source, rather than by crustal contamination. Both complexes have Sr-Nd isotopic compositions close the neighboring kimberlitic rocks and their hosted mantle xenoliths in the TLIP. This indicates that the ferrobasaltic parental magmas were most probably originated from partial melting of a metasomatized subcontinental lithospheric mantle, modified recently with subduction-related materials by the impingement of the ascending mantle plume. The recycled subduction-related materials preserved in the lithospheric mantle could play a key role in the formation of the parental Fe-rich magmas in the context of an overall LIP system. The distinct variations in mineral assemblage for each complex and modeled results indicated that the Wajilitag and Puchang complexes experienced different crystallization path. Fe-Ti oxides in Wajilitag joined the

  20. Study of the magmatism related to the rifting of the central and southern Atlantic: 40Ar/39Ar geochronology and geochemistry of Jurassic intrusives of Guinea and French Guyana/Surinam, and Cretaceous intrusives of Brazil

    International Nuclear Information System (INIS)

    Deckart, K.

    1996-01-01

    The initial stage of continental rifting in the Central and South Atlantic has been accompanied by tholeiitic magmatism, which is mainly represented by sills, dykes, layered intrusions and lava flows. During the rifting progression, the syn-rift stage in the South Atlantic has been accompanied by abundant alkaline magmatism. A geochronological and geochemical study has been performed on these formations with the aim to contribute to the understanding of the early continental rifting processes and their evolution. 40 Ar/ 39 Ar analyses have been done on tholeiitic intrusives of Guinea and French Guyana/Surinam, tholeiitic dykes, associated with the Parana volcanism (Brazil), and alkaline dykes in the region of Rio de Janeiro (Brazil). The geochemical and isotopic study has been focused on the tholeiitic intrusions from Guinea and French Guyana/Surinam. These three arms may represent the three branches of a triple junction which was active between 134 to 129 Ma, and which was at the origin of at least the northern Parana traps. Even if the principal magmatic activity can be related to the thermal anomaly due to the Tristan da Cunha hotspot, which favours an active rifting, the tectonic system of the triple junction is not compatible in time and space with this hotspot and therefore with this geodynamic model. It is possible that the Parana traps (133-130 Ma) are only partly contemporaneous and therefore, they might be not related to the same mode of geodynamic initiation. Biotites from the alkaline magmatics of the dyke swarm (NE-SW) near Rio de Janeiro display plateau ages between 82 and 70 Ma; this intense alkaline magmatism was related to vertical movements characterising the syn-rift stage not only in SE-Brazil but also in equatorial Africa. (author)

  1. U-Pb geochronology documents out-of-sequence emplacement of ultramafic layers in the Bushveld Igneous Complex of South Africa.

    Science.gov (United States)

    Mungall, James E; Kamo, Sandra L; McQuade, Stewart

    2016-11-14

    Layered intrusions represent part of the plumbing systems that deliver vast quantities of magma through the Earth's crust during the formation of large igneous provinces, which disrupt global ecosystems and host most of the Earth's endowment of Pt, Ni and Cr deposits. The Rustenburg Layered Suite of the enormous Bushveld Igneous Complex of South Africa has been presumed to have formed by deposition of crystals at the floor of a subterranean sea of magma several km deep and hundreds of km wide called a magma chamber. Here we show, using U-Pb isotopic dating of zircon and baddeleyite, that individual chromitite layers of the Rustenburg Layered Suite formed within a stack of discrete sheet-like intrusions emplaced and solidified as separate bodies beneath older layers. Our U-Pb ages and modelling necessitate reassessment of the genesis of layered intrusions and their ore deposits, and challenge even the venerable concept of the magma chamber itself.

  2. Cultural differences in the relationship between intrusions and trauma narratives using the trauma film paradigm.

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults' autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions.

  3. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  4. Cultural Differences in the Relationship between Intrusions and Trauma Narratives Using the Trauma Film Paradigm

    Science.gov (United States)

    Jobson, Laura; Dalgleish, Tim

    2014-01-01

    Two studies explored the influence of culture on the relationship between British and East Asian adults’ autobiographical remembering of trauma film material and associated intrusions. Participants were shown aversive film clips to elicit intrusive images. Then participants provided a post-film narrative of the film content (only Study 1). In both studies, participants reported intrusive images for the film in an intrusion diary during the week after viewing. On returning the diary, participants provided a narrative of the film (delayed). The trauma film narratives were scored for memory-content variables. It was found that for British participants, higher levels of autonomous orientation (i.e. expressions of autonomy and self-determination) and self-focus in the delayed narratives were correlated significantly with fewer intrusions. For the East Asian group, lower levels of autonomous orientation and greater focus on others were correlated significantly with fewer intrusions. Additionally, Study 2 found that by removing the post-film narrative task there was a significant increase in the number of intrusions relative to Study 1, suggesting that the opportunity to develop a narrative resulted in fewer intrusions. These findings suggest that the greater the integration and contextualization of the trauma memory, and the more the trauma memory reflects culturally appropriate remembering, the fewer the intrusions. PMID:25203300

  5. Biological intrusion barriers for large-volume waste-disposal sites

    International Nuclear Information System (INIS)

    Hakonson, T.E.; Cline, J.F.; Rickard, W.H.

    1982-01-01

    intrusion of plants and animals into shallow land burial sites with subsequent mobilization of toxic and radiotoxic materials has occured. Based on recent pathway modeling studies, such intrusions can contribute to the dose received by man. This paper describes past work on developing biological intrusion barrier systems for application to large volume waste site stabilization. State-of-the-art concepts employing rock and chemical barriers are discussed relative to long term serviceability and cost of application. The interaction of bio-intrusion barrier systems with other processes affecting trench cover stability are discussed to ensure that trench cover designs minimize the potential dose to man. 3 figures, 6 tables

  6. Lunar floor-fractured craters: Modes of dike and sill emplacement and implications of gas production and intrusion cooling on surface morphology and structure

    Science.gov (United States)

    Wilson, Lionel; Head, James W.

    2018-05-01

    within ∼300 m of the surface, and thus eruptions, rather than intrusions, would be very likely to occur; instead, dynamical considerations strongly favor the sub-crustal breccia lens as the location of the physical property contrast localizing lateral intrusion, at a depth of several kilometers. The end of lateral and vertical sill growth occurs when the internal magma pressure equals the external pressure (the intrusion just supports the weight of the overlying crust). Dynamical considerations lead to the conclusion that dike magma volumes are up to ∼1100 km3, and are generally insufficient to form FFCs on the lunar farside; the estimated magma volumes available for injection into sills on the lunar nearside (up to ∼800 km3) are comparable to the observed floor uplift in many smaller FFCs, and thus consistent with these FFCs forming from a single dike emplacement event. In contrast, the thickest intrusions in the largest craters imply volumes requiring multiple dike contributions; these are likely to be events well-separated in time, rather than injection of new magma into a recently-formed and still-cooling intrusion. We present a temporal sequence of 1) dike emplacement, 2) sill formation and surface deformation, 3) bubble rise, foam layer formation and collapse, 4) intrusion cooling, and a synthesis of predicted deformation sequence and eruption styles. Initial lateral injection of the sill at a depth well below the upper dike tip initiates upbowing of the overburden, leveraging deformation of the crater floor melt sheet above. This is followed by lateral spreading of the sill toward the edges of the crater floor, where crater wall and rim deposit overburden inhibit further lateral growth, and the sill grows vertically into a laccolith or bysmalith, uplifting the entire floor above the intrusion. Subsidiary dikes can be emplaced in the fractures at the uplift margins and will rise to the isostatic level of the initial dike tip; if these contain sufficient

  7. The role of human intrusion in the dutch safety study

    International Nuclear Information System (INIS)

    Prij, J.; Weers, A.W.v.; Glasbergen, P.; Slot, A.F.M.

