WorldWideScience

Sample records for multiple complex intrusive

  1. High-resolution 40Ar/39Ar chronology of multiple intrusion igneous complexes

    Science.gov (United States)

    Foland, K. A.; Chen, J.-F.; Linder, J. S.; Henderson, C. M. B.; Whillans, I. M.

    1989-06-01

    The Mount Brome complex of the Monteregian province of southern Quebec, Canada, consits of several major intrusions ranging compositionally from gabbro to syenite. The relative ages of these intrusives have been investigated with high-resolution 40Ar/39Ar analyses, including a specially designed irradiation configuration to cancel the effects of fluence gradients. Small yet distinct apparent age differences are observed. While a number of analytical and geological factors could be proposed to explain the small variations, evaluation of these suggests the age differences reflect those in emplacement times. The gabbro and nepheline diorite were emplaced within a short span 123.1 Ma ago. Generally more evolved lithologies (biotite monzodiorite, pulaskite, nordmarkite) appear to have been emplaced within a restricted interval 1.4±0.3 Ma later. Whole-rock Rb-Sr systematics do not give acceptable isochrons because of significant scatter interpreted to reflect initial 87Sr/86Sr heterogeneities resulting from crustal contamination. Considering the variations in initial ratio, the Rb-Sr data are consistent with the 40Ar/39Ar age.

  2. Development of computer program ENAUDIBL for computation of the sensation levels of multiple, complex, intrusive sounds in the presence of residual environmental masking noise

    Energy Technology Data Exchange (ETDEWEB)

    Liebich, R. E.; Chang, Y.-S.; Chun, K. C.

    2000-03-31

    The relative audibility of multiple sounds occurs in separate, independent channels (frequency bands) termed critical bands or equivalent rectangular (filter-response) bandwidths (ERBs) of frequency. The true nature of human hearing is a function of a complex combination of subjective factors, both auditory and nonauditory. Assessment of the probability of individual annoyance, community-complaint reaction levels, speech intelligibility, and the most cost-effective mitigation actions requires sensation-level data; these data are one of the most important auditory factors. However, sensation levels cannot be calculated by using single-number, A-weighted sound level values. This paper describes specific steps to compute sensation levels. A unique, newly developed procedure is used, which simplifies and improves the accuracy of such computations by the use of maximum sensation levels that occur, for each intrusive-sound spectrum, within each ERB. The newly developed program ENAUDIBL makes use of ERB sensation-level values generated with some computational subroutines developed for the formerly documented program SPECTRAN.

  3. Petrogenesis of Cretaceous volcanic-intrusive complex from the giant Yanbei tin deposit, South China: Implication for multiple magma sources, tin mineralization, and geodynamic setting

    Science.gov (United States)

    Li, Qian; Zhao, Kui-Dong; Lai, Pan-Chen; Jiang, Shao-Yong; Chen, Wei

    2018-01-01

    The giant Yanbei tin ore deposit is the largest porphyry-type tin deposit in South China. The orebodies are hosted by the granite porphyry in the central part of the Yanbei volcanic basin in southern Jiangxi Province. The Yanbei volcanic-intrusive complex mainly consists of dacitic-rhyolitic volcanic rocks, granite, granite porphyry and diabase dikes. In previous papers, the granite porphyry was considered as subvolcanic rocks, which came from the same single magma chamber with the volcanic rocks. In this study, zircon U-Pb ages and Hf isotope data, as well as whole-rock geochemical and Sr-Nd isotopic compositions of different magmatic units in the Yanbei complex are reported. Geochronologic results show that various magmatic units have different formation ages. The dacite yielded a zircon U-Pb age of 143 ± 1 Ma, and the granite porphyry has the emplacement age of 138 ± 1 Ma. Diabase dikes which represented the final stage of magmatism, yielded a zircon U-Pb age of 128 ± 1 Ma. Distinctive whole rock Sr-Nd and zircon Hf isotopic compositions suggest that these magmatic units were derived from different magma sources. The volcanic rocks were mainly derived from the partial melting of Paleoproterozoic metasedimentary rocks without additions of mantle-derived magma. The granite porphyry has an A-type geochemical affinity, and was derived from remelting of Paleo-Mesoproterozoic crustal source with involvement of a subordinate mantle-derived magma. The granite porphyry is also a typical stanniferous granite with high F (4070-6090 ppm) and Sn (7-39 ppm) contents. It underwent strongly crystal fractionation of plagioclase, K-feldspar, and accessory minerals (like apatite, Fe-Ti oxides), which may contribute to the tin mineralization. The diabase was derived by partial melting of enriched lithospheric mantle which had been metasomatised by slab-derived fluids. The change of magmatic sources reflected an increasing extensional tectonic environment, perhaps induced by slab

  4. Management of multiple intrusive luxative injuries: A case report with 7-year follow-up

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2014-01-01

    Full Text Available This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 7 years. Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 7 years, no clinical or radiographic pathology was detected.

  5. A 5-year follow-up case of multiple intrusive luxative injuries

    Directory of Open Access Journals (Sweden)

    Seema Thakur

    2012-01-01

    Full Text Available Introduction: Traumatic intrusive luxation is one of the most severe forms of dental injuries, usually affecting the maxillary incisors. The consequence of such an occurrence is a high risk of healing complications such as pulp necrosis, external inflammatory resorption, and external replacement resorption (ankylosis. Case Report: This report presents a case of severe intrusive luxation of multiple anterior teeth in an 11-year-old girl. The teeth were repositioned successfully by endodontic and orthodontic management. The case was monitored for 5 years. Discussion: Depending on the severity of the injury, different clinical approaches for treatment of intrusive luxation may be used. Despite the variety of treatment modalities, rehabilitation of intruded teeth is always a challenge and a multidisciplinary approach is important to achieve a successful result. In this case, intruded teeth were endodontically treated with multiple calcium hydroxide dressings and repositioned orthodontically. The follow-up of such cases is very important as the repair process after intrusion is complex. After 5 years, no clinical or radiographic pathology was detected.

  6. U–Pb geochronology of the Eocene Kærven intrusive complex, East Greenland

    DEFF Research Database (Denmark)

    Þórarinsson, Sigurjón Böðvar; Holm, Paul Martin; Tappe, Sebatstian

    2016-01-01

    Several major tholeiitic (e.g. the Skaergaard intrusion) and alkaline (e.g. the Kangerlussuaq Syenite) intrusive complexes of the North Atlantic Large Igneous Province are exposed along the Kangerlussuaq Fjord in East Greenland. The Kærven Complex forms a satellite intrusion to the Kangerlussuaq ...

  7. Drilling the Bushveld Complex- the world's largest layered mafic intrusion

    Science.gov (United States)

    Ashwal, L. D.; Webb, S. J.; Trumbull, R. B.

    2013-12-01

    The fact that surprising new discoveries can be made in layered mafic intrusions (e.g., subtle 100-150 m cyclicity in apparently homogeneous cumulates over 1000s of m) means that we are still in the first-order characterization phase of understanding these objects. Accordingly, we have secured funding from ICDP for a planning workshop to be held in Johannesburg in early 2014, aimed at scientific drilling of the Bushveld Complex, the world's largest layered mafic intrusion. Science objectives include, but are not limited to: 1. Magma chamber processes & melt evolution. How many melts/magmas/mushes were involved, what were their compositions and how did they interact? What, if anything, is missing from the Complex, and where did it go? Did Bushveld magmatism have an effect upon Earth's atmosphere at 2 Ga? 2. Crust-mantle interactions & origin of Bushveld granitoids. Are Bushveld granites & rhyolites crustal melts, differentiates from the mafic magmas or products of immiscibility? How can the evolved isotopic signatures in the mafic rocks (e.g., epsilon Nd to -8) be understood? 3. Origin of ore deposits. What were the relative roles of gravity settling, magma mixing, immiscibility and hydrothermal fluid transport in producing the PGE, Cr and V deposits? We have identified 3 potential drilling targets representing a total of ~12 km of drill core. Exact locations of drill sites are to be discussed at the workshop. Target A- East-Central Bushveld Complex. We propose 3 overlapping 3 km boreholes that will provide the first roof-to-floor continuous coverage of the Rustenburg Layered Suite. These boreholes will represent a curated, internationally available reference collection of Bushveld material for present and future research. Target B- Southeastern Bushveld Complex. We propose a single borehole of ~2 km depth, collared in Rooiberg felsite, and positioned to intersect the Roof Zone, Upper Zone, Main Zone and floor of the Complex. Amongst other things, this site will

  8. Palaeomagnetism of the Early Permian Mount Leyshon Intrusive Complex and Tuckers Igneous Complex, North Queensland, Australia

    Science.gov (United States)

    Clark, D. A.; Lackie, M. A.

    2003-06-01

    This study provides reliable, precisely defined and well-dated Early Permian (286 +/- 6 Ma) palaeomagnetic poles for Australia from the Mount Leyshon Intrusive Complex (MLIC) and the Tuckers Igneous Complex (TIC). Both complexes are associated with prominent negative magnetic anomalies, indicating the presence of rocks carrying stable remanence of reverse polarity, with a Koenigsberger ratio greater than unity. The characteristic remanence carried by the intrusive phases and by locally remagnetized, contact-metamorphosed host rocks is always of reverse polarity, consistent with acquisition during the Permo-Carboniferous (Kiaman) Reverse Superchron. The corresponding palaeopoles confirm that Australia occupied high latitudes in the Early Permian. The pole positions are: MLIC: lat. = 43.2 °S, long. = 137.3 °E dp = 6.0°, dm = 6.4° Q= 6; TIC: lat. = 47.5 °S, long. = 143.0 °E, dp = 6.0°, dm = 6.6° Q= 6. Permian palaeomagnetic overprinting is detectable at considerable distances from the MLIC (2-3 km), well beyond the zone of visible alteration. The primary nature of the Early Permian palaeomagnetic signature is established by full baked contact/aureole tests at both localities. Other new data from Australia are consistent with the poles reported here. Comparison of the Australian, African and South American Apparent Polar Wander Paths (APWP) suggests that mean Permian and Triassic poles from West Gondwana, particularly from South America, are biased by remagnetization in the Jurassic-Cretaceous and that the Late Palaeozoic-Mesozoic APWP for Gondwana is best defined by Australian data. The Australian APWP exhibits substantial movement through the Mesozoic. Provided only that the time-averaged palaeofield was zonal, the Early Triassic palaeomagnetic data from Australia provide an important palaeogeographic constraint that the south geographic pole was within, or very close to, SE Australia around 240 Ma. The new Early Permian poles are apparently more consistent

  9. Tertiary alkaline Roztoky Intrusive Complex, České středohoří Mts., Czech Republic: petrogenetic characteristics

    Czech Academy of Sciences Publication Activity Database

    Skála, Roman; Ulrych, Jaromír; Ackerman, Lukáš; Jelínek, E.; Dostal, J.; Hegner, E.; Řanda, Zdeněk

    2014-01-01

    Roč. 103, č. 5 (2014), s. 1233-1262 ISSN 1437-3254 R&D Projects: GA AV ČR IAA300130902 Institutional support: RVO:67985831 ; RVO:61389005 Keywords : Bohemian Massif * Cenozoic * continental rift * Roztoky Intrusive Complex * alkaline intrusions * geochemistry Subject RIV: DD - Geochemistry Impact factor: 2.093, year: 2014

  10. Analogue modelling on the interaction between shallow magma intrusion and a strike-slip fault: Application on the Middle Triassic Monzoni Intrusive Complex (Dolomites, Italy)

    Science.gov (United States)

    Michail, Maria; Coltorti, Massimo; Gianolla, Piero; Riva, Alberto; Rosenau, Matthias; Bonadiman, Costanza; Galland, Olivier; Guldstrand, Frank; Thordén Haug, Øystein; Rudolf, Michael; Schmiedel, Tobias

    2017-04-01

    The southwestern part of the Dolomites in Northern Italy has undergone a short-lived Ladinian (Middle Triassic) tectono-magmatic event, forming a series of significant magmatic features. These intrusive bodies deformed and metamorphosed the Permo-Triassic carbonate sedimentary framework. In this study we focus on the tectono-magmatic evolution of the shallow shoshonitic Monzoni Intrusive Complex of this Ladinian event (ca 237 Ma), covering an area of 20 km^2. This NW-SE elongated intrusive structure (5 km length) shows an orogenic magmatic affinity which is in contrast to the tectonic regime at the time of intrusion. Strain analysis shows anorogenic transtensional displacement in accordance with the ENE-WSW extensional pattern in the central Dolomites during the Ladinian. Field interpretations led to a detailed description of the regional stratigraphic sequence and the structural features of the study area. However, the geodynamic context of this magmatism and the influence of the inherited strike-slip fault on the intrusion, are still in question. To better understand the specific natural prototype and the general mechanisms of magma emplacement in tectonically active areas, we performed analogue experiments defined by, but not limited to, first order field observations. We have conducted a systematic series of experiments in different tectonic regimes (static conditions, strike-slip, transtension). We varied the ratio of viscous to brittle stresses between magma and country rock, by injecting Newtonian fluids both of high and low viscosity (i.e. silicone oil/vegetable oil) into granular materials of varying cohesion (sand, silica flour, glass beads). The evolving surface and side view of the experiments were monitored by photogrammetric techniques for strain analyses and topographic evolution. In our case, the combination of the results from field and analogue experiments brings new insights regarding the tectonic regime, the geometry of the intrusive body, and

  11. Magma transport in sheet intrusions of the Alnö carbonatite complex, central Sweden.

    Science.gov (United States)

    Andersson, Magnus; Almqvist, Bjarne S G; Burchardt, Steffi; Troll, Valentin R; Malehmir, Alireza; Snowball, Ian; Kübler, Lutz

    2016-06-10

    Magma transport through the Earth's crust occurs dominantly via sheet intrusions, such as dykes and cone-sheets, and is fundamental to crustal evolution, volcanic eruptions and geochemical element cycling. However, reliable methods to reconstruct flow direction in solidified sheet intrusions have proved elusive. Anisotropy of magnetic susceptibility (AMS) in magmatic sheets is often interpreted as primary magma flow, but magnetic fabrics can be modified by post-emplacement processes, making interpretation of AMS data ambiguous. Here we present AMS data from cone-sheets in the Alnö carbonatite complex, central Sweden. We discuss six scenarios of syn- and post-emplacement processes that can modify AMS fabrics and offer a conceptual framework for systematic interpretation of magma movements in sheet intrusions. The AMS fabrics in the Alnö cone-sheets are dominantly oblate with magnetic foliations parallel to sheet orientations. These fabrics may result from primary lateral flow or from sheet closure at the terminal stage of magma transport. As the cone-sheets are discontinuous along their strike direction, sheet closure is the most probable process to explain the observed AMS fabrics. We argue that these fabrics may be common to cone-sheets and an integrated geology, petrology and AMS approach can be used to distinguish them from primary flow fabrics.

  12. Complex multiplication and lifting problems

    CERN Document Server

    Chai, Ching-Li; Oort, Frans

    2013-01-01

    Abelian varieties with complex multiplication lie at the origins of class field theory, and they play a central role in the contemporary theory of Shimura varieties. They are special in characteristic 0 and ubiquitous over finite fields. This book explores the relationship between such abelian varieties over finite fields and over arithmetically interesting fields of characteristic 0 via the study of several natural CM lifting problems which had previously been solved only in special cases. In addition to giving complete solutions to such questions, the authors provide numerous examples to illustrate the general theory and present a detailed treatment of many fundamental results and concepts in the arithmetic of abelian varieties, such as the Main Theorem of Complex Multiplication and its generalizations, the finer aspects of Tate's work on abelian varieties over finite fields, and deformation theory. This book provides an ideal illustration of how modern techniques in arithmetic geometry (such as descent the...

  13. Shoshonitic intrusion magmatism in Pajeu-Paraiba belt: the Bom Jardim complex

    International Nuclear Information System (INIS)

    Guimaraes, I.P. de; Silva Filho, A.F. da

    1990-01-01

    The Bom Jardim complex is a multi phase intrusion emplaced within the basement of the Pajeu-Paraiba belt, in the Borborema province, N.E., Brazil, during the Pan African (Brasiliano) orogeny, 600 Ma ago. The Bom Jardim complex is primarily composed of monzonites and syenites with subordinated granites. The major and trace elements geochemistry has established a shoshonitic affinity for the monzonite-syenite assemblages, whereas the granites are clearly of a high-K calc-alkaline character. The main geochemical trends determined for the complex are the result of fractionation of mainly amphibole, biotite, alkali feldspar ±clinopyroxene within the developing magmas. The enrichment in transition metal elements, LILE and high LILE/HSFE ratios, coupled with an initial Sr sup(87)/Sr sup(86) ratio of 0.70709 is consistent with a subduction related magma source. (author)

  14. Granite intrusion in a metamorphic core complex: the example of the Mykonos laccolith (Cyclades, Greece)

    Science.gov (United States)

    Denèle, Yoann; Lecomte, Emmanuel; Jolivet, Laurent; Huet, Benjamin; Labrousse, Loïc.; Le Pourhiet, Laetitia; Lacombe, Olivier

    2010-05-01

    Numerical and analogical modelling underlined the importance of a pre-existing anomaly of viscosity-density such as a granite or migmatitic body below the brittle-ductile transition as a primary cause of metamorphic core complex (MCC) developpement. While field studies of MCC show a spatial and temporal link between MCC formation and plutonic activity, thermochronological studies show that there is no link between the intrusion of granites and the velocity of slip on the detachement plane. The Aegean domain is a good natural laboratory for studying the formation of MCC and syn-tectonic granites. In the northern Cyclades, the Mykonos-Delos-Rhenia MCC is characterised by the intrusion of a plurikilometric Late Miocene pluton of I-type granite within a migmatitic gneiss dome. AMS (Anisotropy of magnetic susceptibility) and microstructural studies in the Mykonos granites combined with recent cooling rate data allow us to use the granites as strain marker. The Mykonos granitoïds form a plurikilometric laccolith slightly deeping to the east and presenting an elliptical shape with a N170°E long axis. The laccolith is strongly asymmetrical with an outlying root zone in the SW cropping out on Delos and Rhenia islands and a major body mainly developed to the NE and cropping out on Mykonos Island. The laccolith consists of various petrographic facies presenting straight contacts that demonstrate emplacement by successive pulses of more or less differentiated magmas. The laccolith was developed at the interface between the Cycladic Basement and the Blueschists Unit and within the Blueschist Unit. Two events of deformation have been recorded in the granites. The first event is characterized by submagmatic and high to middle temperature protomylonite microstructures developped during or just after the intrusion. The second event of deformation characterized by low temperature mylonites and cataclasites close to the major detachment fault corresponds to the localization of

  15. Origin of Fe-Ti Oxide Mineralization in the Middle Paleoproterozoic Elet'ozero Syenite-Gabbro Intrusive Complex (Northern Karelia, Russia)

    Science.gov (United States)

    Sharkov, E. V.; Chistyakov, A. V.; Shchiptsov, V. V.; Bogina, M. M.; Frolov, P. V.