    1989-01-01

    In the Netherlands the OPLA research program in which a large number of possible disposal concepts for radioactive waste is investigated has been carried out recently. The disposal concepts concern three different waste strategies, two disposal techiques and three different types of salt formations. In the OPLA program the post-closure safety of the disposal concepts has been investigated. The paper reviews the role of the human intrusion in this safety study. The hydrological consequences of human activities in the underground are discussed and it has been demonstrated that these effects could be taken into account during the groundwater transport calculations. Four different scenario's for human intrusion in the repository have been studied to obtain an indication of the radiological effects. The results show that extremely high doses may result if, after several hundred years, human beings come into direct contact with highly active waste. For the final assessment the probability that the doses will be received should be calculated. This should be done in a subsequent research

  8. assessment of Seawater Intrusion in Concrete by Measuring Chlorine Concentration

    International Nuclear Information System (INIS)

    Abdel-Monem, A.M.; Kansouh, W.A.; Osman, A.M.; Bashter, I.I.

    2011-01-01

    The object of this work is to measure water intrusion in concrete using a new methodology based on neutron activation technique. The applied method depends on measuring the activated gamma energy lines emitted from 38 Cl using a gamma spectrometer with Ge(Li) and HPGe detectors. Concrete samples with different percentages of silica fume (SF), up to 20 % submerged in seawater for different period of time were used to perform the investigation. Samples of concrete taken from different positions along the direction of water intrusion in concrete block were irradiated by thermal neutrons using the irradiation cell of 252 Cf neutron source and one of the vertical channels of search reactor at Delft University. The measured 38 Cl concentrations of the irradiated samples were used to plot groups of water profiles distribution in concrete samples with different SF % and submerged in seawater for different periods. These profiles were compared with the others which use here measured by neutron back emitted method where a satisfactory agreement was observed between the two. Further, the displayed measured results; show that the diffusivity for all water contents decreases with increasing the silica fume percentage up to 15 %. However, for concrete samples with silica fume 20 % the observed phenomenon is reversed due to the deterioration of concrete physical and mechanical properties

  9. Effective approach toward Intrusion Detection System using data mining techniques

    Directory of Open Access Journals (Sweden)

    G.V. Nadiammai

    2014-03-01

    Full Text Available With the tremendous growth of the usage of computers over network and development in application running on various platform captures the attention toward network security. This paradigm exploits security vulnerabilities on all computer systems that are technically difficult and expensive to solve. Hence intrusion is used as a key to compromise the integrity, availability and confidentiality of a computer resource. The Intrusion Detection System (IDS plays a vital role in detecting anomalies and attacks in the network. In this work, data mining concept is integrated with an IDS to identify the relevant, hidden data of interest for the user effectively and with less execution time. Four issues such as Classification of Data, High Level of Human Interaction, Lack of Labeled Data, and Effectiveness of Distributed Denial of Service Attack are being solved using the proposed algorithms like EDADT algorithm, Hybrid IDS model, Semi-Supervised Approach and Varying HOPERAA Algorithm respectively. Our proposed algorithm has been tested using KDD Cup dataset. All the proposed algorithm shows better accuracy and reduced false alarm rate when compared with existing algorithms.

  10. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D. L.; Michlich, B. J.

    2000-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute nuclear technology and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested

  11. Nuclear data needs for non-intrusive inspection

    International Nuclear Information System (INIS)

    Smith, D.L.; Micklich, B.J.

    2001-01-01

    Various nuclear-based techniques are being explored for use in non-intrusive inspection. Their development is motivated by the need to prevent the proliferation of nuclear weapons, to thwart trafficking in illicit narcotics, to stop the transport of explosives by terrorist organizations, to characterize nuclear waste, and to deal with various other societal concerns. Non-intrusive methods are sought in order to optimize inspection speed, to minimize damage to packages and containers, to satisfy environmental, health and safety requirements, to adhere to legal requirements, and to avoid inconveniencing the innocent. These inspection techniques can be grouped into two major categories: active and passive. They almost always require the use of highly penetrating radiation and therefore are generally limited to neutrons and gamma rays. Although x-rays are widely employed for these purposes, their use does not constitute 'nuclear technology' and therefore is not discussed here. This paper examines briefly the basic concepts associated with nuclear inspection and investigates the related nuclear data needs. These needs are illustrated by considering four of the methods currently being developed and tested. (author)

  12. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  13. Ameliorating intrusive memories of distressing experiences using computerized reappraisal training.

    Science.gov (United States)

    Woud, Marcella L; Holmes, Emily A; Postma, Peggy; Dalgleish, Tim; Mackintosh, Bundy

    2012-08-01

    The types of appraisals that follow traumatic experiences have been linked to the emergence of posttraumatic stress disorder (PTSD). Could changing reappraisals following a stressful event reduce the emergence of PTSD symptoms? The present proof-of-principle study examined whether a nonexplicit, systematic computerized training in reappraisal style following a stressful event (a highly distressing film) could reduce intrusive memories of the film, and symptoms associated with posttraumatic distress over the subsequent week. Participants were trained to adopt a generally positive or negative poststressor appraisal style using a series of scripted vignettes after having been exposed to highly distressing film clips. The training targeted self-efficacy beliefs and reappraisals of secondary emotions (emotions in response to the emotional reactions elicited by the film). Successful appraisal induction was verified using novel vignettes and via change scores on the post traumatic cognitions inventory. Compared with those trained negatively, those trained positively reported in a diary fewer intrusive memories of the film during the subsequent week, and lower scores on the Impact of Event Scale (a widely used measure of posttraumatic stress symptoms). Results support the use of computerized, nonexplicit, reappraisal training after a stressful event has occurred and provide a platform for future translational studies with clinical populations that have experienced significant real-world stress or trauma.

  14. Doses resulting from intrusion into uranium tailings areas

    International Nuclear Information System (INIS)

    Walsh, M.L.

    1986-02-01

    In the future, it is conceivable that institutional controls of uranium tailings areas may cease to exist and individuals may intrude into these areas unaware of the potential radiation hazards. The objective of this study was to estimate the potential doses to the intruders for a comprehensive set of intrusion scenarios. Reference tailings areas in the Elliot Lake region of northern Ontario and in northern Saskatchewan were developed to the extent required to calculate radiation exposures. The intrusion scenarios for which dose calculations were performed, were categorized into the following classes: habitation of the tailings, agricultural activities, construction activities, and recreational activities. Realistic exposure conditions were specified and annual doses were calculated by applying standard dose conversion factors. The exposure estimates demonstrated that the annual doses resulting from recreational activities and from construction activities would be generally small, less than twenty millisieverts, while the habitational and agricultural activities could hypothetically result in doses of several hundred millisieverts. However, the probability of occurrence of these latter classes of scenarios is considered to be much lower than scenarios involving either construction or recreational activities

  15. Marshes on the Move: Testing effects of seawater intrusion on ...

    Science.gov (United States)

    The Northeastern United States is a hotspot for sea level rise (SLR), subjecting coastal salt marshes to erosive loss, shifts in vegetation communities, and altered biogeochemistry due to seawater intrusion. Salt marsh plant community zonation is driven by tradeoffs in stress tolerance and interspecific interactions. As seawater inundates progressively higher marsh elevations, shifts in marsh vegetation communities landward may herald salt marsh “migration”, which could allow continuity of marsh function and ecosystem service provision. To elucidate possible effects of seawater intrusion on marsh-upland edge plant communities, a space-for-time approach was replicated at two Rhode Island salt marshes. At each site, peat blocks (0.5 m x 0.5 m x 0.5 m, n=6) with intact upland-marsh edge vegetation were transplanted downslope into the regularly-inundated mid-marsh. Procedural controls (n=3) were established at each elevation by removing and replacing peat blocks, and natural controls (n=3) consisted of undisturbed plots. During peak productivity, each plot was assessed for species composition, percent cover and average height. Results demonstrate stunting of marsh-upland edge vegetation in response to increased inundation, and the beginnings of colonization of the transplanted plots by salt marsh species. The extent of colonization differed between the two sites, suggesting that site-specific factors govern vegetation responses to increased inundation.

  16. Sediment Resuspension and Deposition on Seagrass Leaves Impedes Internal Plant Aeration and Promotes Phytotoxic H2S Intrusion.

    Science.gov (United States)

    Brodersen, Kasper E; Hammer, Kathrine J; Schrameyer, Verena; Floytrup, Anja; Rasheed, Michael A; Ralph, Peter J; Kühl, Michael; Pedersen, Ole

    2017-01-01

    HIGHLIGHTS: Sedimentation of fine sediment particles onto seagrass leaves severely hampers the plants' performance in both light and darkness, due to inadequate internal plant aeration and intrusion of phytotoxic H 2 S. Anthropogenic activities leading to sediment re-suspension can have adverse effects on adjacent seagrass meadows, owing to reduced light availability and the settling of suspended particles onto seagrass leaves potentially impeding gas exchange with the surrounding water. We used microsensors to determine O 2 fluxes and diffusive boundary layer (DBL) thickness on leaves of the seagrass Zostera muelleri with and without fine sediment particles, and combined these laboratory measurements with in situ microsensor measurements of tissue O 2 and H 2 S concentrations. Net photosynthesis rates in leaves with fine sediment particles were down to ~20% of controls without particles, and the compensation photon irradiance increased from a span of 20-53 to 109-145 μmol photons m -2 s -1 . An ~2.5-fold thicker DBL around leaves with fine sediment particles impeded O 2 influx into the leaves during darkness. In situ leaf meristematic O 2 concentrations of plants exposed to fine sediment particles were lower than in control plants and exhibited long time periods of complete meristematic anoxia during night-time. Insufficient internal aeration resulted in H 2 S intrusion into the leaf meristematic tissues when exposed to sediment resuspension even at relatively high night-time water-column O 2 concentrations. Fine sediment particles that settle on seagrass leaves thus negatively affect internal tissue aeration and thereby the plants' resilience against H 2 S intrusion.

  17. Sediment Resuspension and Deposition on Seagrass Leaves Impedes Internal Plant Aeration and Promotes Phytotoxic H2S Intrusion

    Directory of Open Access Journals (Sweden)

    Kasper E. Brodersen

    2017-05-01

    Full Text Available HIGHLIGHTS:Sedimentation of fine sediment particles onto seagrass leaves severely hampers the plants' performance in both light and darkness, due to inadequate internal plant aeration and intrusion of phytotoxic H2S.Anthropogenic activities leading to sediment re-suspension can have adverse effects on adjacent seagrass meadows, owing to reduced light availability and the settling of suspended particles onto seagrass leaves potentially impeding gas exchange with the surrounding water. We used microsensors to determine O2 fluxes and diffusive boundary layer (DBL thickness on leaves of the seagrass Zostera muelleri with and without fine sediment particles, and combined these laboratory measurements with in situ microsensor measurements of tissue O2 and H2S concentrations. Net photosynthesis rates in leaves with fine sediment particles were down to ~20% of controls without particles, and the compensation photon irradiance increased from a span of 20–53 to 109–145 μmol photons m−2 s−1. An ~2.5-fold thicker DBL around leaves with fine sediment particles impeded O2 influx into the leaves during darkness. In situ leaf meristematic O2 concentrations of plants exposed to fine sediment particles were lower than in control plants and exhibited long time periods of complete meristematic anoxia during night-time. Insufficient internal aeration resulted in H2S intrusion into the leaf meristematic tissues when exposed to sediment resuspension even at relatively high night-time water-column O2 concentrations. Fine sediment particles that settle on seagrass leaves thus negatively affect internal tissue aeration and thereby the plants' resilience against H2S intrusion.

  18. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  19. Saharan dust intrusions in Spain: Health impacts and associated synoptic conditions.

    Science.gov (United States)

    Díaz, Julio; Linares, Cristina; Carmona, Rocío; Russo, Ana; Ortiz, Cristina; Salvador, Pedro; Trigo, Ricardo Machado

    2017-07-01

    A lot of papers have been published about the impact on mortality of Sahara dust intrusions in individual cities. However, there is a lack of studies that analyse the impact on a country and scarcer if in addition the analysis takes into account the meteorological conditions that favour these intrusions. The main aim is to examine the effect of Saharan dust intrusions on daily mortality in different Spanish regions and to characterize the large-scale atmospheric circulation anomalies associated with such dust intrusions. For determination of days with Saharan dust intrusions, we used information supplied by the Ministry of Agriculture, Food & Environment, it divides Spain into 9 main areas. In each of these regions, a representative province was selected. A time series analysis has been performed to analyse the relationship between daily mortality and PM 10 levels in the period from 01.01.04 to 31.12.09, using Poisson regression and stratifying the analysis by the presence or absence of Saharan dust advections. The proportion of days on which there are Saharan dust intrusions rises to 30% of days. The synoptic pattern is characterised by an anticyclonic ridge extending from northern Africa to the Iberian Peninsula. Particulate matter (PM) on days with intrusions are associated with daily mortality, something that does not occur on days without intrusions, indicating that Saharan dust may be a risk factor for daily mortality. In other cases, what Saharan dust intrusions do is to change the PM-related mortality behaviour pattern, going from PM 2.5 . A study such as the one conducted here, in which meteorological analysis of synoptic situations which favour Saharan dust intrusions, is combined with the effect on health at a city level, would seem to be crucial when it comes to analysing the differentiated mortality pattern in situations of Saharan dust intrusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Study of Ground water Groundwater Potentiality and Sea Water Intrusion Along along the Coastal Plain, Wadi Thuwal, KSA- A Case Study Based on DC Resistivity

    Directory of Open Access Journals (Sweden)