    2018-03-01

    Magmatic oxide mineralization widely developed in syenite-gabbro intrusive complexes is an important Fe and Ti resource. However, its origin is hotly debatable. Some researchers believe that the oxide ores were formed through precipitation of dense Ti-magnetite in an initial ferrogabbroic magma (Bai et al., 2012), whereas others consider them as a product of immiscible splitting of Fe-rich liquid during crystallization of Fe-Ti basaltic magma (Zhou et al., 2013). We consider this problem with a study of the Middle Paleoproterozoic (2086 ± 30 Ma) Elet'ozero Ti-bearing layered intrusive complex in northern Karelia (Baltic Shield). The first ore-bearing phase of the complex is mainly made up of diverse ferrogabbros, with subordinate clinopyroxenites and peridotites. Fe-Ti oxides (magnetite, Ti-magnetite, and ilmenite) usually account for 10-15 vol %, reaching 30-70% in ore varieties. The second intrusive phase is formed by alkaline and nepheline syenites. Petrographical, mineralogical, and geochemical data indicate that the first phase of the intrusion was derived from a moderately alkaline Fe-Ti basaltic melt, while the parental melt of the second phase was close in composition to alkaline trachyte. The orebodies comprise disseminated and massive ores. The disseminated Fe-Ti oxide ores make up lenses and layers conformable to general layering. Massive ores occur in subordinate amounts as layers and lenses, as well as cross-cutting veins. Elevated Nb and Ta contents in Fe-Ti oxides makes it possible to consider them complex ores. It is shown that the Fe-Ti oxide mineralization is related to the formation of a residual (Fe,Ti)-rich liquid, which lasted for the entire solidification history of the first intrusive phase. The liquid originated through multiple enrichment of Fe and Ti in the crystallization zone of the intrusion owing to the following processes: (1) precipitation of silicate minerals in the crystallization zone with a corresponding increase in the Fe and

  16. Apatite formation behaviour during metasomatism in the Bathtub Intrusion (Babbitt deposit, Duluth Complex, USA)

    Science.gov (United States)

    Raič, Sara; Mogessie, Aberra; Krenn, Kurt; Hauzenberger, Christoph A.; Tropper, Peter

    2016-04-01

    The mineralized troctolitic Bathtub intrusion (Duluth Complex, NE-Minnesota) is known for its famous Cu-Ni-Sulfide±PGM Babbitt deposit, where platinum group minerals (PGMs) are either hosted by primary magmatic sulfides (base metal sulfides) or associated with hydrothermally altered portions. This secondary generation of PGMs is present in alteration patches and suggests the involvement of hydrothermal fluids in the mobilization of platinum-group elements (PGEs). Accessory fluorapatite in these samples reveals besides H2O- and CO2-rich primary fluid inclusions, textural and compositional variations that also record magmatic and metasomatic events. Based on detailed back-scattered electron imaging (BSE) and laser ablation-inductively coupled plasma-mass spectrometry (LA-ICPMS), a primary magmatic origin is reflected by homogeneous or zoned grains, where zoning patterns are either concentric or oscillatory, with respect to LREE. Late magmatic to hydrothermal processes are indicated by grains with bright LREE-enriched rims or conversion textures with REE-enriched patches in the interior of the apatite. A metasomatic formation of monazite from apatite is documented by the presence of monazite inclusions in apatite and newly grown monazite at altered apatite rims. They formed by the release of REEs from the apatite during a fluid-induced alteration, based on the coupled substitution Ca2+ + P5+ = REE3+ + Si4+ (Rønsbo 1989; Rønsbo 2008). Samples with monazite inclusions in apatite further display occurrences of PGMs associated with hydrothermal alteration patches (chlorite + amphibole). The presence of H2O- and CO2-rich fluid inclusions in apatite, the metasomatically induced monazite growth, as well as the occurrence of PGMs in hydrothermally alteration zones, also suggest the involvement of aqueous chloride complexes in a H2O dominated fluid in the transportation of LREE and redistribution of the second generation of PGEs. Rønsbo, J.G. (1989): Coupled substitutions

  17. Geological characters and petrological characters of metamorphosed medium-acidic intrusive complexes in Ludong Orogenic Belt,China

    Institute of Scientific and Technical Information of China (English)

    凌贤长; 胡庆立; 王丽霞

    2002-01-01

    Ludong orogenic belt in China is an importantal continent collision orogenic belt in eastern Asia, between Sino-Korean landmass and Yangtze landmass. The host rock of the orogenic belt is metamorphosed medium-acidic intrusive complexes, which can be divided into four types, that's, quartz dioritz, granite dioritz, monzonitic granite and undertint monzonitic granite, principal minerals are plagioclases, potassium feldspars and quartzs, minor minerals are hornblendes, biotites, clinopyxenes and garnets, accessory mineral types and assemblages are very similar, specially, various rocks are mainly fine-grained textures. They have the history of regional amphibolite facies metamorphism and deep-middle-shallow structural layer deformation, and are changed into various gneiss and tectonic system. There are many xenolithes of middle Proterozoic eclogite-host rock extrahigh-high pressure metamorphic complexes, a small xenolithes of early Proterozoic layered metamorphite system and granulites, and ultrabasic-basic rocks of various epoches in the metamorphosed medium-acidic intrusive complexes.

  18. Geochemical and Isotopic Features of Çaykara (Trabzon, NE Turkey) Intrusive Complex

    Science.gov (United States)

    Sen, Cuneyt; Aydınçakır, Emre; Aydin, Faruk; Dokuz, Abdurrahman; Karslı, Orhan; Yılmazer, Sinan; Dündar, Buket

    2017-04-01

    Çaykara (Trabzon) Intrusive Complex is located at the eastern part of the Kaçkar Batholith. In the complex, Gündoǧdu-Boǧalı Plutons is Upper Cretaceous in aged, and Uzundere and Eǧerler Plutons are Eocene in aged. Gündoǧdu-Boǧa Plutons crop out around Araklı-Bahçecik villages, and are represented by the granitic to granodioritic rocks in composition showing porphyritic-granular texture. These rocks contain dark coloured, semi-rounded to rounded, wedged, fine-grained diorite and monzodiorite anclaves. Uzuntarla Pluton extends at E-W from Köknar-Karaçam-Uzuntarla sub-districs to south of Çaykara towards Bahçecik sub-district of Araklı. The rocks of the Uzuntarla Pluton are generally diorite to granodiorite in composition with porphyritic in texture. Eǧerler Pluton exposes at southern of the Çaykara Intrusive Complex. It's mineralogical composition is changing from diorite to granite with medium-coarse grain granular texture. The Upper Cretaceous plutonic rocks are characterized by ɛNd(i) values range from -1.5 to -9.7, whereas 87Sr/86Sr(i) values range from 0.7052 to 0.7119. Nd model ages are between 0.94 and 1.52 Ga. 206Pb/204Pb(i), 207Pb/204Pb(i) and 208Pb/204Pb(i) contents of samples change from 18.24 to 18.72, 15.59 to 15.66 and 37.93-38.64, respectively. The δ18O values in the investigated samples range from 4.0 ‰ to 6.7 ‰ and have similar ratios to I-type granitoides.The Eocene plutonic rocks are characterized by ɛNd(i) values range from -0.4 to -6.0, whereas 87Sr/86Sr(i) values range from 0.7050 to 0.7143. Nd model ages are between 0.81 and 1.32 Ga. 206Pb/204Pb(i), 207Pb/204Pb(i) and 208Pb/204Pb(i) contents of samples change from 18.241to 18.57, 15.58 to 15.63 and 38.22-38.92, respectively. The δ18O values in the investigated samples range from 5.8 ‰ to 7.1 ‰ and have similar ratios to I-type granitoides. Upper Cretaceous and Eocene aged Plutons in the study area are high-K calc-alkaline in composition and display metaluminous to

  19. Rare earth mineralisation in the Cnoc nan Cuilean intrusion of the Loch Loyal Syenite Complex, northern Scotland

    Science.gov (United States)

    Walters, A. S.; Hughes, H. S. R.; Goodenough, K. M.; Gunn, A. G.; Lacinska, A.

    2012-04-01

    Due to growing global concerns about security of rare earth element (REE) supply, there is considerable interest in identifying new deposits and in understanding the processes responsible for their formation. Ongoing studies by BGS on potential indigenous resources have focused on the Caledonian alkaline intrusive complexes of north-west Scotland. The highest values of total rare earth oxide (TREO) have been found in the Cnoc nan Cuilean intrusion of the Loch Loyal Complex in Sutherland. The Loch Loyal Syenite Complex comprises three intrusions: Ben Loyal, Beinn Stumanadh and Cnoc nan Cuilean. The Cnoc nan Cuilean intrusion, which covers an area of about 3 km2, can be subdivided into two zones: a Mixed Syenite Zone (MSZ) and a later Massive Leucosyenite Zone (MLZ). Evidence from field mapping and 3D-modelling suggests that the melasyenites were passively emplaced to form a lopolith concordant with the Moine and Lewisian country rocks. A later episode of leucosyenitic magmatism caused mixing and mingling with the melasyenite forming the MSZ. Continued intrusion of leucosyenite melts then formed the MLZ [1]. The melasyenites are enriched in TREO relative to the leucosyenites with average values of 3800 ppm and 1400 ppm respectively. The highest contents, up to 20 000 ppm TREO, are found in narrow biotite-magnetite-rich veins identified in a single stream section near the eastern margin of the intrusion. All lithologies are light rare earth element (LREE) dominated with high concentrations of Ba and Sr and low levels of Nb and Ta. Various REE-bearing minerals are present but allanite is dominant, being present in all major magmatic lithologies and the biotite-magnetite veins. Three generations of allanite have been identified: a late-magmatic phase rimming apatite; allanite micro veinlets cross-cutting the syenite; and a third phase only observed in the biotite-magnetite veins. TREO concentrations of the different allanite generations are similar, averaging 22%. The

  20. A modeling study of saltwater intrusion in the Andarax delta area using multiple data sources

    DEFF Research Database (Denmark)

    Antonsson, Arni Valur; Engesgaard, Peter Knudegaard; Jorreto, Sara

    context. The validity of a conceptual model is determined by different factors, where both data quantity and quality is of crucial importance. Often, when dealing with saltwater intrusion, data is limited. Therefore, using different sources (and types) of data can be beneficial and increase......In groundwater model development, construction of the conceptual model is one of the (initial and) critical aspects that determines the model reliability and applicability in terms of e.g. system (hydrogeological) understanding, groundwater quality predictions, and general use in water resources...

  1. Radiological Mapping of the Alkaline Intrusive Complex of Jombo, South Coastal Kenya by In-Situ Gamma-Ray Spectrometry

    Science.gov (United States)

    Kaniu, Ian; Darby, Iain G.; Kalambuka Angeyo, Hudson

    2016-04-01

    Carbonatites and alkaline intrusive complexes are rich in a variety of mineral deposits such as rare earth elements (REEs), including Nb, Zr and Mn. These are often associated with U and Th bearing minerals, including monazite, samarskite and pyrochlore. Mining waste resulting from mineral processing activities can be highly radioactive and therefore poses a risk to human health and environment. The Jombo complex located in Kenya's south coastal region is potentially one of the richest sources of Nb and REEs in the world. It consists of the main intrusion at Jombo hill, three associated satellite intrusions at Mrima, Kiruku and Nguluku hills, and several dykes. The complex is highly heterogeneous with regard to its geological formation as it is characterized by alkaline igneous rocks and carbonatites which also influence its radio-ecological dynamics. In-situ gamma spectrometry offers a low-cost, rapid and spatially representative radioactivity estimate across a range of landscapes compared to conventional radiometric techniques. In this work, a wide ranging radiological survey was conducted in the Jombo complex as follow up on previous studies[1,2], to determine radiation exposure levels and source distributions, and perform radiological risk assessments. The in-situ measurements were carried out using a 2.0 l NaI(Tl) PGIS-2 portable detector from Pico Envirotec Inc integrated with GPS, deployed for ground (back-pack) and vehicular gamma-ray spectrometry. Preliminary results of radiological distribution and mapping will be presented. [1] Patel, J. P. (1991). Discovery and Innovation, 3(3): 31-35. [2] Kebwaro, J. M. et. al. (2011). J. Phys. Sci., 6(13): 3105-3110.

  2. Single-process versus multiple-strategy models of decision making: evidence from an information intrusion paradigm.

    Science.gov (United States)

    Söllner, Anke; Bröder, Arndt; Glöckner, Andreas; Betsch, Tilmann

    2014-02-01

    When decision makers are confronted with different problems and situations, do they use a uniform mechanism as assumed by single-process models (SPMs) or do they choose adaptively from a set of available decision strategies as multiple-strategy models (MSMs) imply? Both frameworks of decision making have gathered a lot of support, but only rarely have they been contrasted with each other. Employing an information intrusion paradigm for multi-attribute decisions from givens, SPM and MSM predictions on information search, decision outcomes, attention, and confidence judgments were derived and tested against each other in two experiments. The results consistently support the SPM view: Participants seemingly using a "take-the-best" (TTB) strategy do not ignore TTB-irrelevant information as MSMs would predict, but adapt the amount of information searched, choose alternative choice options, and show varying confidence judgments contingent on the quality of the "irrelevant" information. The uniformity of these findings underlines the adequacy of the novel information intrusion paradigm and comprehensively promotes the notion of a uniform decision making mechanism as assumed by single-process models. Copyright © 2013 The Authors. Published by Elsevier B.V. All rights reserved.

  3. Human intrusion

    International Nuclear Information System (INIS)

    Hora, S.; Neill, R.; Williams, R.; Bauser, M.; Channell, J.

    1993-01-01

    This paper focused on the possible approaches to evaluating the impacts of human intrusion on nuclear waste disposal. Several major issues were reviewed. First, it was noted that human intrusion could be addressed either quantitatively through performance assessments or qualitatively through design requirements. Second, it was decided that it was impossible to construct a complete set of possible future human intrusion scenarios. Third, the question of when the effect of possible human intrusion should be considered, before or after site selection was reviewed. Finally, the time frame over which human intrusion should be considered was discussed

  4. Intrusive hyaloclastite and peperitic breccias associated to sill and cryptodome emplacement on an Early Paleocene polymagmatic compound cone-dome volcanic complex from El Guanaco mine, Northern Chile

    Science.gov (United States)

    Páez, G. N.; Permuy Vidal, C.; Galina, M.; López, L.; Jovic, S. M.; Guido, D. M.

    2018-04-01

    This work explores the textural characteristics, morphology and facies architecture of well-preserved Paleocene hyaloclastic and peperitic breccias associated with subvolcanic intrusions at El Guanaco gold mine (Northern Chile). The El Guanaco mine volcanic sequence is part of a polymagmatic compound cone-dome volcanic complex grouping several dacitic domes and maar-diatremes, and subordinated subvolcanic intrusions of basaltic, andesitic and dacitic compositions. The Soledad-Peñafiel Fault System is a first order regional structure controlling the location and style of the volcanism in the region. Three different intrusive bodies (Basaltic sills, Dacitic cryptodomes and Andesitic cryptodomes) were found to intrude into a wet and poorly consolidated pyroclastic sequence representing the upper portions of a maar-diatreme. Consequently, extensive quench fragmentation and fluidization along their contacts occurred, leading to the formation of widespread breccia bodies enclosing a coherent nucleus. Differences in matrix composition allows to define two main breccias types: 1) poorly-sorted monomictic breccias (intrusive hyaloclastites) and 2) poorly-sorted tuff-matrix breccias (peperites). The observed facies architecture is interpreted as the result of the interplay of several factors, including: 1) magma viscosity, 2) the geometry of the intrusives, and 3) variations on the consolidation degree of the host rocks. Additionally, the overall geometry of each intrusive is interpreted to be controlled by the effective viscosity of the magmas along with the available magma volume at the time of the intrusions. The presence of three compositionally different subvolcanic bodies with intrusive hyaloclastite and peperite envelopes indicate, not only that all these intrusions occurred in a short period of time (probably less than 2-3 Ma), but also that the volcaniciclastic pile suffer little or none compaction nor consolidation during that time. The presence of three

  5. High-resolution insights into episodes of crystallization, hydrothermal alteration and remelting in the Skaergaard intrusive complex

    DEFF Research Database (Denmark)

    Wotzlaw, Joern-Frederik; Bindeman, Ilya N.; Schaltegger, Urs

    2012-01-01

    of the most incompatible trace element rich horizon, similar to 100 m above SH. As the Skaergaard intrusion is also the most classic example of a shallow meteoric hydrothermal system, this work documents the alternating processes in a life of an intrusion with periods of hydrothermal cooling, heating by new...