    Mansour A. Al-Garni

    2010-12-01

    Full Text Available The present study mainly aims to outline zones that have groundwater potentiality with good quality and those which are affected by sea water intrusion. The electrical resistivity data were acquired over an area of about 170 km2 of a coastal plain, Wadi Thuwal, which is bounded by the Red Sea in the west and the volcanic hills in the east.  In such an area, resistivity measurements, using n-layering model, reveal generally reveal a wide range of resistivity values which do not reflect the reality. Hence, the statistical analysis has to be involved to overcome this problem and to make the final interpretation reliable.  In our case, the n-layer models were modified to another statistical geoelectric models (SLM, consisting of  a number of layers equivalent to the stratigraphic layering beneath each VES site. The modified models were used to outline the depth to the bed rock, groundwater accumulation zones and  water table as well as to define the effect of sea water intrusion through the study area. Check alignment above

  1. Petrogenesis and tectonic implications of gabbro and plagiogranite intrusions in mantle peridotites of the Myitkyina ophiolite, Myanmar

    Science.gov (United States)

    Xu, Yang; Liu, Chuan-Zhou; Chen, Yi; Guo, Shun; Wang, Jian-Gang; Sein, Kyaing

    2017-07-01

    Centimeter-size intrusions of gabbros and plagiogranites occur in mantle peridotites of the Myitkyina ophiolite, Myanmar. The gabbros mainly consist of plagioclase and clinopyroxene, whereas orthopyroxene occasionally occurs. The plagiogranites are mainly composed of plagioclase, quartz and amphibole, with small amount of accessory minerals, such as zircon, apatite and rutile. Plagioclase in the gabbros varies from andesine to anorthite (An37-91), whereas plagioclase in the plagiogranites is less calcic (An1-40). Clinopyroxene in the gabbros is pervasively altered to hornblende. The gabbros contain 42.97-52.88 wt% SiO2, which show negative correlations with Al2O3, CaO and MgO, but positive correlations with Na2O, P2O5 and TiO2. Microtextural relations reveal the crystallization of clinopyroxene prior to plagioclase in the Myitkyina gabbros. This suggests that the gabbros were crystallized from hydrous melts, which is also supported by the occurrence of orthopyroxene and anorthitic plagioclase in some gabbros. The gabbros have slightly enriched Sr-Nd isotopes, with initial 87Sr/86Sr ratios of 0.703938-0.706609 and εNd(t) values of + 2.4-+7.2, and relatively variable Hf isotopes, with εHf(t) values of + 13.4-+24.9. A subduction component is required to explain the decoupled Nd-Hf isotopes of the gabbros. Binary mixing suggests that addition of ca 2% subducted sediments to a depleted mantle can account for the Nd-Hf decoupling. Therefore, both petrological and geochemical data of the gabbros support that the Myitkyina ophiolite was originated in a supra-subduction zone setting. The plagiogranites have compositions of tonalites and trondhjemites, containing 56.93-77.93 wt% SiO2, 1.27-10.79 wt% Na2O and 0.05-0.71 wt% K2O. They are slightly enriched in LREE over HREE and display positive anomalies in Eu, Zr, Hf but negative Nb anomalies. Very low TiO2 contents (0.03-0.2 wt%) of the plagiogranites suggest that they were not products of fractional crystallization of MORB

  2. Serpentinization and fluid-rock interaction in Jurassic mafic and ultramafic sea-floor: constraints from Ligurian ophiolite sequences

    Science.gov (United States)

    Vogel, Monica; Früh-Green, Gretchen L.; Boschi, Chiara; Schwarzenbach, Esther M.

    2014-05-01

    The Bracco-Levanto ophiolitic complex (Eastern Liguria) represents one of the largest and better-exposed ophiolitic successions in the Northern Apennines. It is considered to be a fragment of heterogeneous Jurassic lithosphere that records tectono-magmatic and alteration histories similar to those documented along the Mid-Atlantic Ridge, such as at the 15°20'N area and the Atlantis Massif at 30°N. Structural and petrological studies on these rocks provide constraints on metamorphic/deformation processes during formation and hydrothermal alteration of the Jurassic oceanic lithosphere. We present a petrological and geochemical study of deformation processes and fluid-rock interaction in the Bracco-Levanto ophiolitic complex and compare these to modern oceanic hydrothermal systems, such as the Lost City Hydrothermal Field hosted in ultramafic rocks on the Atlantis Massif. A focus is on investigating mass transfer and fluid flow paths during high and low temperature hydrothermal activity, and on processes leading to hydrothermal carbonate precipitation and the formation of ophicalcites, which are characteristic of the Bracco-Levanto sequences. Major element and mineral compositional data allow us to distinguish a multiphase history of alteration characterized by: (1) widespread SiO2 metasomatism during progressive serpentinization, and (2) multiple phases of veining and carbonate precipitation associated with circulation of seawater and high fluid-rock ratios in the shallow ultramafic-dominated portions of the Jurassic seafloor. We observe regional variations in MgO, SiO2 and Al2O3, suggesting Si-flux towards stratigraphically higher units. In general, the ophicalcites have higher Si, Al and Fe concentrations and lower Mg than the serpentinite basement rocks or serpentinites with minimal carbonate veins. Bulk rock trace element data and Sr isotope ratios indicate seawater reacting with rocks of more mafic composition, then channeled towards stratigraphically higher

  3. Why hasn't a seawater intrusion yet happened in the Kaluvelli-Pondicherry basin, Tamil Nadu, India?

    Science.gov (United States)

    Vincent, Aude; Violette, Sophie

    2016-04-01

    Worldwide, coastal aquifers are threatened by seawater intrusion. The threat is even bigger when those aquifers are overexploited, for example for irrigation, or when their recharge is low due to a semi-arid or arid climate. The sedimentary basin studied here presents both this characteristics, and water level records in the main aquifer can be as low as 30m below MSL. Though, no seawater intrusion has been monitored yet. To understand why, and because a good knowledge of a system hydrodynamic is a necessary step to an efficient water management strategy, hydrogeological numerical modelling of this multi-layered system has been conducted. Existing and acquired geological and hydrodynamic data have been implemented into a quasi-3D hydrogeological model performed with NEWSAM code. Recharge had been previously quantified through the intercomparison of hydrological models, based on surface flow field measurements. During the hydrogeological modelling, sensitivity tests on parameters, and on the nature of the boundary condition with the sea, led to the hypothesis of an offshore freshwater stock. Extension of this fresh groundwater stock has been calculated thanks to Groen approximation.

  4. Longitudinal Relations of Intrusive Parenting and Effortful Control to Ego-Resiliency during Early Childhood

    Science.gov (United States)

    Taylor, Zoe E.; Eisenberg, Nancy; Spinrad, Tracy L.; Widaman, Keith F.