  6. Multiple telecouplings and their complex interrelationships

    Directory of Open Access Journals (Sweden)

    Jianguo Liu

    2015-09-01

    Full Text Available Increasingly, the world is becoming socioeconomically and environmentally connected, but many studies have focused on human-environment interactions within a particular area. Although some studies have considered the impacts of external factors, there is little research on multiple reciprocal socioeconomic and environmental interactions between a focal area and other areas. Here we address this important knowledge gap by applying the new integrated framework of telecouplings (socioeconomic and environmental interactions between two or more areas over distances. Results show that even a protected area - i.e., the Wolong Nature Reserve for giant pandas in southwest China - has multiple telecoupling processes with the rest of the world; these include panda loans, tourism, information dissemination, conservation subsidies, and trade of agricultural and industrial products. The telecoupling processes exhibit nonlinear patterns, they change over time, and they have varying socioeconomic and environmental effects across the world. We also find complex relationships among different telecouplings - e.g., amplification, offsetting, spatial overlaps - which cannot be detected by traditional separate studies. Such an integrated study leads to a more comprehensive understanding of distant human-environment interactions and has significant implications for global sustainability and human well-being.

  7. Geologic Mapping in Nogal Peak Quadrangle: Geochemistry, Intrusive Relations and Mineralization in the Sierra Blanca Igneous Complex, New Mexico

    Science.gov (United States)

    Goff, F.; Kelley, S. A.; Lawrence, J. R.; Cikowski, C. T.; Krier, D. J.; Goff, C. J.; McLemore, V. T.

    2011-12-01

    Nogal Peak quadrangle is located in the northern Sierra Blanca Igneous Complex (SBIC) and contains most of the White Mountain Wilderness (geologic map is available at http://geoinfo.nmt.edu/publications/maps/geologic/ofgm/details.cfml?Volume=134). The geology of the quad consists of a late Eocene to Oligocene volcanic pile (Sierra Blanca Volcanics, mostly alkali basalt to trachyte) intruded by a multitude of dikes, plugs and three stocks: Rialto, 31.4 Ma (mostly syenite), Three Rivers, ca. 29 to 27 Ma (quartz syenite intruded by subordinate alkali granite), and Bonito Lake, 26.6 Ma (mostly monzonite). Three Rivers stock is partially surrounded by alkali rhyolites that geochemically resemble the alkali granites. The circular shape of the stock and surrounding rhyolites suggests they form the root of a probable caldera. SBIC rocks have compositions typical of those found within the Rocky Mountain alkaline belt and those associated with continental rift zone magmatism. Because the volcanic host rocks are deeply eroded, intrusive relations with the stocks are well exposed. Most contacts at stock margins are near vertical. Roof pendants are common near some contacts and stoped blocks up to 700 m long are found within the Three Rivers stock. Contacts, pendants and stoped blocks generally display some combination of hornfelsing, brecciation, fracturing, faulting and mineralization. Sierra Blanca Volcanics display hydrothermal alteration increasing from argillic in the NW sector of the quad to high-temperature porpylitic near stock margins. Retrograde phyllic alteration occurs within breccia pipes and portions of the stocks. Mineral deposits consist of four types: Placer Au, fissure veins (mostly Ag-Pb-Zn±Au), breccia pipes (Au-Mo-Cu), and porphyry Mo-Cu. A singular pipe on the SW margin of Bonito Lake stock contains sapphire-lazulite-alunite. Although Au has been intermittently mined in the quad since 1865, best production of Au originated around the turn of the last

  8. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  9. The bilinear complexity and practical algorithms for matrix multiplication

    Science.gov (United States)

    Smirnov, A. V.

    2013-12-01

    A method for deriving bilinear algorithms for matrix multiplication is proposed. New estimates for the bilinear complexity of a number of problems of the exact and approximate multiplication of rectangular matrices are obtained. In particular, the estimate for the boundary rank of multiplying 3 × 3 matrices is improved and a practical algorithm for the exact multiplication of square n × n matrices is proposed. The asymptotic arithmetic complexity of this algorithm is O( n 2.7743).

  10. Petrogenesis and metallogenesis of the Wajilitag and Puchang Fe-Ti oxide-rich intrusive complexes, northwestern Tarim Large Igneous Province

    Science.gov (United States)

    Zhang, Dongyang; Zhang, Zhaochong; Huang, He; Cheng, Zhiguo; Charlier, Bernard

    2018-04-01

    The Wajilitag and Puchang intrusive complexes of the Tarim large igneous province (TLIP) are associated with significant resources of Fe-Ti oxide ores. These two mafic-ultramafic intrusions show differences in lithology and mineral chemistry. Clinopyroxenite and melagabbro are the dominant rock types in the Wajilitag complex, whereas the Puchang complex is generally gabbroic and anorthositic in composition with minor plagioclase-bearing clinopyroxenites in the marginal zone. Disseminated Fe-Ti oxide ores are found in the Wajilitag complex and closely associated with clinopyroxenites, whereas the Puchang complex hosts massive to disseminated Fe-Ti oxide ores mainly within its gabbroic rocks. The Wajilitag intrusive rocks are characterized by a restricted range of initial 87Sr/86Sr ratios (0.7038-0.7048) and positive εNd(t) (+0.04 - +3.01), indicating insignificant involvement of continental crustal contamination. The slightly higher initial 87Sr/86Sr ratios (0.7039-0.7059) and lower εNd(t) values (-1.05 - +2.35) of the Puchang intrusive rocks also suggest that the isotopic characteristics was controlled primarily by their mantle source, rather than by crustal contamination. Both complexes have Sr-Nd isotopic compositions close the neighboring kimberlitic rocks and their hosted mantle xenoliths in the TLIP. This indicates that the ferrobasaltic parental magmas were most probably originated from partial melting of a metasomatized subcontinental lithospheric mantle, modified recently with subduction-related materials by the impingement of the ascending mantle plume. The recycled subduction-related materials preserved in the lithospheric mantle could play a key role in the formation of the parental Fe-rich magmas in the context of an overall LIP system. The distinct variations in mineral assemblage for each complex and modeled results indicated that the Wajilitag and Puchang complexes experienced different crystallization path. Fe-Ti oxides in Wajilitag joined the

  11. Interplay between multiple length and time scales in complex ...

    Indian Academy of Sciences (India)

    Administrator

    Processes in complex chemical systems, such as macromolecules, electrolytes, interfaces, ... by processes operating on a multiplicity of length .... real time. The design and interpretation of femto- second experiments has required considerable ...

  12. New U-Pb ages in the Diablillos Intrusive Complex, Southern Puna, Argentina: A long magmatic event in the Paleozoic Arc, SW Gondwana

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz, Agustin; Hauser, Natalia [Universidade de Brasilia (UnB), DF (Brazil). Instituto de Geociencias. Lab. de Geocronologia; Becchio, Raul; Nieves, Alexis; Suzano, Nestor [Universidad Nacional de Salta (UNSa)-CONICET, Salta (Argentina)

    2015-07-01

    The Puna geological region comprises Salta, Jujuy and Catamarca provinces, northwestern Argentina. This 4000 meter above sea level high-plateau region lies between the Central Argentinian Andes. The Puna basement in the central Andes consists of Proterozoic–Paleozoic metamorphic rocks and granitoids. Diverse authors, proposed different models to explain the origin of the basement, where two orogenic events are recognized: the Pampean (Upper Precambrian–Lower Cambrian) and Famatinian (Upper Cambrian–Lower Silurian) (e.g. Ramos et al., 1986; Ramos, 1988; Loewy et al., 2004; for opposite points of view see Becchio et al., 1999; Bock et al., 2000; Buttner et al., 2005). Hence, Lucassen et al. (2000) proposed for the Central Andean basement, an evolution in a mobile belt, where the Pampean and Famatinian cycles are not distinct events but, they are one single, non-differentiable event from 600 to 400 Ma. The mobile belt culminated in low-P/ high-T metamorphism at approximately 525-500 Ma. Then, these were followed by a long-lasting high-thermal gradient regime in the mid-crust until Silurian times. Becchio et al., (2011) defined the Diablillos Intrusive Complex (CID, by its Spanish name), emplaced in the Inca Viejo Range. This range splits the Salares Ratones-Centenario with the Salar Diablillos (Fig.1). This Complex is located in the Eastern Magmatic Belt, Southern Puna, Argentina. Here we present new zircons U-Pb ages by LA-MC-ICPMS in the Diablillos Intrusive Complex, contributing to understanding the magmatic event in the lower Paleozoic arc, SW Gondwana. (author)

  13. New U-Pb ages in the Diablillos Intrusive Complex, Southern Puna, Argentina: A long magmatic event in the Paleozoic Arc, SW Gondwana

    International Nuclear Information System (INIS)

    Ortiz, Agustin; Hauser, Natalia

    2015-01-01

    The Puna geological region comprises Salta, Jujuy and Catamarca provinces, northwestern Argentina. This 4000 meter above sea level high-plateau region lies between the Central Argentinian Andes. The Puna basement in the central Andes consists of Proterozoic–Paleozoic metamorphic rocks and granitoids. Diverse authors, proposed different models to explain the origin of the basement, where two orogenic events are recognized: the Pampean (Upper Precambrian–Lower Cambrian) and Famatinian (Upper Cambrian–Lower Silurian) (e.g. Ramos et al., 1986; Ramos, 1988; Loewy et al., 2004; for opposite points of view see Becchio et al., 1999; Bock et al., 2000; Buttner et al., 2005). Hence, Lucassen et al. (2000) proposed for the Central Andean basement, an evolution in a mobile belt, where the Pampean and Famatinian cycles are not distinct events but, they are one single, non-differentiable event from 600 to 400 Ma. The mobile belt culminated in low-P/ high-T metamorphism at approximately 525-500 Ma. Then, these were followed by a long-lasting high-thermal gradient regime in the mid-crust until Silurian times. Becchio et al., (2011) defined the Diablillos Intrusive Complex (CID, by its Spanish name), emplaced in the Inca Viejo Range. This range splits the Salares Ratones-Centenario with the Salar Diablillos (Fig.1). This Complex is located in the Eastern Magmatic Belt, Southern Puna, Argentina. Here we present new zircons U-Pb ages by LA-MC-ICPMS in the Diablillos Intrusive Complex, contributing to understanding the magmatic event in the lower Paleozoic arc, SW Gondwana. (author)

  14. From intrusive to oscillating thoughts.

    Science.gov (United States)

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle.

  15. Cyclic coverings, Calabi-Yau manifolds and complex multiplication

    CERN Document Server

    Rohde, Christian

    2009-01-01

    The main goal of this book is the construction of families of Calabi-Yau 3-manifolds with dense sets of complex multiplication fibers. The new families are determined by combining and generalizing two methods. Firstly, the method of E. Viehweg and K. Zuo, who have constructed a deformation of the Fermat quintic with a dense set of CM fibers by a tower of cyclic coverings. Using this method, new families of K3 surfaces with dense sets of CM fibers and involutions are obtained. Secondly, the construction method of the Borcea-Voisin mirror family, which in the case of the author's examples yields families of Calabi-Yau 3-manifolds with dense sets of CM fibers, is also utilized. Moreover fibers with complex multiplication of these new families are also determined. This book was written for young mathematicians, physicists and also for experts who are interested in complex multiplication and varieties with complex multiplication. The reader is introduced to generic Mumford-Tate groups and Shimura data, which are a...

  16. The Dovyren Intrusive Complex (Southern Siberia, Russia): Insights into dynamics of an open magma chamber with implications for parental magma origin, composition, and Cu-Ni-PGE fertility

    Science.gov (United States)

    Ariskin, Alexey; Danyushevsky, Leonid; Nikolaev, Georgy; Kislov, Evgeny; Fiorentini, Marco; McNeill, Andrew; Kostitsyn, Yuri; Goemann, Karsten; Feig, Sandrin T.; Malyshev, Alexey

    2018-03-01

    The Dovyren Intrusive Complex (DIC, Northern Baikal region, 728 Ma) includes the layered dunite-troctolite-gabbronorite Yoko-Dovyren massif (YDM), associated mafic-ultramafic sills, and dykes of olivine-rich to olivine-free gabbronorite. Major rock types of the DIC are presented, including a diversity of olivine orthocumulates to olivine-plagioclase and gabbroic adcumulates, carbonate-contaminated ultramafics and Cu-Ni-PGE mineralisation. Detailed comparisons of complete cross-sections of the YDM in its centre and at the NE and SW margins demonstrate differences in the cumulate succession, mineral chemistry, and geochemical structure that likely reflect variations in parental magma compositions. Combining petrochemical reconstructions for most primitive rocks and calculations using the COMAGMAT-5 model, it is shown that the central and peripheral parts of the intrusion formed by olivine-laden parental magmas ranged in their temperatures by 100 °C, approximately from 1290 °C ( 11 wt% MgO, olivine Fo88) to 1190 °C ( 8 wt% MgO, olivine Fo86). Thermodynamic modelling suggests that the most primitive high-Mg magma was S-undersaturated, whereas its derivatives became S-saturated at T piles to generate poorly-mineralised plagiodunite. In the troctolite and gabbroic parts of the Dovyren chamber, sulphide immiscibility likely occurred at lower temperatures, producing Cu-rich sulphide precursors, which gave rise to the 'platinum group mineral' (PGM-containing) troctolite and low-mineralised PGE-rich anorthosite in the Main Reef. The geochemical structure of the YDM demonstrates C-shaped distributions of TiO2, K2O, P2O5, and incompatible trace elements, which are 3-5 fold depleted in the cumulate rocks from the inner horizons of the intrusion with respect to the relatively thin lower and upper contact zones. In addition, a marked misbalance between estimates of the average composition of the YDM and that of the proposed olivine-laden parental magmas is established. This

  17. Petrological constraints on the recycling of mafic crystal mushes, magma ascent and intrusion of braided sills in the Torres del Paine mafic complex (Patagonia)

    Science.gov (United States)

    Leuthold, Julien; Müntener, Othmar; Baumgartner, Lukas; Putlitz, Benita

    2014-05-01

    Cumulate and crystal mush disruption and reactivation are difficult to recognise in coarse grained shallow plutonic rocks. Mafic minerals included in hornblende and zoned plagioclase provide snapshots of early crystallization and cumulate formation, but are difficult to interpret in terms of the dynamics of magma ascent and possible links between silicic and mafic rock emplacement. We will present the field relations, the microtextures and the mineral chemistry of the Miocene mafic sill complex of the Torres del Paine intrusive complex (Patagonia, Chile) and its sub-vertical feeder-zone. The mafic sill complex was built up by a succession of braided sills of shoshonitic and high-K calc-alkaline porphyritic hornblende-gabbro and fine grained monzodioritic sills. The mafic units were over-accreted over 41±11 ka, underplating the overlying granite. Local diapiric structures and felsic magma accumulation between sills indicate limited separation of intercumulus liquid from the mafic sills. Anhedral hornblende cores, with olivine + clinopyroxene ± plagioclase ± apatite inclusions, crystallized at temperatures >900°C and pressures of ~300 to ~500 MPa. The corresponding rims and monzodiorite matrix crystallized at 950°C) from the middle crust reservoir to the emplacement level. We show that hornblende-plagioclase thermobarometry is a useful monitor for the determination of segregation conditions of granitic magmas from gabbroic crystal mushes, and for monitoring the evolution of shallow crustal magmatic crystallization, decompression and cooling.

  18. Petrography, geochemistry, and U-Pb geochronology of pegmatites and aplites associated with the Alvand intrusive complex in the Hamedan region, Sanandaj-Sirjan zone, Zagros orogen (Iran)

    Science.gov (United States)

    Sepahi, Ali Asghar; Salami, Sedigheh; Lentz, David; McFarlane, Christopher; Maanijou, Mohammad

    2018-04-01

    The Alvand intrusive complex in the Hamedan area in Iran is in the Sanandaj-Sirjan zone of the Zagros orogen. It consists of a wide range of plutonic rocks, mainly gabbro, diorite, granodiorite, granite, and leucogranites that were intruded by aplitic and pegmatitic dykes. At least three successive magmatic episodes generated an older gabbro-diorite-tonalite assemblage, followed by a voluminous granodiorite-granite association, which was then followed by minor leucocratic granitoids. Aplitic and pegmatitic dykes and bodies have truncated both plutonic rocks of the Alvand intrusive complex and its metamorphic aureole. Chemically they belong to peraluminous LCT (Li-, Cs-, and Ta-bearing) family of pegmatites. Mineralogically, they resemble Muscovite (MS) and Muscovite Rare Element (MSREL) classes of pegmatites. High amounts of some elements, such as Sn (up to 10,000 ppm), Rb (up to 936 ppm), Ba (up to 706 ppm), and LREE (up to 404 ppm) indicate the highly fractionated nature of some of these aplites and pegmatites. U-Pb dating of monazite, zircon, and allanite by LA-ICPMS indicate the following ages: monazite-bearing aplites of Heydareh-e-Poshteshahr and Barfejin areas, southwest of Hamedan, give an age range of 162-172 Ma; zircon in Heydareh-e-Poshteshar gives an average age of 165 Ma and for allanite-bearing pegmatites of Artiman area, north of Tuyserkan, an age of 154.1 ± 3.7 Ma was determined. These overlap with previously reported ages (ca. 167-153 Ma) for the plutonic rocks of the Alvand complex. Therefore, these data reveal that the Jurassic was a period of magmatism in the Hamedan region and adjacent areas in the Sanandaj-Sirjan zone, which was situated at the southern edge of the central Iranian micro-plate (southern Eurasian plate) at this time. Our results also suggest that advective heating in a continental arc setting has caused melting of fertile supracrustal lithologies, such as meta-pelites. These partial melts were then emplaced at much higher

  19. Unplanned Complex Suicide-A Consideration of Multiple Methods.

    Science.gov (United States)

    Ateriya, Navneet; Kanchan, Tanuj; Shekhawat, Raghvendra Singh; Setia, Puneet; Saraf, Ashish

    2018-05-01

    Detailed death investigations are mandatory to find out the exact cause and manner in non-natural deaths. In this reference, use of multiple methods in suicide poses a challenge for the investigators especially when the choice of methods to cause death is unplanned. There is an increased likelihood that doubts of homicide are raised in cases of unplanned complex suicides. A case of complex suicide is reported where the victim resorted to multiple methods to end his life, and what appeared to be an unplanned variant based on the death scene investigations. A meticulous crime scene examination, interviews of the victim's relatives and other witnesses, and a thorough autopsy are warranted to conclude on the cause and manner of death in all such cases. © 2017 American Academy of Forensic Sciences.

  20. U-Pb age in zircon of intrusive granite at Acopiara complex, Crystal region, domain Central Ceara, Brazil

    International Nuclear Information System (INIS)

    Neri, T.F.O.; Hamelak, G.M.S.; Azevedo, L.R.; Mattos, I.C.; Verissimo, C.U.V.; Nogueira Neto, J.A.; Lima, M.N.

    2015-01-01

    Granitic body mineralogically composed by two micas, located at Crystal region, Ceara Central domain and intruded into lithotypes from Acopiara complex, provided an age of ∼526 Ma, indicating important period of magma generation of granitic composition associated with crustal anatexia, during Paleozoic

  1. Multiple-predators-based capture process on complex networks

    International Nuclear Information System (INIS)

    Sharafat, Rajput Ramiz; Pu Cunlai; Li Jie; Chen Rongbin; Xu Zhongqi

    2017-01-01

    The predator/prey (capture) problem is a prototype of many network-related applications. We study the capture process on complex networks by considering multiple predators from multiple sources. In our model, some lions start from multiple sources simultaneously to capture the lamb by biased random walks, which are controlled with a free parameter α . We derive the distribution of the lamb’s lifetime and the expected lifetime 〈 T 〉. Through simulation, we find that the expected lifetime drops substantially with the increasing number of lions. Moreover, we study how the underlying topological structure affects the capture process, and obtain that locating on small-degree nodes is better than on large-degree nodes to prolong the lifetime of the lamb. The dense or homogeneous network structures are against the survival of the lamb. We also discuss how to improve the capture efficiency in our model. (paper)

  2. Successive reactive liquid flow episodes in a layered intrusion (Unit 9, Rum Eastern Layered Intrusion, Scotland)

    Science.gov (United States)

    Leuthold, Julien; Blundy, Jon; Holness, Marian

    2014-05-01

    We will present a detailed microstructural and geochemical study of reactive liquid flow in Unit 9 of the Rum Eastern Layered Intrusion. In the study region, Unit 9 comprises an underlying lens-like body of peridotite overlain by a sequence of troctolite and gabbro (termed allivalite), with some local and minor anorthosite. The troctolite is separated from the overlying gabbro by a distinct, sub-horizontal, undulose horizon (the major wavy horizon). Higher in the stratigraphy is another, similar, horizon (the minor wavy horizon) that separates relatively clinopyroxene-poor gabbro from an overlying gabbro. To the north of the peridotite lens, both troctolite and gabbro grade into poikilitic gabbro. Clinopyroxene habit in the allivalite varies from thin rims around olivine in troctolite, to equigranular crystals in gabbro, to oikocrysts in the poikilitic gabbro. The poikilitic gabbros contain multiple generations of clinopyroxene, with Cr-rich (~1.1 wt.% Cr2O3), anhedral cores with moderate REE concentrations (core1) overgrown by an anhedral REE-depleted second generation with moderate Cr (~0.7 wt.% Cr2O3) (core2). These composite cores are rimmed by Cr-poor (~0.2 wt.% Cr2O3) and REE-poor to moderate clinopyroxene. We interpret these microstructures as a consequence of two separate episodes of partial melting triggered by the intrusion of hot olivine-phyric picrite to form the discontinuous lenses that comprise the Unit 9 peridotite. Loss of clinopyroxene-saturated partial melt from the lower part of the allivalite immediately following the early stages of sill intrusion resulted in the formation of clinopyroxene-poor gabbro. The spatial extent of clinopyroxene loss is marked by the minor wavy horizon. A further partial melting event stripped out almost all clinopyroxene from the lowest allivalite, to form a troctolite, with the major wavy horizon marking the extent of melting during this second episode. The poikilitic gabbro formed from clinopyroxene-saturated melt

  3. Petrographic aspects of the intrusive complex of Arroyo Marincho and granodiorite of Arroyo Grande.Part I

    International Nuclear Information System (INIS)

    Preciozzi, F.

    2011-01-01

    The epimetamorphis of Arroyo Grande formation (lower Precambrian) are integrated by several granitoid bodies. The Marincho complex represented by;a) main unit integrated by hornoblenditic diorite to mozongranite b) an incomformable belt of porfinoblastic honobledite c) one unit characterized by a two mica granite heterogranular to porphiroic.The petrographic diagrams shows evolutive lines, suggestings differentd origins for the main granodiorite, granodiorite the Arroyo Grande, south granite and the hornoblendites.

  4. Saltwater intrusion monitoring in Florida

    Science.gov (United States)

    Prinos, Scott T.

    2016-01-01

    Florida's communities are largely dependent on freshwater from groundwater aquifers. Existing saltwater in the aquifers, or seawater that intrudes parts of the aquifers that were fresh, can make the water unusable without additional processing. The quality of Florida's saltwater intrusion monitoring networks varies. In Miami-Dade and Broward Counties, for example, there is a well-designed network with recently constructed short open-interval monitoring wells that bracket the saltwater interface in the Biscayne aquifer. Geochemical analyses of water samples from the network help scientists evaluate pathways of saltwater intrusion and movement of the saltwater interface. Geophysical measurements, collected in these counties, aid the mapping of the saltwater interface and the design of monitoring networks. In comparison, deficiencies in the Collier County monitoring network include the positioning of monitoring wells, reliance on wells with long open intervals that when sampled might provide questionable results, and the inability of existing analyses to differentiate between multiple pathways of saltwater intrusion. A state-wide saltwater intrusion monitoring network is being planned; the planned network could improve saltwater intrusion monitoring by adopting the applicable strategies of the networks of Miami-Dade and Broward Counties, and by addressing deficiencies such as those described for the Collier County network.

  5. Orthodontic intrusion : Conventional and mini-implant assisted intrusion mechanics

    Directory of Open Access Journals (Sweden)

    Anup Belludi

    2012-01-01

    intrusion has revolutionized orthodontic anchorage and biomechanics by making anchorage perfectly stable. This article addresses various conventional clinical intrusion mechanics and especially intrusion using mini-implants that have proven effective over the years for intrusion of maxillary anteriors.

  6. Petroleum Vapor Intrusion

    Science.gov (United States)

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  7. [Analysis of intrusion errors in free recall].

    Science.gov (United States)

    Diesfeldt, H F A

    2017-06-01

    Extra-list intrusion errors during five trials of the eight-word list-learning task of the Amsterdam Dementia Screening Test (ADST) were investigated in 823 consecutive psychogeriatric patients (87.1% suffering from major neurocognitive disorder). Almost half of the participants (45.9%) produced one or more intrusion errors on the verbal recall test. Correct responses were lower when subjects made intrusion errors, but learning slopes did not differ between subjects who committed intrusion errors and those who did not so. Bivariate regression analyses revealed that participants who committed intrusion errors were more deficient on measures of eight-word recognition memory, delayed visual recognition and tests of executive control (the Behavioral Dyscontrol Scale and the ADST-Graphical Sequences as measures of response inhibition). Using hierarchical multiple regression, only free recall and delayed visual recognition retained an independent effect in the association with intrusion errors, such that deficient scores on tests of episodic memory were sufficient to explain the occurrence of intrusion errors. Measures of inhibitory control did not add significantly to the explanation of intrusion errors in free recall, which makes insufficient strength of memory traces rather than a primary deficit in inhibition the preferred account for intrusion errors in free recall.

  8. Human intrusion: New ideas?

    International Nuclear Information System (INIS)

    Cooper, J.R.

    2002-01-01

    Inadvertent human intrusion has been an issue for the disposal of solid radioactive waste for many years. This paper discusses proposals for an approach for evaluating the radiological significance of human intrusion as put forward by ICRP with contribution from work at IAEA. The approach focuses on the consequences of the intrusion. Protective actions could, however, include steps to reduce the probability of human intrusion as well as the consequences. (author)

  9. The petrology, geochronology and significance of Granite Harbour Intrusive Complex xenoliths and outcrop sampled in western McMurdo Sound, Southern Victoria Land, Antarctica

    International Nuclear Information System (INIS)

    Martin, A.P.; Cooper, A.F.; Price, R.C.; Turnbull, R.E.; Roberts, N.M.W.

    2015-01-01

    Granite Harbour Intrusive Complex xenoliths in McMurdo Volcanic Group rocks and in situ outcrops have been studied from Mount Morning, western McMurdo Sound, Antarctica. Calc-alkalic samples have whole rock signatures and normative compositions similar to the Dry Valleys 1b suite, and zircon grains in one specimen yield a 545.2 ± 4.4 Ma crystallisation age. This supports subduction-related magmatism initiating in Southern Victoria Land by 545 Ma. A second group of xenoliths is alkalic, with titanite grains in one xenolith from this group dated at 538 ± 8 Ma. Whole rock chemistry, normative compositions and geochronology of the alkalic group are comparable to the Koettlitz Glacier Alkaline Suite (KGAS). The position of a proposed lower crustal discontinuity that may form a significant basement suture in the McMurdo Sound region is newly constrained to the east of Mount Morning, perhaps along the trace of the Discovery Glacier. The boundary between East and West Antarctica may also pass along the trace of the Discovery Glacier if, as previously hypothesised, its location is controlled by the basement suture. A significant basement suture may also have provided the necessary egress for the (regionally) early and sustained magmatic activity observed at Mount Morning over the last 24 million years. (author).

  10. Infinite Multiple Membership Relational Modeling for Complex Networks

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard; Hansen, Lars Kai

    Learning latent structure in complex networks has become an important problem fueled by many types of networked data originating from practically all fields of science. In this paper, we propose a new non-parametric Bayesian multiplemembership latent feature model for networks. Contrary to existing...... multiplemembership models that scale quadratically in the number of vertices the proposedmodel scales linearly in the number of links admittingmultiple-membership analysis in large scale networks. We demonstrate a connection between the single membership relational model and multiple membership models and show...

  11. Synthetic Multiple-Imputation Procedure for Multistage Complex Samples

    Directory of Open Access Journals (Sweden)

    Zhou Hanzhi

    2016-03-01

    Full Text Available Multiple imputation (MI is commonly used when item-level missing data are present. However, MI requires that survey design information be built into the imputation models. For multistage stratified clustered designs, this requires dummy variables to represent strata as well as primary sampling units (PSUs nested within each stratum in the imputation model. Such a modeling strategy is not only operationally burdensome but also inferentially inefficient when there are many strata in the sample design. Complexity only increases when sampling weights need to be modeled. This article develops a generalpurpose analytic strategy for population inference from complex sample designs with item-level missingness. In a simulation study, the proposed procedures demonstrate efficient estimation and good coverage properties. We also consider an application to accommodate missing body mass index (BMI data in the analysis of BMI percentiles using National Health and Nutrition Examination Survey (NHANES III data. We argue that the proposed methods offer an easy-to-implement solution to problems that are not well-handled by current MI techniques. Note that, while the proposed method borrows from the MI framework to develop its inferential methods, it is not designed as an alternative strategy to release multiply imputed datasets for complex sample design data, but rather as an analytic strategy in and of itself.

  12. No evidence for differential dose effects of hydrocortisone on intrusive memories in female patients with complex post-traumatic stress disorder--a randomized, double-blind, placebo-controlled, crossover study.

    Science.gov (United States)

    Ludäscher, Petra; Schmahl, Christian; Feldmann, Robert E; Kleindienst, Nikolaus; Schneider, Miriam; Bohus, Martin

    2015-10-01

    Post-traumatic stress disorder is characterized by intrusive traumatic memories. Presently, a controversial debate is ongoing regarding whether reduced cortisol secretion in post-traumatic stress disorder promotes an automatic retrieval of trauma-associated memories. Hence, a pharmacological elevation of cortisol was proposed to decrease post-traumatic stress disorder symptoms, particularly intrusions. The present study investigated the impact of two different doses of hydrocortisone on automatic memory retrieval using a randomized, double-blind, placebo-controlled, crossover study in 30 inpatients with post-traumatic stress disorder. All participants were female and received various psychotropic medications. They were randomly assigned to one of two groups within a crossover design: they received either 1 week placebo followed by 1 week hydrocortisone 10/d, followed by 1 week placebo, followed by hydrocortisone 30 mg/d (15 participants) or 1 week hydrocortisone 30 mg/d, followed by 1 week placebo, followed by 1 week hydrocortisone 10 mg/d, followed by 1 week placebo (15 participants). The outcome measures were the frequency and the intensity of intrusions, the overall symptomatology of post-traumatic stress disorder and the general psychopathology. We did not find any differences in the frequency and the intensity of post-traumatic stress disorder-related intrusions between the 10 mg hydrocortisone, the 30 mg hydrocortisone and the placebo condition. All effect sizes for the hydrocortisone condition vs. placebo were very small. Additionally, the overall symptomatology of post-traumatic stress disorder and the general psychopathology did not differ between the hydrocortisone therapies and placebo. Our results do not show any effect of the hydrocortisone administration on intrusions in complex post-traumatic stress disorder. © The Author(s) 2015.

  13. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  14. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  15. Options for human intrusion

    International Nuclear Information System (INIS)

    Bauser, M.; Williams, R.

    1993-01-01

    This paper addresses options for dealing with human intrusion in terms of performance requirements and repository siting and design requirements. Options are presented, along with the advantages and disadvantages of certain approaches. At the conclusion, a conceptual approach is offered emphasizing both the minimization of subjective judgements concerning future human activity, and specification of repository requirements to minimize the likelihood of human intrusion and any resulting, harmful effects should intrusion occur

  16. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  17. Contributions of non-intrusive coupling in nonlinear structural mechanics

    International Nuclear Information System (INIS)

    Duval, Mickael

    2016-01-01

    This PhD thesis, part of the ANR ICARE project, aims at developing methods for complex analysis of large scale structures. The scientific challenge is to investigate very localised areas, but potentially critical as of mechanical systems resilience. Classically, representation models, discretizations, mechanical behaviour models and numerical tools are used at both global and local scales for simulation needs of graduated complexity. Global problem is handled by a generic code with topology (plate formulation, geometric approximation...) and behaviour (homogenization) simplifications while local analysis needs implementation of specialized tools (routines, dedicated codes) for an accurate representation of the geometry and behaviour. The main goal of this thesis is to develop an efficient non-intrusive coupling tool for multi-scale and multi-model structural analysis. Constraints of non-intrusiveness result in the non-modification of the stiffness operator, connectivity and the global model solver, allowing to work in a closed source software environment. First, we provide a detailed study of global/local non-intrusive coupling algorithm. Making use of several relevant examples (cracking, elastic-plastic behaviour, contact...), we show the efficiency and the flexibility of such coupling method. A comparative analysis of several optimisation tools is also carried on, and the interacting multiple patches situation is handled. Then, non-intrusive coupling is extended to globally non-linear cases, and a domain decomposition method with non-linear re-localization is proposed. Such methods allowed us to run a parallel computation using only sequential software, on a high performance computing cluster. Finally, we apply the coupling algorithm to mesh refinement with patches of finite elements. We develop an explicit residual based error estimator suitable for multi-scale solutions arising from the non-intrusive coupling, and apply it inside an error driven local mesh

  18. On the average complexity of sphere decoding in lattice space-time coded multiple-input multiple-output channel

    KAUST Repository

    Abediseid, Walid

    2012-12-21

    The exact average complexity analysis of the basic sphere decoder for general space-time codes applied to multiple-input multiple-output (MIMO) wireless channel is known to be difficult. In this work, we shed the light on the computational complexity of sphere decoding for the quasi- static, lattice space-time (LAST) coded MIMO channel. Specifically, we drive an upper bound of the tail distribution of the decoder\\'s computational complexity. We show that when the computational complexity exceeds a certain limit, this upper bound becomes dominated by the outage probability achieved by LAST coding and sphere decoding schemes. We then calculate the minimum average computational complexity that is required by the decoder to achieve near optimal performance in terms of the system parameters. Our results indicate that there exists a cut-off rate (multiplexing gain) for which the average complexity remains bounded. Copyright © 2012 John Wiley & Sons, Ltd.