    2013-01-01

    Longitudinal relations among ego-resiliency (ER), effortful control (EC), and observed intrusive parenting were examined at 18, 30, and 42 months of age ("Ns" = 256, 230, and 210) using structural equation modeling. Intrusive parenting at 18 and 30 months negatively predicted EC a year later, over and above earlier levels. EC at…

  5. Appraisal and control of sexual and non-sexual intrusive thoughts in university students.

    Science.gov (United States)

    Clark, D A; Purdon, C; Byers, E S

    2000-05-01

    This study examined differences in the appraisal and thought control strategies associated with the perceived control of unwanted sexual and non-sexual intrusive thoughts. Eleven appraisal dimensions, subjective physiological arousal and 10 thought control strategies were measured in 171 university students who were administered the Revised Obsessive Intrusions Inventory-Sex Version, a self-report measure of unwanted intrusive thoughts. Thought-action fusion (TAF) likelihood was a significant unique predictor of the perceived controllability of respondents' most upsetting sexual and non-sexual intrusive thought. Moreover greater subjective physiological arousal was a significant predictor of reduced control over sexual intrusions, whereas worry that one might act on an intrusive thought and greater effort to control the intrusion were significant unique predictors of the control of non-sexual intrusive thoughts. Various thought control strategies were more often used in response to non-sexual than sexual cognitions. The results are discussed in terms of the differential role of various appraisal processes in the control of unwanted sexual and non-sexual thoughts.

  6. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  7. Context-aware local Intrusion Detection in SCADA systems : a testbed and two showcases

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Haverkort, Boudewijn R.H.M.; Remke, Anne Katharina Ingrid; Pilch, Carina; Brackmann, Pascal; Duhme, Christof; Everinghoff, Franziska; Giberlein, Artur; Teodorowicz, Thomas; Wieland, Julian

    2017-01-01

    This paper illustrates the use of a testbed that we have developed for context-aware local intrusion detection. This testbed is based on the co-simulation framework Mosaik and allows for the validation of local intrusion detection mechanisms at field stations in power distribution networks. For two

  8. Individual differences in experiencing intrusive memories : The role of the ability to resist proactive interference

    NARCIS (Netherlands)

    Verwoerd, Johan; Wessel, Ineke; de Jong, Peter J.

    This study explored whether a relatively poor ability to resist or inhibit interference from irrelevant information in working memory is associated with experiencing undesirable intrusive memories. Non-selected participants (N = 91) completed a self-report measure of intrusive memories, and carried

  9. Intensively exploited Mediterranean aquifers: resilience and proximity to critical points of seawater intrusion

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2013-11-01

    We investigate here seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta Aquifer, the Israel Coastal Aquifer and the Cyprus Akrotiri Aquifer. Using a generalized analytical sharp-interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future sea intrusion forcings. We identify two different critical limits of sea intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete sea intrusion upto the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that sea intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that the advance of seawater currently seriously threatens the Nile Delta Aquifer and the Israel Coastal Aquifer. The Cyprus Akrotiri Aquifer is currently somewhat less threatened by increased seawater intrusion.

  10. Intensively exploited Mediterranean aquifers: resilience to seawater intrusion and proximity to critical thresholds

    Science.gov (United States)

    Mazi, K.; Koussis, A. D.; Destouni, G.

    2014-05-01

    We investigate seawater intrusion in three prominent Mediterranean aquifers that are subject to intensive exploitation and modified hydrologic regimes by human activities: the Nile Delta, Israel Coastal and Cyprus Akrotiri aquifers. Using a generalized analytical sharp interface model, we review the salinization history and current status of these aquifers, and quantify their resilience/vulnerability to current and future seawater intrusion forcings. We identify two different critical limits of seawater intrusion under groundwater exploitation and/or climatic stress: a limit of well intrusion, at which intruded seawater reaches key locations of groundwater pumping, and a tipping point of complete seawater intrusion up to the prevailing groundwater divide of a coastal aquifer. Either limit can be reached, and ultimately crossed, under intensive aquifer exploitation and/or climate-driven change. We show that seawater intrusion vulnerability for different aquifer cases can be directly compared in terms of normalized intrusion performance curves. The site-specific assessments show that (a) the intruding seawater currently seriously threatens the Nile Delta aquifer, (b) in the Israel Coastal aquifer the sharp interface toe approaches the well location and (c) the Cyprus Akrotiri aquifer is currently somewhat less threatened by increased seawater intrusion.

  11. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  12. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    Science.gov (United States)

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  13. Evaluation of of μ-controller PIR Intrusion Detector | Eludire | West ...

    African Journals Online (AJOL)

    When there is intrusion, a piezo speaker beeps and also a visual indicator with light emitting diode blinks to indicate intrusion. For security, cost effectiveness and access control to certain areas of homes, offices and industries this system is a better replacement to human surveillance needed around our valuable goods and ...

  14. Evidence of a sewer vapor transport pathway at the USEPA vapor intrusion research duplex

    Science.gov (United States)

    The role of sewer lines as preferential pathways for vapor intrusion is poorly understood. Although the importance of sewer lines for volatile organic compound (VOC) transport has been documented at a small number of sites with vapor intrusion, sewer lines are not routinely sampl...

  15. Contamination in mafic mineral-rich calc-alkaline granites: a geochemical and Sr-Nd isotope study of the Neoproterozoic Piedade Granite, SE Brazil

    Directory of Open Access Journals (Sweden)

    Leite Renato J.

    2006-01-01

    Full Text Available The Piedade Granite (~600 Ma was emplaced shortly after the main phase of granite magmatism in the Agudos Grandes batholith, Apiaí-Guaxupé Terrane, SE Brazil. Its main units are: mafic mineral-rich porphyritic granites forming the border (peraluminous muscovite-biotite granodiorite-monzogranite MBmg unit and core (metaluminous titanite-bearing biotite monzogranite BmgT unit and felsic pink inequigranular granite (Bmg unit between them. Bmg has high LaN/YbN (up to 100, Th/U (>10 and low Rb, Nb and Ta, and can be a crustal melt derived from deep-seated sources with residual garnet and biotite. The core BmgT unit derived from oxidized magmas with high Mg# (~45, Ba and Sr, fractionated REE patterns (LaN/YbN= 45, 87Sr/86Sr(t~ 0.710, epsilonNd(t ~ -12 to -14, interpreted as being high-K calc-alkaline magmas contaminated with metasedimentary rocks that had upper-crust signature (high U, Cs, Ta. The mafic-rich peraluminous granites show a more evolved isotope signature (87Sr/86Sr(t = 0.713-0.714; epsilonNd(t= -14 to -16, similar to Bmg, and Mg# and incompatible trace-element concentrations intermediate between Bmg and BmgT. A model is presented in whichMBmgis envisaged as the product of contamination between a mafic mineral-rich magma consanguineous with BmgT and pure crustal melts akin to Bmg.

  16. PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW

    Directory of Open Access Journals (Sweden)

    S. Devaraju

    2013-09-01

    Full Text Available Nowadays, the security has become a critical part of any organization or industry information systems. The Intrusion Detection System is an effective method to deal with the new kind of threats such as DoS, Porbe, R2L and U2R. In this paper, we analyze the various approaches such as Hidden Semi Markov Model, Conditional Random Fields and Layered Approach, Bayesian classification, Data Mining techniques, Clustering Algorithms such as K-Means and Fuzzy c-Means, Back Propagation Neural Network, SOM Neural Network, Rough Set Neural Network Algorithm, Genetic Algorithm, Pattern Matching, Principle Component Analysis, Linear Discriminant Analysis, Independent Component Analysis, Multivariate Statistical Analysis, SOM/PSO algorithm etc. The performance is measured for two different datasets using various approaches. The datasets are trained and tested for identifying the new attacks that will affect the hosts or networks. The well known KDD Cup 1999 or DARPA 1999 dataset has been used to improve the accuracy and performance. The four groups of attacks are identified as Probe, DoS, U2R and R2L. The dataset used for training set is 494,021 and testing set is 311,028. The aim is to improve the detection rate and performance of the proposed system.