  19. Semantic intrusion detection with multisensor data fusion using ...

    Indian Academy of Sciences (India)

    spatiotemporal relations to form complex events which model the intrusion patterns. ... Wireless sensor networks; complex event processing; event stream; ...... of the 2006 ACM SIGMOD International Conference on Management of Data, 407– ...

  20. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  1. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  2. Complex matrix multiplication operations with data pre-conditioning in a high performance computing architecture

    Science.gov (United States)

    Eichenberger, Alexandre E; Gschwind, Michael K; Gunnels, John A

    2014-02-11

    Mechanisms for performing a complex matrix multiplication operation are provided. A vector load operation is performed to load a first vector operand of the complex matrix multiplication operation to a first target vector register. The first vector operand comprises a real and imaginary part of a first complex vector value. A complex load and splat operation is performed to load a second complex vector value of a second vector operand and replicate the second complex vector value within a second target vector register. The second complex vector value has a real and imaginary part. A cross multiply add operation is performed on elements of the first target vector register and elements of the second target vector register to generate a partial product of the complex matrix multiplication operation. The partial product is accumulated with other partial products and a resulting accumulated partial product is stored in a result vector register.

  3. Framework for Modelling Multiple Input Complex Aggregations for Interactive Installations

    DEFF Research Database (Denmark)

    Padfield, Nicolas; Andreasen, Troels

    2012-01-01

    on fuzzy logic and provides a method for variably balancing interaction and user input with the intention of the artist or director. An experimental design is presented, demonstrating an intuitive interface for parametric modelling of a complex aggregation function. The aggregation function unifies...

  4. Adaptive intrusion data system

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1976-01-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data compression, storage, and formatting system. It also incorporates capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be utilized for the collection of environmental, bi-level, analog and video data. The output of the system is digital tapes formatted for direct data reduction on a CDC 6400 computer, and video tapes containing timed tagged information that can be correlated with the digital data

  5. Network Intrusion Dataset Assessment

    Science.gov (United States)

    2013-03-01

    International Conference on Computational Intelligence and Natural Computing, volume 2, pages 413–416, June 2009. • Rung Ching Chen, Kai -Fan Cheng, and...Chia-Fen Hsieh . “Using rough set and support vector machine for network intrusion detection.” International Journal of Network Security & Its...intrusion detection using FP tree rules.” Journal Of Advanced Networking and Applications, 1(1):30–39, 2009. • Ming-Yang Su, Gwo-Jong Yu , and Chun-Yuen

  6. The amygdala complex: multiple roles in associative learning and attention.

    OpenAIRE

    Gallagher, M; Holland, P C

    1994-01-01

    Although certain neurophysiological functions of the amygdala complex in learning seem well established, the purpose of this review is to propose that an additional conceptualization of amygdala function is now needed. The research we review provides evidence that a subsystem within the amygdala provides a coordinated regulation of attentional processes. An important aspect of this additional neuropsychology of the amygdala is that it may aid in understanding the importance of connections bet...

  7. Wave Induced Saline Intrusion in Sea Outfalls

    DEFF Research Database (Denmark)

    Larsen, Torben; Burrows, Richard

    1989-01-01

    Experimental and numerical studies have shown that the influence of wave increases the tendency of saline intrusion in multi-riser sea outfalls. The flow field in the diffusor under such unsteady and inhomogeneous circumstances is in general very complex, but when sufficient wave energy is dissip...

  8. Dentigerous cyst associated with multiple complex composite odontomas

    Directory of Open Access Journals (Sweden)

    Sangeeta P Wanjari

    2011-01-01

    Full Text Available Odontomas are considered to be hamartomatous malformations rather than true neoplasms. This most common odontogenic lesion results from the growth of completely differentiated epithelial and mesenchymal cells that give rise to ameloblasts and odontoblasts. Dentigerous cyst is an epithelium-lined sac enclosing the crown of an unerupted tooth. Apparently, the dentigerous cyst arises by the accumulation of fluid between reduced enamel epithelium and the tooth crown. Occasionally it is associated with supernumerary tooth or odontoma. We report a case of dentigerous cyst associated with complex composite odontoma and an impacted lateral incisor in a 30-year-old male patient.

  9. Mineralogy and geochemistry of triassic carbonatites in the Matcha alkaline intrusive complex (Turkestan-Alai Ridge, Kyrgyz Southern Tien Shan), SW Central Asian orogenic belt

    Science.gov (United States)

    Vrublevskii, V. V.; Morova, A. A.; Bukharova, O. V.; Konovalenko, S. I.

    2018-03-01

    Postorogenic intrusions of essexites and alkaline and nepheline syenites in the Turkestan-Alai segment of the Kyrgyz Southern Tien Shan coexist with dikes and veins of carbonatites dated at ∼220 Ma by the Ar-Ar and Rb-Sr age methods. They are mainly composed of calcite and dolomite (60-85%), as well as sodic amphibole, phlogopite, clinopyroxene, microcline, albite, apatite, and magnetite, with accessory niobate, ilmenite, Nb-rutile, titanite, zircon, baddeleyite, monazite-(Ce), barite, and sulfides. The rocks share mineralogical and geochemical similarity with carbonatites that originated by liquid immiscibility at high temperatures above 500 °C. Alkaline silicate and salt-carbonate melts are derived from sources with mainly negative bulk εNd(t) ∼ from -11 to 0 and high initial 87Sr/86Sr ratios (∼0.7061-0.7095) which may be due to mixing of PREMA and EM-type mantle material. Pb isotopic ratios in accessory pyrrhotite (206Pb/204Pb = 18.38; 207Pb/204Pb = 15.64; 208Pb/204Pb = 38.41) exhibit an EM2 trend. The intrusions bear signatures of significant crustal contamination as a result of magma genesis by syntexis and hybridism. Concordant isotope composition changes of δ13C (-6.5 to -1.9‰), δ18O (9.2-23‰), δD (-58 to -41‰), and δ34S (12.6-12.8‰) in minerals and rocks indicate inputs of crustal material at the stage of melting and effect of hot fluids released during dehydration of metamorphosed oceanic basalts or sediments. The observed HFSE patterns of the oldest alkaline gabbro may be due to interaction of the primary mafic magma with IAB-type material. The isotope similarity of alkaline rocks with spatially proximal basalts of the Tarim large igneous province does not contradict the evolution of the Turkestan-Alai Triassic magmatism as the "last echo" of the Tarim mantle plume.

  10. Managing Complexity across Multiple Dimensions of Liquid Open Data

    DEFF Research Database (Denmark)

    Jetzek, Thorhildur

    2016-01-01

    Current literature on open government data has uncovered a wide range of challenges related to these important initiatives. The problems encountered include: insufficient data quality and interoperability, problems regarding governance and motivation, lack of capabilities, and heterogeneous...... political and ideological agendas. A common open data infrastructure might resolve some of these problems, however, implementing such an infrastructure is a highly complex task. This longitudinal case study of the Danish Basic Data Program (BDP) is intended to improve our understanding of the challenges...... related to providing open access to government data through open data infrastructure. The BDP aims to improve the quality of selected government data, make them more coherent, and improve accessibility through the implementation of a common data distribution platform. The program is expected to increase...

  11. Understanding large multiprotein complexes: applying a multiple allosteric networks model to explain the function of the Mediator transcription complex.

    Science.gov (United States)

    Lewis, Brian A

    2010-01-15

    The regulation of transcription and of many other cellular processes involves large multi-subunit protein complexes. In the context of transcription, it is known that these complexes serve as regulatory platforms that connect activator DNA-binding proteins to a target promoter. However, there is still a lack of understanding regarding the function of these complexes. Why do multi-subunit complexes exist? What is the molecular basis of the function of their constituent subunits, and how are these subunits organized within a complex? What is the reason for physical connections between certain subunits and not others? In this article, I address these issues through a model of network allostery and its application to the eukaryotic RNA polymerase II Mediator transcription complex. The multiple allosteric networks model (MANM) suggests that protein complexes such as Mediator exist not only as physical but also as functional networks of interconnected proteins through which information is transferred from subunit to subunit by the propagation of an allosteric state known as conformational spread. Additionally, there are multiple distinct sub-networks within the Mediator complex that can be defined by their connections to different subunits; these sub-networks have discrete functions that are activated when specific subunits interact with other activator proteins.

  12. Multiple Dentogerous Cysts With a Complex Odontoma: An Unusual Case Report

    Directory of Open Access Journals (Sweden)

    Sheikhi

    2016-03-01

    Full Text Available Introduction Multiple dentigerous cysts are rare and mostly associated with syndromes. Case Presentation The present case report is unique, as the dentigerous cysts enclosed the lateral incisor, canine, first and second premolars of the mandible and were accompanied by a complex odontoma, instead of first mandibular molar. Conclusions Multiple unilateral nosyndromic dentigerous cysts with complex odontoma are found only rarely. The periapical inflammation of non-vital deciduous teeth and trauma may be considered ethiological factors.

  13. Interior intrusion alarm systems

    International Nuclear Information System (INIS)

    Prell, J.A.

    1978-01-01

    In meeting the requirements for the safeguarding of special nuclear material and the physical protection of licensed facilities, the licensee is required to design a physical security system that will meet minimum performance requirements. An integral part of any physical security system is the interior intrusion alarm system. The purpose of this report is to provide the potential user of an interior intrusion alarm system with information on the various types, components, and performance capabilities available so that he can design and install the optimum alarm system for his particular environment. In addition, maintenance and testing procedures are discussed and recommended which, if followed, will help the user obtain the optimum results from his system

  14. Complexity Management - A multiple case study analysis on control and reduction of complexity costs

    DEFF Research Database (Denmark)

    Myrodia, Anna

    of products, with features more custom-made to cover individual needs, both regarding characteristics of products and support services. This necessity leads to a considerable increase of the complexity in the company, which affects the product portfolio, production and supply chain, market segments......, IT systems, and business processes. In order to identify and eliminate complexity, several approaches are used, both by researchers and practitioners. The purpose of this thesis is to contribute to the existing knowledge of complexity management theory. This research focuses on the relationship between......Complexity tends to be arguably the biggest challenge of manufacturing companies. The motivation of further studying complexity is a combination between the existing literature and the practical experiences from the industry. Based on the latest trend companies are trying to supply a growing mix...

  15. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  16. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  17. Child outcomes of home-visiting for families with complex and multiple problems

    NARCIS (Netherlands)

    van Assen, Arend; Dickscheit, Jana; Post, Wendy; Grietens, Hans

    2016-01-01

    Introduction Families with complex and multiple problems are faced with an accumulation of problems across multiple areas of life. Furthermore, these families are often considered to be ‘difficult to treat’. Children and teenagers growing up in these families are exposed to an accumulation of risks

  18. Using Multiple Sources of Information in Establishing Text Complexity. Reading Research Report. #11.03

    Science.gov (United States)

    Hiebert, Elfrieda H.

    2011-01-01

    A focus of the Common Core State Standards/English Language Arts (CCSS/ELA) is that students become increasingly more capable with complex text over their school careers. This focus has redirected attention to the measurement of text complexity. Although CCSS/ELA suggests multiple criteria for this task, the standards offer a single measure of…

  19. Multiple magmatism in an evolving suprasubduction zone mantle wedge: The case of the composite mafic-ultramafic complex of Gaositai, North China Craton

    Science.gov (United States)

    Yang, Fan; Santosh, M.; Tsunogae, T.; Tang, Li; Teng, Xueming

    2017-07-01

    The suprasubduction zone mantle wedge of active convergent margins is impregnated by melts and fluids leading to the formation of a variety of magmatic and metasomatic rock suites. Here we investigate a composite mafic-ultramafic intrusion at Gaositai, in the northern margin of the North China Craton (NCC). The hornblende gabbro-serpentinite-dunite-pyroxenite-gabbro-diorite suite surrounded by hornblendites of this complex has long been considered to represent an "Alaskan-type" zoned pluton. We present petrologic, mineral chemical, geochemical and zircon U-Pb and Lu-Hf data from the various rock types from Gaositai including hornblende gabbro, serpentinite, dunite, pyroxenite, diorite and the basement hornblendite which reveal the case of multiple melt generation and melt-peridotite interaction. Our new mineral chemical data from the mafic-ultramafic suite exclude an "Alaskan-type" affinity, and the bulk geochemical features are consistent with subduction-related magmatism with enrichment of LILE (K, Rb, and Ba) and LREE (La and Ce), and depletion of HFSE (Nb, Ta, Zr, and Hf) and HREE. Zircon U-Pb geochronology reveals that the hornblendites surrounding the Gaositai complex are nearly 2 billion years older than the intrusive complex and yield early Paleoproterozoic emplacement ages (2433-2460 Ma), followed by late Paleoproterozoic metamorphism (1897 Ma). The serpentinites trace the history of a long-lived and replenished ancient sub-continental lithospheric mantle with the oldest zircon population dated as 2479 Ma and 1896 Ma, closely corresponding with the ages obtained from the basement rock, followed by Neoproterozoic and Phanerozoic zircon growth. The oldest member in the Gaositai composite intrusion is the dunite that yields emplacement age of 755 Ma, followed by pyroxenite formed through the interaction of slab melt and wedge mantle peridotite at 401 Ma. All the rock suites also carry multiple population of younger zircons ranging in age from Paleozoic to

  20. Complex 3D Vortex Lattice Formation by Phase-Engineered Multiple Beam Interference

    Directory of Open Access Journals (Sweden)

    Jolly Xavier

    2012-01-01

    Full Text Available We present the computational results on the formation of diverse complex 3D vortex lattices by a designed superposition of multiple plane waves. Special combinations of multiples of three noncoplanar plane waves with a designed relative phase shift between one another are perturbed by a nonsingular beam to generate various complex 3D vortex lattice structures. The formation of complex gyrating lattice structures carrying designed vortices by means of relatively phase-engineered plane waves is also computationally investigated. The generated structures are configured with both periodic as well as transversely quasicrystallographic basis, while these whirling complex lattices possess a long-range order of designed symmetry in a given plane. Various computational analytical tools are used to verify the presence of engineered geometry of vortices in these complex 3D vortex lattices.

  1. Acoustic emission intrusion detector

    International Nuclear Information System (INIS)

    Carver, D.W.; Whittaker, J.W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal

  2. Comparison of platinum, palladium, and rhodium distributions in some layered intrusions with special reference to the late differentiates (upper zone) of the Bushveld complex, South Africa.

    Science.gov (United States)

    Page, N.J.; Von Gruenewaldt, G.; Haffty, J.; Aruscavage, P. J.

    1982-01-01

    The Stillwater, Fiskenaesset and Bushveld complexes have many similarities. The trends of the Pt/(Pt + Pd) and its correlation with Mg/(Mg + Fe2+) are presented. Presumably the Pt/(Pt + Pd) variations are related to changes in major mineral compositions. -K.A.R.

  3. Formation of multiple focal spots using a high NA lens with a complex spiral phase mask

    Science.gov (United States)

    Lalithambigai, K.; Anbarasan, P. M.; Rajesh, K. B.

    2014-07-01

    The formation of a transversally polarized beam by transmitting a tightly focused double-ring-shaped azimuthally polarized beam through a complex spiral phase mask and high numerical aperture lens is presented based on vector diffraction theory. The generation of transversally polarized focal spot segment splitting and multiple focal spots is illustrated numerically. Moreover, we found that a properly designed complex spiral phase mask can move the focal spots along the optical axis in the z direction. Therefore, one can achieve a focal segment of two, three or multiple completely transversely polarized focal spots, which finds applications in optical trapping and in material processing technologies.

  4. The effect of multiple external representations (MERs) worksheets toward complex system reasoning achievement

    Science.gov (United States)

    Sumarno; Ibrahim, M.; Supardi, Z. A. I.

    2018-03-01

    The application of a systems approach to assessing biological systems provides hope for a coherent understanding of cell dynamics patterns and their relationship to plant life. This action required the reasoning about complex systems. In other sides, there were a lot of researchers who provided the proof about the instructional successions. They involved the multiple external representations which improved the biological learning. The researcher conducted an investigation using one shoot case study design which involved 30 students in proving that the MERs worksheets could affect the student's achievement of reasoning about complex system. The data had been collected based on test of reasoning about complex system and student's identification result who worked through MERs. The result showed that only partially students could achieve reasoning about system complex, but their MERs skill could support their reasoning ability of complex system. This study could bring a new hope to develop the MERs worksheet as a tool to facilitate the reasoning about complex system.

  5. The Torres del Paine intrusion as a model for a shallow magma chamber

    Science.gov (United States)

    Baumgartner, Lukas; Bodner, Robert; Leuthold, Julien; Muntener, Othmar; Putlitz, Benita; Vennemann, Torsten

    2014-05-01

    The shallow magmatic Torres del Paine Intrusive Complex (TPIC) belongs to a series of sub-volcanic and plutonic igneous bodies in Southern Chile and Argentina. This trench-parallel belt is located in a transitional position between the Patagonia Batholith in the West, and the alkaline Cenozoic plateau lavas in the East. While volumetrically small amounts of magmatism started around 28 my ago in the Torres del Paine area, and a second period occurred between 17-16 Ma, it peaked with the TPIC 12.59-12.43 Ma ago. The spectacular cliffs of the Torres del Paine National park provide a unique opportunity to study the evolution of a very shallow magma chamber and the interaction with its host rocks. Intrusion depth can be estimated based on contact metamorphic assemblages and granite solidus thermobarometry to 750±250 bars, corresponding to an intrusion depth of ca. 3km, ca. 500m above the base of the intrusion. Hornblende thermobarometry in mafic rocks agrees well with these estimates (Leuthold et al., 2014). The TPIC is composed of a granitic laccolith emplaced over 90ka (Michel et al., 2008) in 3 major, several 100m thick sheets, forming an overall thickness of nearly 2 km. Contacts are sharp between sheets, with the oldest sheet on the top and the youngest on the bottom (Michel et al., 2008). The granitic laccolith is under-plated by a ca. 400m thick mafic laccolith, built up over ca. 50ka (Leuthold et al. 2012), constructed from the bottom up. Granitic and mafic sheets are themselves composed of multiple metric to decametric pulses, mostly with ductile contacts between them, resulting in outcrop patterns resembling braided stream sediments. The contact of the TPIC with the Cretaceous flysch sediments document intrusion mechanism. Pre-existing sub-horizontal fold axes are rotated in the roof of the TPIC, clearly demonstrating ballooning of the roof; no ballooning was observed in the footwall of the intrusion. Extension during ballooning of the roof is indicated by

  6. [Analysis of factors associated with multiple pregnancies in assisted reproduction treatment complex].

    Science.gov (United States)

    Hernández-Nieto, C A; Méndez-Lozano, D H; Fraustro-Ávila, M E; García-Martínez, M R; Soto-Cossio, L E; Basurto-Díaz, D; Flores-Mendoza, H

    2016-01-01

    Today, advances in technology provide the best success rates in the reproductive medicine field. One of the biggest concerns about it, is the high risk of achieving multiple pregnancies, which may carry greater health risks for both; the mother and fetuses. Besides that, multiple pregnancies are considered a complication or an adverse effect of assisted reproduction treatments. To compare the factors associated with multiple pregnancy in patients who underwent complex assisted reproduction techniques. A retrospective and transversal case control study was rolled to compare the factors associated with multiple pregnancy rates, these results were correlated using a logistic regression model. a total of 1063 cases were reviewed, we obtained a pregnancy rate of 35.9%, and a multiple pregnancy rate of 31.5%. We found positive statistical association between patient age, total number of oocytes obtained, total embryos transferred, total vitrified embryos per cycle, total serum cuantitative B-GCH level, endometrial thickness in milimeters, and the Honest of a multiple pregnancy. In the logistic regression model, we found statistical association between the number of embryos transferred, number of embryos obtained, embryo quality, total vitrified embryos and the risk for multiple pregnancies. The total number of embryos transferred in a cycle of a complex assisted reproduction, is the most important factor for the onset of multiple pregnancies. The age of patients, the number of oocytes, total number of embryos obtained, the number of embryos transferred, the quality of embryos transferred and the number of frozen embryos per cycle, correlate significantly with more risk for multiple pregnancies.

  7. Multiple purpose research complex on the basis of electron accelerators and terahertz free electron laser

    International Nuclear Information System (INIS)

    Kulipanov, G.N.

    2009-01-01

    In this report the basic positioning parameters of multiple purpose research complex are presented, the list of potential experiments and technological uses on the example of results received in the multiuser center of G.I. Budker Institut of nuclear physics Siberian department of the Russian Academy of Sciences is discussed. This research complex is directed on work in the big universities and nano technology centers. Electron accelerators is intended for development of electron-beam technologies different material modification, for production of nano powder, nano materials and solution of ecological tasks. In this work the project of multiple purpose research complex on the basis of new generation electron accelerator Il-14 and workable terahertz free electron laser is suggested. Terahertz free electron laser will be used for researches in the sphere of physics and chemistry, biology and medicine, nanotechnology engineering and different methods of nanodiagnostics.

  8. Multiple Stressors and Ecological Complexity Require A New Approach to Coral Reef Research

    Directory of Open Access Journals (Sweden)

    Linwood Hagan Pendleton

    2016-03-01

    Full Text Available Ocean acidification, climate change, and other environmental stressors threaten coral reef ecosystems and the people who depend upon them. New science reveals that these multiple stressors interact and may affect a multitude of physiological and ecological processes in complex ways. The interaction of multiple stressors and ecological complexity may mean that the negative effects on coral reef ecosystems will happen sooner and be more severe than previously thought. Yet, most research on the effects of global change on coral reefs focus on one or few stressors and pathways or outcomes (e.g. bleaching. Based on a critical review of the literature, we call for a regionally targeted strategy of mesocosm-level research that addresses this complexity and provides more realistic projections about coral reef impacts in the face of global environmental change. We believe similar approaches are needed for other ecosystems that face global environmental change.

  9. Monitoring CO2 Intrusion in shallow aquifer using complex electrical methods and a novel CO2 sensitive Lidar-based sensor

    Science.gov (United States)

    Leger, E.; Dafflon, B.; Thorpe, M.; Kreitinger, A.; Laura, D.; Haivala, J.; Peterson, J.; Spangler, L.; Hubbard, S. S.

    2016-12-01

    While subsurface storage of CO2 in geological formations offers significant potential to mitigate atmospheric greenhouse gasses, approaches are needed to monitor the efficacy of the strategy as well as possible negative consequences, such as leakage of CO2 or brine into groundwater or release of fugitive gaseous CO2. Groundwater leakages can cause subsequent reactions that may also be deleterious. For example, a release of dissolved CO2 into shallow groundwatersystems can decrease groundwater pH which can potentiallymobilize naturally occurring trace metals and ions. In this perspective, detecting and assessing potential leak requires development of novel monitoring techniques.We present the results of using surface electrical resistivity tomography (ERT) and a novel CO2 sensitive Lidar-based sensor to monitor a controlled CO2 release at the ZeroEmission Research and Technology Center (Bozeman, Montana). Soil temperature and moisture sensors, wellbore water quality measurements as well as chamber-based CO2 flux measurements were used in addition to the ERT and a novel Lidar-based sensor to detect and assess potential leakage into groundwater, vadose zone and atmosphere. The three-week release wascarried out in the vadose and the saturated zones. Well sampling of pH and conductivity and surface CO2 fluxes and concentrations measurements were acquired during the release and are compared with complex electricalresistivity time-lapse measurements. The novel Lidar-based image of the CO2 plume were compared to chamber-based CO2 flux and concentration measurements. While a continuous increase in subsurface ERT and above ground CO2 was documented, joint analysis of the above and below ground data revealed distinct transport behavior in the vadose and saturated zones. Two type of transport were observed, one in the vadoze zone, monitored by CO2 flux chamber and ERT, and the other one in the saturated zone, were ERT and wellsampling were carried. The experiment suggests how

  10. Low Complexity List Decoding for Polar Codes with Multiple CRC Codes

    Directory of Open Access Journals (Sweden)

    Jong-Hwan Kim

    2017-04-01

    Full Text Available Polar codes are the first family of error correcting codes that provably achieve the capacity of symmetric binary-input discrete memoryless channels with low complexity. Since the development of polar codes, there have been many studies to improve their finite-length performance. As a result, polar codes are now adopted as a channel code for the control channel of 5G new radio of the 3rd generation partnership project. However, the decoder implementation is one of the big practical problems and low complexity decoding has been studied. This paper addresses a low complexity successive cancellation list decoding for polar codes utilizing multiple cyclic redundancy check (CRC codes. While some research uses multiple CRC codes to reduce memory and time complexity, we consider the operational complexity of decoding, and reduce it by optimizing CRC positions in combination with a modified decoding operation. Resultingly, the proposed scheme obtains not only complexity reduction from early stopping of decoding, but also additional reduction from the reduced number of decoding paths.

  11. Analysis of the quantitative dermatoglyphics of the digito-palmar complex in patients with multiple sclerosis.

    Science.gov (United States)

    Supe, S; Milicić, J; Pavićević, R

    1997-06-01

    Recent studies on the etiopathogenesis of multiple sclerosis (MS) all point out that there is a polygenetical predisposition for this illness. The so called "MS Trait" determines the reactivity of the immunological system upon ecological factors. The development of the glyphological science and the study of the characteristics of the digito-palmar dermatoglyphic complex (for which it was established that they are polygenetically determined characteristics) all enable a better insight into the genetic development during early embriogenesis. The aim of this study was to estimate certain differences in the dermatoglyphics of digito-palmar complexes between the group with multiple sclerosis and the comparable, phenotypically healthy groups of both sexes. This study is based on the analysis of 18 quantitative characteristics of the digito-palmar complex in 125 patients with multiple sclerosis (41 males and 84 females) in comparison to a group of 400 phenotypically healthy patients (200 males and 200 females). The conducted analysis pointed towards a statistically significant decrease of the number of digital and palmar ridges, as well as with lower values of atd angles in a group of MS patients of both sexes. The main discriminators were the characteristic palmar dermatoglyphics with the possibility that the discriminate analysis classifies over 80% of the examinees which exceeds the statistical significance. The results of this study suggest a possible discrimination of patients with MS and the phenotypically health population through the analysis of the dermatoglyphic status, and therefore the possibility that multiple sclerosis is genetically predisposed disease.

  12. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  13. Quantum Query Complexity for Searching Multiple Marked States from an Unsorted Database

    International Nuclear Information System (INIS)

    Shang Bin

    2007-01-01

    An important and usual sort of search problems is to find all marked states from an unsorted database with a large number of states. Grover's original quantum search algorithm is for finding single marked state with uncertainty, and it has been generalized to the case of multiple marked states, as well as been modified to find single marked state with certainty. However, the query complexity for finding all multiple marked states has not been addressed. We use a generalized Long's algorithm with high precision to solve such a problem. We calculate the approximate query complexity, which increases with the number of marked states and with the precision that we demand. In the end we introduce an algorithm for the problem on a 'duality computer' and show its advantage over other algorithms.

  14. A low complexity algorithm for multiple relay selection in two-way relaying Cognitive Radio networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-06-01

    In this paper, a multiple relay selection scheme for two-way relaying cognitive radio network is investigated. We consider a cooperative Cognitive Radio (CR) system with spectrum sharing scenario using Amplify-and-Forward (AF) protocol, where licensed users and unlicensed users operate on the same frequency band. The main objective is to maximize the sum rate of the unlicensed users allowed to share the spectrum with the licensed users by respecting a tolerated interference threshold. A practical low complexity heuristic approach is proposed to solve our formulated optimization problem. Selected numerical results show that the proposed algorithm reaches a performance close to the performance of the optimal multiple relay selection scheme either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity. In addition, these results show that our proposed scheme significantly outperforms the single relay selection scheme. © 2013 IEEE.

  15. Endovascular Treatment of Unusual Multiple Aneurysms of the Internal Carotid Artery-Posterior Communicating Artery Complex

    OpenAIRE

    Kubo, Michiya; Kuwayama, Naoya; Hirashima, Yutaka; Ohi, Masayoshi; Takami, Masaaki; Endo, Shunro

    2000-01-01

    A 79-year-old female presented with subarachnoid hemorrhage due to rupture of a rare true posterior communicating artery(PCoA)aneurysm and with poor general condition. Endovascular therapy was performed in the chronic stage. Right carotid angiography just before embolization demonstrated unusual multiple aneurysms of the internal carotid artery(ICA)-PCoA complex. Superselective an-giography and aneurysmography using microcatheter revealed two separate aneurysms arising from the PCoA and the I...

  16. COMPLEX TREATMENT OF PATIENT WITH MULTIPLE FRACTURES OF THE VERTEBRAE IN THE THORACIC SPINE

    Directory of Open Access Journals (Sweden)

    S. V. Vissarionov

    2012-01-01

    Full Text Available The authors presented an example of a complex treatment of pediatric patient with multiple fractures of the vertebrae in the thoracic spine. The child was operated on the burst fracture of a Th5 vertebra. Due to the presence of vertebral compression fractures Th8 a course of conservative treatment by the orthosis in hyperextension brace. Follow-up was 15 months.

  17. Needs and preferences of parents of adolescents with multiple and complex needs in residential care

    OpenAIRE

    Steene, Van den, Helena; West, Van, Dirk; Glazemakers, Inge

    2018-01-01

    Abstract: The perspective of parents whose children are in residential care, has received only minor attention in the literature, despite evidence pointing out the value of parental involvement in care delivery for their child. Drawing upon in‐depth interviews with 12 parents of adolescent girls with multiple and complex needs in residential child welfare, this exploratory study describes parents' own needs and preferences with regard to care delivery. Parents wish: (a) to have a true partner...

  18. Omphalocele, exstrophy of cloaca, imperforate anus, and spinal defect complex, multiple major reconstructive surgeries needed

    Directory of Open Access Journals (Sweden)

    Nada Neel

    2018-01-01

    Full Text Available OEIS complex is a rare combination of serious birth defects including omphalocele, exstrophy of cloaca, imperforate anus, and spinal defects. The aim of managements has shifted from merely providing survival to improve patient outcomes and quality of life with higher level of physical and social independence. Multiple complicated reconstructive surgeries always needed for achieving the goals of treatment. In this case report, we aimed to present our surgical approach for this rare abnormality to achieve functionally and socially acceptable outcome.

  19. Reconstruction after complex facial trauma: achieving optimal outcome through multiple contemporary surgeries.

    Science.gov (United States)

    Jaiswal, Rohit; Pu, Lee L Q

    2013-04-01

    Major facial trauma injuries often require complex repair. Traditionally, the reconstruction of such injuries has primarily utilized only free tissue transfer. However, the advent of newer, contemporary procedures may lead to potential reconstructive improvement through the use of complementary procedures after free flap reconstruction. An 18-year-old male patient suffered a major left facial degloving injury resulting in soft-tissue defect with exposed zygoma, and parietal bone. Multiple operations were undertaken in a staged manner for reconstruction. A state-of-the-art free anterolateral thigh (ALT) perforator flap and Medpor implant reconstruction of the midface were initially performed, followed by flap debulking, lateral canthopexy, midface lift with redo canthopexy, scalp tissue expansion for hairline reconstruction, and epidermal skin grafting for optimal skin color matching. Over a follow-up period of 2 years, a good and impressive reconstructive result was achieved through the use of multiple contemporary reconstructive procedures following an excellent free ALT flap reconstruction. Multiple staged reconstructions are essential in producing an optimal outcome in this complex facial injury that would likely not have been produced through a 1-stage traditional free flap reconstruction. Utilizing multiple, sequential contemporary surgeries may substantially improve outcome through the enhancement and refinement of results based on possibly the best initial soft-tissue reconstruction.

  20. Multiple Hydrogen Bond Tethers for Grazing Formic Acid in Its Complexes with Phenylacetylene.

    Science.gov (United States)

    Karir, Ginny; Kumar, Gaurav; Kar, Bishnu Prasad; Viswanathan, K S

    2018-03-01

    Complexes of phenylacetylene (PhAc) and formic acid (FA) present an interesting picture, where the two submolecules are tethered, sometimes multiply, by hydrogen bonds. The multiple tentacles adopted by PhAc-FA complexes stem from the fact that both submolecules can, in the same complex, serve as proton acceptors and/or proton donors. The acetylenic and phenyl π systems of PhAc can serve as proton acceptors, while the ≡C-H or -C-H of the phenyl ring can act as a proton donor. Likewise, FA also is amphiprotic. Hence, more than 10 hydrogen-bonded structures, involving O-H···π, C-H···π, and C-H···O contacts, were indicated by our computations, some with multiple tentacles. Interestingly, despite the multiple contacts in the complexes, the barrier between some of the structures is small, and hence, FA grazes around PhAc, even while being tethered to it, with hydrogen bonds. We used matrix isolation infrared spectroscopy to experimentally study the PhAc-FA complexes, with which we located global and a few local minima, involving primarily an O-H···π interaction. Experiments were corroborated by ab initio computations, which were performed using MP2 and M06-2X methods, with 6-311++G (d,p) and aug-cc-pVDZ basis sets. Single-point energy calculations were also done at MP2/CBS and CCSD(T)/CBS levels. The nature, strength, and origin of these noncovalent interactions were studied using AIM, NBO, and LMO-EDA analysis.

  1. Spectroscopic studies on U(VI)-salicylate complex formation with multiple equilibria

    Energy Technology Data Exchange (ETDEWEB)

    Cha, W.; Cho, H.R.; Jung, E.C.; Park, K.K.; Kim, W.H.; Song, K. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of). Nuclear Chemistry Research Div.