  17. Electrical Resistivity Imaging of Seawater Intrusion into the Monterey Bay Aquifer System.

    Science.gov (United States)

    Pidlisecky, A; Moran, T; Hansen, B; Knight, R

    2016-03-01

    We use electrical resistivity tomography to obtain a 6.8-km electrical resistivity image to a depth of approximately 150 m.b.s.l. along the coast of Monterey Bay. The resulting image is used to determine the subsurface distribution of saltwater- and freshwater-saturated sediments and the geologic controls on fluid distributions in the region. Data acquisition took place over two field seasons in 2011 and 2012. To maximize our ability to image both vertical and horizontal variations in the subsurface, a combination of dipole-dipole, Wenner, Wenner-gamma, and gradient measurements were made, resulting in a large final dataset of approximately 139,000 data points. The resulting resistivity section extends to a depth of 150 m.b.s.l., and is used, in conjunction with the gamma logs from four coastal monitoring wells to identify four dominant lithologic units. From these data, we are able to infer the existence of a contiguous clay layer in the southern portion of our transect, which prevents downward migration of the saltwater observed in the upper 25 m of the subsurface to the underlying freshwater aquifer. The saltwater and brackish water in the northern portion of the transect introduce the potential for seawater intrusion into the hydraulically connected freshwater aquifer to the south, not just from the ocean, but also laterally from north to south. © 2015, National Ground Water Association.

  18. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello

    2015-11-01

    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  19. Non-intrusive reduced order modeling of nonlinear problems using neural networks

    Science.gov (United States)

    Hesthaven, J. S.; Ubbiali, S.

    2018-06-01

    We develop a non-intrusive reduced basis (RB) method for parametrized steady-state partial differential equations (PDEs). The method extracts a reduced basis from a collection of high-fidelity solutions via a proper orthogonal decomposition (POD) and employs artificial neural networks (ANNs), particularly multi-layer perceptrons (MLPs), to accurately approximate the coefficients of the reduced model. The search for the optimal number of neurons and the minimum amount of training samples to avoid overfitting is carried out in the offline phase through an automatic routine, relying upon a joint use of the Latin hypercube sampling (LHS) and the Levenberg-Marquardt (LM) training algorithm. This guarantees a complete offline-online decoupling, leading to an efficient RB method - referred to as POD-NN - suitable also for general nonlinear problems with a non-affine parametric dependence. Numerical studies are presented for the nonlinear Poisson equation and for driven cavity viscous flows, modeled through the steady incompressible Navier-Stokes equations. Both physical and geometrical parametrizations are considered. Several results confirm the accuracy of the POD-NN method and show the substantial speed-up enabled at the online stage as compared to a traditional RB strategy.

  20. Advanced inspection technology for non intrusive inspection (NII) program

    International Nuclear Information System (INIS)

    Zamir Mohamed Daud

    2003-01-01

    In the current economic environment, plants and facilities are under pressure to introduced cost saving as well as profit maximising measures. Among the many changes in the way things are run is a move towards Risk Based Inspection (RBI), with an emphasis on longer operating periods between shutdowns as well as to utilise components to their maximum capability. Underpinning and RBI program requires good data from an effective online inspections program, which would not require the shutdown of critical components. One methodology of online inspection is known as Non Intrusive Inspection (NII), an inspection philosophy with the objective of replacing internal inspection of a vessel by doing Non Destructive Testing (NDT) and inspections externally. To this end, a variety of advanced NDT techniques are needed to provide accurate online measurements. (Author)

  1. Non-intrusive Quality Analysis of Monitoring Data

    CERN Document Server

    Brightwell, M; Suwalska, Anna

    2010-01-01

    Any large-scale operational system running over a variety of devices requires a monitoring mechanism to assess the health of the overall system. The Technical Infrastructure Monitoring System (TIM) at CERN is one such system, and monitors a wide variety of devices and their properties, such as electricity supplies, device temperatures, liquid flows etc. Without adequate quality assurance, the data collected from such devices leads to false-positives and false-negatives, reducing the effectiveness of the monitoring system. The quality must, however, be measured in a non-intrusive way, so that the critical path of the data flow is not affected by the quality computation. The quality computation should also scale to large volumes of incoming data. To address these challenges, we develop a new statistical module, which monitors the data collected by TIM and reports its quality to the operators. The statistical module uses Oracle RDBMS as the underlying store, and builds hierarchical summaries on the basic events ...

  2. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  3. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  4. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  5. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  6. Non-Intrusive Optical Diagnostic Methods for Flowfield Characterization

    Science.gov (United States)

    Tabibi, Bagher M.; Terrell, Charles A.; Spraggins, Darrell; Lee, Ja. H.; Weinstein, Leonard M.

    1997-01-01

    Non-intrusive optical diagnostic techniques such as Electron Beam Fluorescence (EBF), Laser-Induced Fluorescence (LIF), and Focusing Schlieren (FS) have been setup for high-speed flow characterization and large flowfield visualization, respectively. Fluorescence emission from the First Negative band of N2(+) with the (0,0) vibration transition (at lambda =391.44 nm) was obtained using the EBF technique and a quenching rate of N2(+)* molecules by argon gas was reported. A very high sensitivity FS system was built and applied in the High-Speed Flow Generator (HFG) at NASA LaRC. A LIF system is available at the Advanced Propulsion Laboratory (APL) on campus and a plume exhaust velocity measurement, measuring the Doppler shift from lambda = 728.7 nm of argon gas, is under way.

  7. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  8. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  9. Forecasting deflation, intrusion and eruption at inflating volcanoes

    Science.gov (United States)

    Blake, Stephen; Cortés, Joaquín A.

    2018-01-01

    A principal goal of volcanology is to successfully forecast the start of volcanic eruptions. This paper introduces a general forecasting method, which relies on a stream of monitoring data and a statistical description of a given threshold criterion for an eruption to start. Specifically we investigate the timing of intrusive and eruptive events at inflating volcanoes. The gradual inflation of the ground surface is a well-known phenomenon at many volcanoes and is attributable to pressurised magma accumulating within a shallow chamber. Inflation usually culminates in a rapid deflation event caused by magma escaping from the chamber to produce a shallow intrusion and, in some cases, a volcanic eruption. We show that the ground elevation during 15 inflation periods at Krafla volcano, Iceland, increased with time towards a limiting value by following a decaying exponential with characteristic timescale τ. The available data for Krafla, Kilauea and Mauna Loa volcanoes show that the duration of inflation (t*) is approximately equal to τ. The distribution of t* / τ values follows a log-logistic distribution in which the central 60% of the data lie between 0.99 deflation event starting during a specified time interval to be estimated. The time window in which there is a specified probability of deflation starting can also be forecast, and forecasts can be updated after each new deformation measurement. The method provides stronger forecasts than one based on the distribution of repose times alone and is transferable to other types of monitoring data and/or other patterns of pre-eruptive unrest.