    2012-07-01

    This study investigates multiple equilibria related to the formation of the U(VI)-salicylate complex in a pH range of 3.0-5.5 using UV-Vis absorption and fluorescence measurement techniques. The absorbance changes at the characteristic charge-transfer bands of the complex were monitored, and the results indicated the presence of multiple equilibria and the formation of both 1:1 and 1:2 (U(VI):salicylate) complexes possessing bi-dentate chelate structures. The determined step-wise formation constants (log K{sub 1:1} and log K{sub 1:2}) are as follows: 12.5 {+-} 0.1 and 11.4 {+-} 0.2 for salicylate, 11.2 {+-} 0.1 and 10.1 {+-} 0.2 for 5-sulfosalicylate, and 12.4 {+-} 0.1 and 11.4 {+-} 0.1 for 2,6-dihydroxybenzoate, respectively. The molar absorptivities of the complexes are also provided. Furthermore, time-resolved laser-induced luminescence spectra of U(VI) species demonstrate the presence of both a dynamic and static quenching process upon the addition of a salicylate ligand. Particularly for the luminescent hydroxouranyl species, a strong static quenching effect is observed. The results suggest that both the UO{sub 2}(HSal){sup +} and the U(VI)-Sal chelate complexes serve as ground-state complexes that induce static quenching. The Stern-Volmer parameters were derived based on the measured luminescent intensity and lifetime data. The static quenching constants (log K{sub S}) obtained are 3.3 {+-} 0.1, 4.9 {+-} 0.1, and 4.4 {+-} 0.1 for UO{sub 2}{sup 2+}, (UO{sub 2}){sub 2}(OH){sub 2}{sup 2+} and (UO{sub 2}){sub 3}(OH){sub 5}{sup +}, respectively. (orig.)

  2. Spectroscopic studies on U(VI)-salicylate complex formation with multiple equilibria

    International Nuclear Information System (INIS)

    Cha, W.; Cho, H.R.; Jung, E.C.; Park, K.K.; Kim, W.H.; Song, K.

    2012-01-01

    This study investigates multiple equilibria related to the formation of the U(VI)-salicylate complex in a pH range of 3.0-5.5 using UV-Vis absorption and fluorescence measurement techniques. The absorbance changes at the characteristic charge-transfer bands of the complex were monitored, and the results indicated the presence of multiple equilibria and the formation of both 1:1 and 1:2 (U(VI):salicylate) complexes possessing bi-dentate chelate structures. The determined step-wise formation constants (log K 1:1 and log K 1:2 ) are as follows: 12.5 ± 0.1 and 11.4 ± 0.2 for salicylate, 11.2 ± 0.1 and 10.1 ± 0.2 for 5-sulfosalicylate, and 12.4 ± 0.1 and 11.4 ± 0.1 for 2,6-dihydroxybenzoate, respectively. The molar absorptivities of the complexes are also provided. Furthermore, time-resolved laser-induced luminescence spectra of U(VI) species demonstrate the presence of both a dynamic and static quenching process upon the addition of a salicylate ligand. Particularly for the luminescent hydroxouranyl species, a strong static quenching effect is observed. The results suggest that both the UO 2 (HSal) + and the U(VI)-Sal chelate complexes serve as ground-state complexes that induce static quenching. The Stern-Volmer parameters were derived based on the measured luminescent intensity and lifetime data. The static quenching constants (log K S ) obtained are 3.3 ± 0.1, 4.9 ± 0.1, and 4.4 ± 0.1 for UO 2 2+ , (UO 2 ) 2 (OH) 2 2+ and (UO 2 ) 3 (OH) 5 + , respectively. (orig.)

  3. Capturing the experiences of patients across multiple complex interventions: a meta-qualitative approach.

    Science.gov (United States)

    Webster, Fiona; Christian, Jennifer; Mansfield, Elizabeth; Bhattacharyya, Onil; Hawker, Gillian; Levinson, Wendy; Naglie, Gary; Pham, Thuy-Nga; Rose, Louise; Schull, Michael; Sinha, Samir; Stergiopoulos, Vicky; Upshur, Ross; Wilson, Lynn

    2015-09-08

    The perspectives, needs and preferences of individuals with complex health and social needs can be overlooked in the design of healthcare interventions. This study was designed to provide new insights on patient perspectives drawing from the qualitative evaluation of 5 complex healthcare interventions. Patients and their caregivers were recruited from 5 interventions based in primary, hospital and community care in Ontario, Canada. We included 62 interviews from 44 patients and 18 non-clinical caregivers. Our team analysed the transcripts from 5 distinct projects. This approach to qualitative meta-evaluation identifies common issues described by a diverse group of patients, therefore providing potential insights into systems issues. This study is a secondary analysis of qualitative data; therefore, no outcome measures were identified. We identified 5 broad themes that capture the patients' experience and highlight issues that might not be adequately addressed in complex interventions. In our study, we found that: (1) the emergency department is the unavoidable point of care; (2) patients and caregivers are part of complex and variable family systems; (3) non-medical issues mediate patients' experiences of health and healthcare delivery; (4) the unanticipated consequences of complex healthcare interventions are often the most valuable; and (5) patient experiences are shaped by the healthcare discourses on medically complex patients. Our findings suggest that key assumptions about patients that inform intervention design need to be made explicit in order to build capacity to better understand and support patients with multiple chronic diseases. Across many health systems internationally, multiple models are being implemented simultaneously that may have shared features and target similar patients, and a qualitative meta-evaluation approach, thus offers an opportunity for cumulative learning at a system level in addition to informing intervention design and

  4. Criticality Potential of Waste Packages Containing DOE SNF Affected by Igneous Intrusion

    International Nuclear Information System (INIS)

    D.S. Kimball; C.E. Sanders

    2006-01-01

    The Department of Energy (DOE) is currently preparing an application to submit to the U.S. Nuclear Regulatory Commission for a construction authorization for a monitored geologic repository. The repository will contain spent nuclear fuel (SNF) and defense high-level waste (DHLW) in waste packages placed in underground tunnels, or drifts. The primary objective of this paper is to perform a criticality analysis for waste packages containing DOE SNF affected by a disruptive igneous intrusion event in the emplacement drifts. The waste packages feature one DOE SNF canister placed in the center and surrounded by five High-Level Waste (HLW) glass canisters. The effective neutron multiplication factor (k eff ) is determined for potential configurations of the waste package during and after an intrusive igneous event. Due to the complexity of the potential scenarios following an igneous intrusion, finding conservative and bounding configurations with respect to criticality requires some additional considerations. In particular, the geometry of a slumped and damaged waste package must be examined, drift conditions must be modeled over a range of parameters, and the chemical degradation of DOE SNF and waste package materials must be considered for the expected high temperatures. The secondary intent of this calculation is to present a method for selecting conservative and bounding configurations for a wide range of end conditions

  5. On the average complexity of sphere decoding in lattice space-time coded multiple-input multiple-output channel

    KAUST Repository

    Abediseid, Walid

    2012-01-01

    complexity of sphere decoding for the quasi- static, lattice space-time (LAST) coded MIMO channel. Specifically, we drive an upper bound of the tail distribution of the decoder's computational complexity. We show that when the computational complexity exceeds

  6. Thorium–phosphorus triamidoamine complexes containing Th–P single- and multiple-bond interactions

    Science.gov (United States)

    Wildman, Elizabeth P.; Balázs, Gábor; Wooles, Ashley J.; Scheer, Manfred; Liddle, Stephen T.

    2016-01-01

    Despite the burgeoning field of uranium-ligand multiple bonds, analogous complexes involving other actinides remain scarce. For thorium, under ambient conditions only a few multiple bonds to carbon, nitrogen, oxygen, sulfur, selenium and tellurium are reported, and no multiple bonds to phosphorus are known, reflecting a general paucity of synthetic methodologies and also problems associated with stabilising these linkages at the large thorium ion. Here we report structurally authenticated examples of a parent thorium(IV)–phosphanide (Th–PH2), a terminal thorium(IV)–phosphinidene (Th=PH), a parent dithorium(IV)–phosphinidiide (Th–P(H)-Th) and a discrete actinide–phosphido complex under ambient conditions (Th=P=Th). Although thorium is traditionally considered to have dominant 6d-orbital contributions to its bonding, contrasting to majority 5f-orbital character for uranium, computational analyses suggests that the bonding of thorium can be more nuanced, in terms of 5f- versus 6d-orbital composition and also significant involvement of the 7s-orbital and how this affects the balance of 5f- versus 6d-orbital bonding character. PMID:27682617

  7. Complex heterogeneous tissue constructs containing multiple cell types prepared by inkjet printing technology.

    Science.gov (United States)

    Xu, Tao; Zhao, Weixin; Zhu, Jian-Ming; Albanna, Mohammad Z; Yoo, James J; Atala, Anthony

    2013-01-01

    This study was designed to develop a versatile method for fabricating complex and heterogeneous three-dimensional (3D) tissue constructs using simultaneous ink-jetting of multiple cell types. Human amniotic fluid-derived stem cells (hAFSCs), canine smooth muscle cells (dSMCs), and bovine aortic endothelial cells (bECs), were separately mixed with ionic cross-linker calcium chloride (CaCl(2)), loaded into separate ink cartridges and printed using a modified thermal inkjet printer. The three cell types were delivered layer-by-layer to pre-determined locations in a sodium alginate-collagen composite located in a chamber under the printer. The reaction between CaCl(2) and sodium alginate resulted in a rapid formation of a solid composite gel and the printed cells were anchored in designated areas within the gel. The printing process was repeated for several cycles leading to a complex 3D multi-cell hybrid construct. The biological functions of the 3D printed constructs were evaluated in vitro and in vivo. Each of the printed cell types maintained their viability and normal proliferation rates, phenotypic expression, and physiological functions within the heterogeneous constructs. The bioprinted constructs were able to survive and mature into functional tissues with adequate vascularization in vivo. These findings demonstrate the feasibility of fabricating complex heterogeneous tissue constructs containing multiple cell types using inkjet printing technology. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Multiple origins of interdependent endosymbiotic complexes in a genus of cicadas.

    Science.gov (United States)

    Łukasik, Piotr; Nazario, Katherine; Van Leuven, James T; Campbell, Matthew A; Meyer, Mariah; Michalik, Anna; Pessacq, Pablo; Simon, Chris; Veloso, Claudio; McCutcheon, John P

    2018-01-09

    Bacterial endosymbionts that provide nutrients to hosts often have genomes that are extremely stable in structure and gene content. In contrast, the genome of the endosymbiont Hodgkinia cicadicola has fractured into multiple distinct lineages in some species of the cicada genus Tettigades To better understand the frequency, timing, and outcomes of Hodgkinia lineage splitting throughout this cicada genus, we sampled cicadas over three field seasons in Chile and performed genomics and microscopy on representative samples. We found that a single ancestral Hodgkinia lineage has split at least six independent times in Tettigades over the last 4 million years, resulting in complexes of between two and six distinct Hodgkinia lineages per host. Individual genomes in these symbiotic complexes differ dramatically in relative abundance, genome size, organization, and gene content. Each Hodgkinia lineage retains a small set of core genes involved in genetic information processing, but the high level of gene loss experienced by all genomes suggests that extensive sharing of gene products among symbiont cells must occur. In total, Hodgkinia complexes that consist of multiple lineages encode nearly complete sets of genes present on the ancestral single lineage and presumably perform the same functions as symbionts that have not undergone splitting. However, differences in the timing of the splits, along with dissimilar gene loss patterns on the resulting genomes, have led to very different outcomes of lineage splitting in extant cicadas.

  9. A Complex Facial Trauma Case with Multiple Mandibular Fractures and Dentoalveolar Injuries

    Directory of Open Access Journals (Sweden)

    Yeliz Guven

    2015-01-01

    Full Text Available The principles of management of mandibular fractures differ in children when compared to adults and depend on the specific age-related status of the growing mandible and the developing dentition. This paper presents a case report with a complex facial trauma affecting the mandibular body and condyle region and dentoalveolar complex. Clinical examination revealed soft tissue injuries, limited mouth opening, lateral deviation of the mandible, an avulsed incisor, a subluxated incisor, and a fractured crown. CBCT examination revealed a nondisplaced fracture and an oblique greenstick fracture of the mandibular body and unilateral fracture of the condyle. Closed reduction technique was chosen to manage fractures of the mandible. Favorable healing outcomes on multiple fractures of the mandible throughout the 6-year follow-up period proved the success of the conservative treatment. This case report is important since it presents a variety of pathological sequelae to trauma within one case.

  10. Magnetic Actuator with Multiple Vibration Components Arranged at Eccentric Positions for Use in Complex Piping

    Directory of Open Access Journals (Sweden)

    Hiroyuki Yaguchi

    2016-06-01

    Full Text Available This paper proposes a magnetic actuator using multiple vibration components to perform locomotion in a complex pipe with a 25 mm inner diameter. Due to the desire to increase the turning moment in a T-junction pipe, two vibration components were attached off-center to an acrylic plate with an eccentricity of 2 mm. The experimental results show that the magnetic actuator was able to move at 40.6 mm/s while pulling a load mass of 20 g in a pipe with an inner diameter of 25 mm. In addition, this magnetic actuator was able to move stably in U-junction and T-junction pipes. If a micro-camera is implemented in the future, the inspection of small complex pipes can be enabled. The possibility of inspection in pipes with a 25 mm inner diameter was shown by equipping the pipe with a micro-camera.

  11. A low-complexity interacting multiple model filter for maneuvering target tracking

    KAUST Repository

    Khalid, Syed Safwan

    2017-01-22

    In this work, we address the target tracking problem for a coordinate-decoupled Markovian jump-mean-acceleration based maneuvering mobility model. A novel low-complexity alternative to the conventional interacting multiple model (IMM) filter is proposed for this class of mobility models. The proposed tracking algorithm utilizes a bank of interacting filters where the interactions are limited to the mixing of the mean estimates, and it exploits a fixed off-line computed Kalman gain matrix for the entire filter bank. Consequently, the proposed filter does not require matrix inversions during on-line operation which significantly reduces its complexity. Simulation results show that the performance of the low-complexity proposed scheme remains comparable to that of the traditional (highly-complex) IMM filter. Furthermore, we derive analytical expressions that iteratively evaluate the transient and steady-state performance of the proposed scheme, and establish the conditions that ensure the stability of the proposed filter. The analytical findings are in close accordance with the simulated results.

  12. A low-complexity interacting multiple model filter for maneuvering target tracking

    KAUST Repository

    Khalid, Syed Safwan; Abrar, Shafayat

    2017-01-01

    In this work, we address the target tracking problem for a coordinate-decoupled Markovian jump-mean-acceleration based maneuvering mobility model. A novel low-complexity alternative to the conventional interacting multiple model (IMM) filter is proposed for this class of mobility models. The proposed tracking algorithm utilizes a bank of interacting filters where the interactions are limited to the mixing of the mean estimates, and it exploits a fixed off-line computed Kalman gain matrix for the entire filter bank. Consequently, the proposed filter does not require matrix inversions during on-line operation which significantly reduces its complexity. Simulation results show that the performance of the low-complexity proposed scheme remains comparable to that of the traditional (highly-complex) IMM filter. Furthermore, we derive analytical expressions that iteratively evaluate the transient and steady-state performance of the proposed scheme, and establish the conditions that ensure the stability of the proposed filter. The analytical findings are in close accordance with the simulated results.

  13. Evidence for Multiple Mediator Complexes in Yeast Independently Recruited by Activated Heat Shock Factor.

    Science.gov (United States)

    Anandhakumar, Jayamani; Moustafa, Yara W; Chowdhary, Surabhi; Kainth, Amoldeep S; Gross, David S

    2016-07-15

    Mediator is an evolutionarily conserved coactivator complex essential for RNA polymerase II transcription. Although it has been generally assumed that in Saccharomyces cerevisiae, Mediator is a stable trimodular complex, its structural state in vivo remains unclear. Using the "anchor away" (AA) technique to conditionally deplete select subunits within Mediator and its reversibly associated Cdk8 kinase module (CKM), we provide evidence that Mediator's tail module is highly dynamic and that a subcomplex consisting of Med2, Med3, and Med15 can be independently recruited to the regulatory regions of heat shock factor 1 (Hsf1)-activated genes. Fluorescence microscopy of a scaffold subunit (Med14)-anchored strain confirmed parallel cytoplasmic sequestration of core subunits located outside the tail triad. In addition, and contrary to current models, we provide evidence that Hsf1 can recruit the CKM independently of core Mediator and that core Mediator has a role in regulating postinitiation events. Collectively, our results suggest that yeast Mediator is not monolithic but potentially has a dynamic complexity heretofore unappreciated. Multiple species, including CKM-Mediator, the 21-subunit core complex, the Med2-Med3-Med15 tail triad, and the four-subunit CKM, can be independently recruited by activated Hsf1 to its target genes in AA strains. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  14. Number of Waste Package Hit by Igneous Intrusion

    International Nuclear Information System (INIS)

    M. Wallace

    2004-01-01

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios

  15. How multiplicity determines entropy and the derivation of the maximum entropy principle for complex systems.

    Science.gov (United States)

    Hanel, Rudolf; Thurner, Stefan; Gell-Mann, Murray

    2014-05-13

    The maximum entropy principle (MEP) is a method for obtaining the most likely distribution functions of observables from statistical systems by maximizing entropy under constraints. The MEP has found hundreds of applications in ergodic and Markovian systems in statistical mechanics, information theory, and statistics. For several decades there has been an ongoing controversy over whether the notion of the maximum entropy principle can be extended in a meaningful way to nonextensive, nonergodic, and complex statistical systems and processes. In this paper we start by reviewing how Boltzmann-Gibbs-Shannon entropy is related to multiplicities of independent random processes. We then show how the relaxation of independence naturally leads to the most general entropies that are compatible with the first three Shannon-Khinchin axioms, the (c,d)-entropies. We demonstrate that the MEP is a perfectly consistent concept for nonergodic and complex statistical systems if their relative entropy can be factored into a generalized multiplicity and a constraint term. The problem of finding such a factorization reduces to finding an appropriate representation of relative entropy in a linear basis. In a particular example we show that path-dependent random processes with memory naturally require specific generalized entropies. The example is to our knowledge the first exact derivation of a generalized entropy from the microscopic properties of a path-dependent random process.