  10. Field geology, geochronology and geochemistry of mafic-ultramafic rocks from Alxa, China: Implications for Late Permian accretionary tectonics in the southern Altaids

    Science.gov (United States)

    Feng, Jianyun; Xiao, Wenjiao; Windley, Brian; Han, Chunming; Wan, Bo; Zhang, Ji'en; Ao, Songjian; Zhang, Zhiyong; Lin, Lina

    2013-12-01

    The time of termination of orogenesis for the southern Altaids has been controversial. Systematic investigations of field geology, geochronology and geochemistry on newly discriminated mafic-ultramafic rocks from northern Alxa in the southern Altaids were conducted to address the termination problem. The mafic-ultramafic rocks are located in the Bijiertai, Honggueryulin, and Qinggele areas, stretching from west to east for about 100 km. All rocks occur high-grade gneisses as tectonic lenses that are composed of peridotite, pyroxenite, gabbro, and serpentinite, most of which have undergone pronounced alteration, i.e., serpentinization and chloritization. Geochemically, the rocks are characterized by uniform compositional trends, i.e., with low SiO2-contents (42.51-52.21 wt.%) and alkalinity (Na2O + K2O) (0.01-5.45 wt.%, mostly less than 0.8 wt.%), and enrichments in MgO (7.37-43.36 wt.%), with Mg# = 52.75-91.87. As the rocks have been strongly altered and have a wide range of loss-on-ignition (LOI: 0.44-14.07 wt.%) values, they may have been subjected to considerable alteration by either seawater or metamorphic fluids. The REE and trace element patterns show a relatively fractionated trend with LILE enrichment and HFSE depletion, similar to that of T-MORB between N-MORB and E-MORB, indicating that the parental melt resulted from the partial melting of oceanic lithospheric mantle overprinted by fluid alteration of island-arc origin. The ultramafic rocks are relics derived from the magma after a large degree of partial melting of oceanic lithospheric mantle with superposed island arc processes under the influence of mid-ocean-ridge magmatism. LA-ICP MS U-Pb zircon ages of gabbros from three spots are 274 ± 3 Ma (MSWD = 0.35), 306 ± 3 Ma (MSWD = 0.49), 262 ± 5 Ma (MSWD = 1.2), respectively, representing the formation ages of the mafic-ultramafic rocks. Therefore, considering other previously published data, we suggest that the mafic-ultramafic rocks were products of

  11. A high-pyrite semianthracite of Late Permian age in the Songzao Coalfield, southwestern China: Mineralogical and geochemical relations with underlying mafic tuffs

    Science.gov (United States)

    Dai, S.; Wang, X.; Chen, W.; Li, D.; Chou, C.-L.; Zhou, Y.; Zhu, Chen; Li, H.; Zhu, Xudong; Xing, Y.; Zhang, W.; Zou, J.

    2010-01-01

    The No. 12 Coal (Late Permian) in the Songzao Coalfield, Chongqing, southwestern China, is characteristically high in pyrite and some trace elements. It is uniquely deposited directly above mafic tuff beds. Samples of coal and tuffs have been studied for their mineralogy and geochemistry using inductively coupled plasma-mass spectrometry, X-ray fluorescence, plasma low-temperature ashing plus powder X-ray diffraction, and scanning electron microscopy equipped with energy-dispersive X-ray analysis.The results show that the minerals of the No. 12 Coal are mainly composed of pyrite, clay minerals (kaolinite, chamosite, and illite), ankerite, calcite, and trace amounts of quartz and boehmite. Kaolinite and boehmite were mainly derived from sediment source region of mafic tuffs. Chamosite was formed by the reaction of kaolinite with Fe-Mg-rich fluids during early diagenesis. The high pyrite (Sp,d=8.83%) in the coal was related to marine transgression over peat deposits and abundant Fe derived from the underlying mafic tuff bed. Ankerite and calcite were precipitated from epigenetic fluids.Chemical compositions of incompatible elements indicate that the tuffs were derived from enriched mantle and the source magmas had an alkali-basalt character. Compared to other coals from the Songzao Coalfield and common Chinese coals, the No. 12 Coal has a lower SiO2/Al2O3 (1.13) but a higher Al2O3/Na2O (80.1) value and is significantly enriched in trace elements including Sc (13.5??g/g), V (121??g/g), Cr (33.6??g/g), Co (27.2??g/g), Ni (83.5??g/g), Cu (48.5??g/g), Ga (17.3??g/g), Y (68.3??g/g), Zr (444??g/g), Nb (23.8??g/g), and REE (392??g/g on average). Above mineralogical compositions, as well as similar ratios of selected elements (e.g., SiO2/Al2O3 and Al2O3/Na2O) and similar distribution patterns of incompatible elements (e.g., the mantle-normalized diagram for incompatible elements and chondrite-normalized diagram for rare earth elements) of coal and tuff, indicated that

  12. A high-pyrite semianthracite of Late Permian age in the Songzao Coalfield, southwestern China: Mineralogical and geochemical relations with underlying mafic tuffs

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Shifeng; Wang, Xibo; Chen, Wenmei [State Key Laboratory of Coal Resources and Safe Mining, China University of Mining and Technology, Beijing 100083, (China); Li, Dahua [Research Center of State Key Laboratory of Coal Resources and Safe Mining, Chongqing 400042, (China); Chou, Chen-Lin [Illinois State Geological Survey (Emeritus), 615 East Peabody Drive, Champaign, IL 61820, (United States); Zhou, Yiping [Yunnan Institute of Coal Geology Prospection, Kunming 650218, (China); Zhu, Changsheng; Li, Hang [Research Center of State Key Laboratory of Coal Resources and Safe Mining, Chongqing 400042, (China); Zhu, Xingwei; Xing, Yunwei; Zhang, Weiguo; Zou, Jianhua [State Key Laboratory of Coal Resources and Safe Mining, China University of Mining and Technology, Beijing 100083, (China)

    2010-09-01

    The No. 12 Coal (Late Permian) in the Songzao Coalfield, Chongqing, southwestern China, is characteristically high in pyrite and some trace elements. It is uniquely deposited directly above mafic tuff beds. Samples of coal and tuffs have been studied for their mineralogy and geochemistry using inductively coupled plasma-mass spectrometry, X-ray fluorescence, plasma low-temperature ashing plus powder X-ray diffraction, and scanning electron microscopy equipped with energy-dispersive X-ray analysis. The results show that the minerals of the No. 12 Coal are mainly composed of pyrite, clay minerals (kaolinite, chamosite, and illite), ankerite, calcite, and trace amounts of quartz and boehmite. Kaolinite and boehmite were mainly derived from sediment source region of mafic tuffs. Chamosite was formed by the reaction of kaolinite with Fe-Mg-rich fluids during early diagenesis. The high pyrite (S{sub p,d} 8.83%) in the coal was related to marine transgression over peat deposits and abundant Fe derived from the underlying mafic tuff bed. Ankerite and calcite were precipitated from epigenetic fluids. Chemical compositions of incompatible elements indicate that the tuffs were derived from enriched mantle and the source magmas had an alkali-basalt character. Compared to other coals from the Songzao Coalfield and common Chinese coals, the No. 12 Coal has a lower SiO{sub 2}/Al{sub 2}O{sub 3} (1.13) but a higher Al{sub 2}O{sub 3}/Na{sub 2}O (80.1) value and is significantly enriched in trace elements including Sc (13.5 {mu}g/g), V (121 {mu}g/g), Cr (33.6 {mu}g/g), Co (27.2 {mu}g/g), Ni (83.5 {mu}g/g), Cu (48.5 {mu}g/g), Ga (17.3 {mu}g/g), Y (68.3 {mu}g/g), Zr (444 {mu}g/g), Nb (23.8 {mu}g/g), and REE (392 {mu}g/g on average). Above mineralogical compositions, as well as similar ratios of selected elements (e.g., SiO{sub 2}/Al{sub 2}O{sub 3} and Al{sub 2}O{sub 3}/Na{sub 2}O) and similar distribution patterns of incompatible elements (e.g., the mantle-normalized diagram for

  13. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M.; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N.; Mazzoni, Elvis; Pappas, Ilias O.; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M. S.; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS. PMID:27994566

  14. Dike intrusions during rifting episodes obey scaling relationships similar to earthquakes

    Science.gov (United States)

    L., Passarelli; E., Rivalta; A., Shuler

    2014-01-01

    As continental rifts evolve towards mid-ocean ridges, strain is accommodated by repeated episodes of faulting and magmatism. Discrete rifting episodes have been observed along two subaerial divergent plate boundaries, the Krafla segment of the Northern Volcanic Rift Zone in Iceland and the Manda-Hararo segment of the Red Sea Rift in Ethiopia. In both cases, the initial and largest dike intrusion was followed by a series of smaller intrusions. By performing a statistical analysis of these rifting episodes, we demonstrate that dike intrusions obey scaling relationships similar to earthquakes. We find that the dimensions of dike intrusions obey a power law analogous to the Gutenberg-Richter relation, and the long-term release of geodetic moment is governed by a relationship consistent with the Omori law. Due to the effects of magma supply, the timing of secondary dike intrusions differs from that of the aftershocks. This work provides evidence of self-similarity in the rifting process. PMID:24469260

  15. Facebook intrusion, fear of missing out, narcissism, and life satisfaction: A cross-sectional study.

    Science.gov (United States)

    Błachnio, Agata; Przepiórka, Aneta

    2018-01-01

    Facebook is one of the most popular social networking sites. The present paper examines the relations between fear of missing out, narcissism, Facebook intrusion, and life satisfaction. We hypothesized that the fear of missing out and narcissism would play a significant role in Facebook intrusion. The participants in the study were 360 Polish users of Facebook. We administered the Facebook Intrusion Scale, the Fear of Missing Out Scale, the Narcissistic Personality Inventory, and the Satisfaction with Life Scale. The results showed that a high level of fear of missing out and high narcissism are predictors of Facebook intrusion, while a low level of fear of missing out and high narcissism are related to satisfaction with life. Our findings provide a more comprehensive picture of the predictors of Facebook intrusion and reveal interesting patterns. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  17. Working memory and inhibitory control across the life span: Intrusion errors in the Reading Span Test.

    Science.gov (United States)

    Robert, Christelle; Borella, Erika; Fagot, Delphine; Lecerf, Thierry; de Ribaupierre, Anik

    2009-04-01

    The aim of this study was to examine to what extent inhibitory control and working memory capacity are related across the life span. Intrusion errors committed by children and younger and older adults were investigated in two versions of the Reading Span Test. In Experiment 1, a mixed Reading Span Test with items of various list lengths was administered. Older adults and children recalled fewer correct words and produced more intrusions than did young adults. Also, age-related differences were found in the type of intrusions committed. In Experiment 2, an adaptive Reading Span Test was administered, in which the list length of items was adapted to each individual's working memory capacity. Age groups differed neither on correct recall nor on the rate of intrusions, but they differed on the type of intrusions. Altogether, these findings indicate that the availability of attentional resources influences the efficiency of inhibition across the life span.

  18. Time to face it! Facebook intrusion and the implications for romantic jealousy and relationship satisfaction.

    Science.gov (United States)

    Elphinston, Rachel A; Noller, Patricia

    2011-11-01

    Young people's exposure to social network sites such as Facebook is increasing, along with the potential for such use to complicate romantic relationships. Yet, little is known about the overlaps between the online and offline worlds. We extended previous research by investigating the links between Facebook intrusion, jealousy in romantic relationships, and relationship outcomes in a sample of undergraduates currently in a romantic relationship. A Facebook Intrusion Questionnaire was developed based on key features of technological (behavioral) addictions. An eight-item Facebook Intrusion Questionnaire with a single-factor structure was supported; internal consistency was high. Facebook intrusion was linked to relationship dissatisfaction, via jealous cognitions and surveillance behaviors. The results highlight the possibility of high levels of Facebook intrusion spilling over into romantic relationships, resulting in problems such as jealousy and dissatisfaction. The results have implications for romantic relationships and for Facebook users in general.

  19. THE GEOMORPHOLOGIC FEATURES OF INTRUSIVE MAGMATIC STRUCTURES FROM BÂRGĂU MOUNTAINS (EASTERN CARPATHIANS, ROMANIA

    Directory of Open Access Journals (Sweden)

    Ioan Bâca

    2016-08-01

    Full Text Available Igneous intrusive structures from Bârgău Mountains belong to the group of central Neogene volcanic chain of the Eastern Carpathians of Romania. The evolution of the relief developed on these structures are three main stages: the stage of injection of structures (Pannonian, the stage of uncovering of igneous intrusive bodies from Oligo-Miocene sedimentary cover (Pliocene, and the stage of subaerial modeling of magmatic bodies (Pliocene-current.In those circumstances, the geodiversity of intrusive magmatic structures from Bârgău Mountains is represented by several types of landforms such as: polycyclic landforms (erosional levels, structural landforms (the configuration of igneous intrusive structures, petrographic landforms (andesites, lithological contact, fluvial landforms (valleys, slopes, ridges, periglacial landforms (cryogenic and crionival landforms, biogenic and anthropogenic landforms. This study highlights certain features of the landforms modeled on igneous intrusive bodies with the aim of developing some strategy for tourism recovery by local and county authorities.

  20. Cultural and Personality Predictors of Facebook Intrusion: A Cross-Cultural Study.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela M; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-01-01

    The increase in the number of users of social networking sites (SNS) has inspired intense efforts to determine intercultural differences between them. The main aim of the study was to investigate the cultural and personal predictors of Facebook intrusion. A total of 2628 Facebook users from eight countries took part in the study. The Facebook Intrusion Questionnaire, the Ten-Item Personality Inventory, and the Singelis Scale were used. We found that two variables related to Country were significantly related to Facebook intrusion: uniqueness (negatively) and low context (positively); of the personality variables, conscientiousness, and emotional stability were negatively related to the dependent variable of Facebook intrusion across different countries, which may indicate the universal pattern of Facebook intrusion. The results of the study will contribute to the international debate on the phenomenon of SNS.