  16. Managing Multiple Sources of Competitive Advantage in a Complex Competitive Environment

    Directory of Open Access Journals (Sweden)

    Alexandre Howard Henry Lapersonne

    2013-12-01

    Full Text Available The aim of this article is to review the literature on the topic of sustained and temporary competitive advantage creation, specifically in dynamic markets, and to propose further research possibilities. After having analyzed the main trends and scholars’ works on the subject, it was concluded that a firm which has been experiencing erosion of its core sources of economic rent generation, should have diversified its strategy portfolio in a search for new sources of competitive advantage, ones that could compensate for the decline of profits provoked by intensive competitive environments. This review concludes with the hypothesis that firms, who have decided to enter and manage multiple competitive environments, should have developed a multiple strategies framework approach. The management of this source of competitive advantage portfolio should have allowed persistence of a firm’s superior economic performance through the management of diverse temporary advantages lifecycle and through a resilient effect, where a very successful source of competitive advantage compensates the ones that have been eroded. Additionally, the review indicates that economies of emerging countries, such as the ones from the BRIC block, should present a more complex competitive environment due to their historical nature of cultural diversity, social contrasts and frequent economic disruption, and also because of recent institutional normalization that has turned the market into hypercompetition. Consequently, the study of complex competition should be appropriate in such environments.

  17. Differential Effects of Munc18s on Multiple Degranulation-Relevant Trans-SNARE Complexes.

    Directory of Open Access Journals (Sweden)

    Hao Xu

    Full Text Available Mast cell exocytosis, which includes compound degranulation and vesicle-associated piecemeal degranulation, requires multiple Q- and R- SNAREs. It is not clear how these SNAREs pair to form functional trans-SNARE complexes and how these trans-SNARE complexes are selectively regulated for fusion. Here we undertake a comprehensive examination of the capacity of two Q-SNARE subcomplexes (syntaxin3/SNAP-23 and syntaxin4/SNAP-23 to form fusogenic trans-SNARE complexes with each of the four granule-borne R-SNAREs (VAMP2, 3, 7, 8. We report the identification of at least six distinct trans-SNARE complexes under enhanced tethering conditions: i VAMP2/syntaxin3/SNAP-23, ii VAMP2/syntaxin4/SNAP-23, iii VAMP3/syntaxin3/SNAP-23, iv VAMP3/syntaxin4/SNAP-23, v VAMP8/syntaxin3/SNAP-23, and vi VAMP8/syntaxin4/SNAP-23. We show for the first time that Munc18a operates synergistically with SNAP-23-based non-neuronal SNARE complexes (i to iv in lipid mixing, in contrast to Munc18b and c, which exhibit no positive effect on any SNARE combination tested. Pre-incubation with Munc18a renders the SNARE-dependent fusion reactions insensitive to the otherwise inhibitory R-SNARE cytoplasmic domains, suggesting a protective role of Munc18a for its cognate SNAREs. Our findings substantiate the recently discovered but unexpected requirement for Munc18a in mast cell exocytosis, and implicate post-translational modifications in Munc18b/c activation.

  18. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  19. Non-intrusive refractometer sensor

    Indian Academy of Sciences (India)

    An experimental realization of a simple non-intrusive refractometer sensor .... and after amplification is finally read by a digital multimeter (Fluke make: 179 true ... To study the response of the present FO refractometer, propylene glycol has been ... values of all the samples were initially measured by Abbe's refractometer.

  20. Zero Trust Intrusion Containment for Telemedicine

    National Research Council Canada - National Science Library

    Sood, Arun

    2002-01-01

    .... Our objective is the design and analysis of 'zero-trust' Intrusion Tolerant Systems. These are systems built under the extreme assumption that all intrusion detection techniques will eventually fail...

  1. Intrusive luxation of 60 permanent incisors

    DEFF Research Database (Denmark)

    Tsilingaridis, Georgios; Malmgren, Barbro; Andreasen, Jens O

    2012-01-01

    Intrusive luxation in the permanent dentition is an uncommon injury but it is considered one of the most severe types of dental trauma because of the risk for damage to the periodontal ligament, pulp and alveolar bone. Management of intrusive luxation in the permanent dentition is controversial....... The purpose of this study was to evaluate pulp survival and periodontal healing in intrusive luxated permanent teeth in relation to treatment alternatives, degree of intrusion and root development....

  2. Stress reaction process-based hierarchical recognition algorithm for continuous intrusion events in optical fiber prewarning system

    Science.gov (United States)

    Qu, Hongquan; Yuan, Shijiao; Wang, Yanping; Yang, Dan

    2018-04-01

    To improve the recognition performance of optical fiber prewarning system (OFPS), this study proposed a hierarchical recognition algorithm (HRA). Compared with traditional methods, which employ only a complex algorithm that includes multiple extracted features and complex classifiers to increase the recognition rate with a considerable decrease in recognition speed, HRA takes advantage of the continuity of intrusion events, thereby creating a staged recognition flow inspired by stress reaction. HRA is expected to achieve high-level recognition accuracy with less time consumption. First, this work analyzed the continuity of intrusion events and then presented the algorithm based on the mechanism of stress reaction. Finally, it verified the time consumption through theoretical analysis and experiments, and the recognition accuracy was obtained through experiments. Experiment results show that the processing speed of HRA is 3.3 times faster than that of a traditional complicated algorithm and has a similar recognition rate of 98%. The study is of great significance to fast intrusion event recognition in OFPS.

  3. Low-Complexity Multiple Description Coding of Video Based on 3D Block Transforms

    Directory of Open Access Journals (Sweden)

    Andrey Norkin

    2007-02-01

    Full Text Available The paper presents a multiple description (MD video coder based on three-dimensional (3D transforms. Two balanced descriptions are created from a video sequence. In the encoder, video sequence is represented in a form of coarse sequence approximation (shaper included in both descriptions and residual sequence (details which is split between two descriptions. The shaper is obtained by block-wise pruned 3D-DCT. The residual sequence is coded by 3D-DCT or hybrid, LOT+DCT, 3D-transform. The coding scheme is targeted to mobile devices. It has low computational complexity and improved robustness of transmission over unreliable networks. The coder is able to work at very low redundancies. The coding scheme is simple, yet it outperforms some MD coders based on motion-compensated prediction, especially in the low-redundancy region. The margin is up to 3 dB for reconstruction from one description.

  4. A chimera grid scheme. [multiple overset body-conforming mesh system for finite difference adaptation to complex aircraft configurations

    Science.gov (United States)

    Steger, J. L.; Dougherty, F. C.; Benek, J. A.

    1983-01-01

    A mesh system composed of multiple overset body-conforming grids is described for adapting finite-difference procedures to complex aircraft configurations. In this so-called 'chimera mesh,' a major grid is generated about a main component of the configuration and overset minor grids are used to resolve all other features. Methods for connecting overset multiple grids and modifications of flow-simulation algorithms are discussed. Computational tests in two dimensions indicate that the use of multiple overset grids can simplify the task of grid generation without an adverse effect on flow-field algorithms and computer code complexity.

  5. Merging for Particle-Mesh Complex Particle Kinetic Modeling of the Multiple Plasma Beams

    Science.gov (United States)

    Lipatov, Alexander S.

    2011-01-01

    We suggest a merging procedure for the Particle-Mesh Complex Particle Kinetic (PMCPK) method in case of inter-penetrating flow (multiple plasma beams). We examine the standard particle-in-cell (PIC) and the PMCPK methods in the case of particle acceleration by shock surfing for a wide range of the control numerical parameters. The plasma dynamics is described by a hybrid (particle-ion-fluid-electron) model. Note that one may need a mesh if modeling with the computation of an electromagnetic field. Our calculations use specified, time-independent electromagnetic fields for the shock, rather than self-consistently generated fields. While a particle-mesh method is a well-verified approach, the CPK method seems to be a good approach for multiscale modeling that includes multiple regions with various particle/fluid plasma behavior. However, the CPK method is still in need of a verification for studying the basic plasma phenomena: particle heating and acceleration by collisionless shocks, magnetic field reconnection, beam dynamics, etc.

  6. Use of multiple singular value decompositions to analyze complex intracellular calcium ion signals

    KAUST Repository

    Martinez, Josue G.

    2009-12-01

    We compare calcium ion signaling (Ca(2+)) between two exposures; the data are present as movies, or, more prosaically, time series of images. This paper describes novel uses of singular value decompositions (SVD) and weighted versions of them (WSVD) to extract the signals from such movies, in a way that is semi-automatic and tuned closely to the actual data and their many complexities. These complexities include the following. First, the images themselves are of no interest: all interest focuses on the behavior of individual cells across time, and thus, the cells need to be segmented in an automated manner. Second, the cells themselves have 100+ pixels, so that they form 100+ curves measured over time, so that data compression is required to extract the features of these curves. Third, some of the pixels in some of the cells are subject to image saturation due to bit depth limits, and this saturation needs to be accounted for if one is to normalize the images in a reasonably un-biased manner. Finally, the Ca(2+) signals have oscillations or waves that vary with time and these signals need to be extracted. Thus, our aim is to show how to use multiple weighted and standard singular value decompositions to detect, extract and clarify the Ca(2+) signals. Our signal extraction methods then lead to simple although finely focused statistical methods to compare Ca(2+) signals across experimental conditions.

  7. Multiple biological complex of alkaline extract of the leaves of Sasa senanensis Rehder.

    Science.gov (United States)

    Sakagami, Hiroshi; Zhou, Li; Kawano, Michiyo; Thet, May Maw; Tanaka, Shoji; Machino, Mamoru; Amano, Shigeru; Kuroshita, Reina; Watanabe, Shigeru; Chu, Qing; Wang, Qin-Tao; Kanamoto, Taisei; Terakubo, Shigemi; Nakashima, Hideki; Sekine, Keisuke; Shirataki, Yoshiaki; Zhang, Chang-Hao; Uesawa, Yoshihiro; Mohri, Kiminori; Kitajima, Madoka; Oizumi, Hiroshi; Oizumi, Takaaki

    2010-01-01

    Previous studies have shown anti-inflammatory potential of alkaline extract of the leaves of Sasa senanensis Rehder (SE). The aim of the present study was to clarity the molecular entity of SE, using various fractionation methods. SE inhibited the production of nitric oxide (NO), but not tumour necrosis factor-α by lipopolysaccharide (LPS)-stimulated mouse macrophage-like cells. Lignin carbohydrate complex prepared from SE inhibited the NO production to a comparable extent with SE, whereas chlorophyllin was more active. On successive extraction with organic solvents, nearly 90% of SE components, including chlorophyllin, were recovered from the aqueous layer. Anti-HIV activity of SE was comparable with that of lignin-carbohydrate complex, and much higher than that of chlorophyllin and n-butanol extract fractions. The CYP3A inhibitory activity of SE was significantly lower than that of grapefruit juice and chlorophyllin. Oral administration of SE slightly reduced the number of oral bacteria. When SE was applied to HPLC, nearly 70% of SE components were eluted as a single peak. These data suggest that multiple components of SE may be associated with each other in the native state or after extraction with alkaline solution.

  8. Mediator independently orchestrates multiple steps of preinitiation complex assembly in vivo.

    Science.gov (United States)

    Eyboulet, Fanny; Wydau-Dematteis, Sandra; Eychenne, Thomas; Alibert, Olivier; Neil, Helen; Boschiero, Claire; Nevers, Marie-Claire; Volland, Hervé; Cornu, David; Redeker, Virginie; Werner, Michel; Soutourina, Julie

    2015-10-30

    Mediator is a large multiprotein complex conserved in all eukaryotes, which has a crucial coregulator function in transcription by RNA polymerase II (Pol II). However, the molecular mechanisms of its action in vivo remain to be understood. Med17 is an essential and central component of the Mediator head module. In this work, we utilised our large collection of conditional temperature-sensitive med17 mutants to investigate Mediator's role in coordinating preinitiation complex (PIC) formation in vivo at the genome level after a transfer to a non-permissive temperature for 45 minutes. The effect of a yeast mutation proposed to be equivalent to the human Med17-L371P responsible for infantile cerebral atrophy was also analyzed. The ChIP-seq results demonstrate that med17 mutations differentially affected the global presence of several PIC components including Mediator, TBP, TFIIH modules and Pol II. Our data show that Mediator stabilizes TFIIK kinase and TFIIH core modules independently, suggesting that the recruitment or the stability of TFIIH modules is regulated independently on yeast genome. We demonstrate that Mediator selectively contributes to TBP recruitment or stabilization to chromatin. This study provides an extensive genome-wide view of Mediator's role in PIC formation, suggesting that Mediator coordinates multiple steps of a PIC assembly pathway. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  9. Complex Dynamics in a Triopoly Game with Multiple Delays in the Competition of Green Product Level

    Science.gov (United States)

    Si, Fengshan; Ma, Junhai

    Research on the output game behavior of oligopoly has greatly advanced in recent years. But many unknowns remain, particularly the influence of consumers’ willingness to buy green products on the oligopoly output game. This paper constructs a triopoly output game model with multiple delays in the competition of green products. The influence of the parameters on the stability and complexity of the system is studied by analyzing the existence and local asymptotic stability of the equilibrium point. It is found that the system loses stability and increases complexity if delay parameters exceed a certain range. In the unstable or chaotic game market, the decisions of oligopoly will be counterproductive. It is also observed that the influence of weight and output adjustment speed on the firm itself is obviously stronger than the influence of other firms. In addition, it is important that weight and output adjustment speed cannot increase indefinitely, otherwise it will bring unnecessary losses to the firm. Finally, chaos control is realized by using the variable feedback control method. The research results of this paper can provide a reference for decision-making for the output of the game of oligopoly.

  10. Adaptive Intrusion Data System (AIDS)

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems

  11. Genomic screening for dissection of a complex disease: The multiple sclerosis phenotype

    Energy Technology Data Exchange (ETDEWEB)

    Haines, J.L.; Bazyk, A.; Gusella, J.F. [Massachusetts General Hospital, Boston, MA (United States)] [and others

    1994-09-01

    Application of positional cloning to diseases with a complex etiology is fraught with problems. These include undefined modes of inheritance, heterogeneity, and epistasis. Although microsatellite markers now make genotyping the genome a straightforward task, no single analytical method is available to efficiently and accurately use these data for a complex disease. We have developed a multi-stage genomic screening strategy which uses a combination of non-parametric approaches (Affected Pedigree Member (APM) linkage analysis and robust sib pair analysis (SP)), and the parametric lod score approach (using four different genetic models). To warrant follow-up, a marker must have two or more of: a nominal P value of 0.05 or less on the non-parametric tests, or a lod score greater than 1.0 for any model. Two adjacent markers each fulfilling one criterion are also considered for follow-up. These criteria were determined both by simulation studies and our empirical experience in screening a large number of other disorders. We applied this approach to multiple sclerosis (MS), a complex neurological disorder with a strong but ill-defined genetic component. Analysis of the first 91 markers from our screen of 55 multiplex families found 5 markers which met the SP criteria, 13 markers which met the APM criteria, and 8 markers which met the lod score criteria. Five regions (on chromosomes 2, 4, 7, 14, and 19) met our overall criteria. However, no single method identified all of these regions, suggesting that each method is sensitive to various (unknown) influences. The chromosome 14 results were not supported by follow-up typing and analysis of markers in that region, but the chromosome 19 results remain well supported. Updated screening results will be presented.

  12. Intrusive Images in Psychological Disorders

    OpenAIRE

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in th...

  13. Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

    OpenAIRE

    Jiang, Hayang; Xie, Gaogang; Salamatian, Kavé; Mathy, Laurent

    2013-01-01

    Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. Both hardware accelerated and parallel software-based NIDS solutions, based on commodity multi-core and GPU processors, have been proposed to overcome these challenges. Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the relentless network link speed growth and increasing complexity of threats. ...

  14. Stress, intrusive imagery, and chronic distress

    International Nuclear Information System (INIS)

    Baum, A.

    1990-01-01

    Discusses the nature of stress in the context of problems with its definition and sources of confusion regarding its usefulness and specificity. Stress can be defined as a negative emotional experience accompanied by predictable biochemical, physiological, and behavioral changes that are directed toward adaptation either by manipulating the situation to alter the stressor or by accommodating its effects. Chronic stress is more complex than most definitions suggest and is clearly not limited to situations in which stressors persist for long periods of time. Responses may habituate before a stressor disappears or may persist long beyond the physical presence of the stressor. This latter case, in which chronic stress and associated biobehavioral changes outlast their original cause, is considered in light of research at Three Mile Island and among Vietnam veterans. The role of intrusive images of the stressor or uncontrollable thoughts about it in maintaining stress is explored

  15. Multiple complexes of nitrogen assimilatory enzymes in spinach chloroplasts: possible mechanisms for the regulation of enzyme function.

    Directory of Open Access Journals (Sweden)

    Yoko Kimata-Ariga

    Full Text Available Assimilation of nitrogen is an essential biological process for plant growth and productivity. Here we show that three chloroplast enzymes involved in nitrogen assimilation, glutamate synthase (GOGAT, nitrite reductase (NiR and glutamine synthetase (GS, separately assemble into distinct protein complexes in spinach chloroplasts, as analyzed by western blots under blue native electrophoresis (BN-PAGE. GOGAT and NiR were present not only as monomers, but also as novel complexes with a discrete size (730 kDa and multiple sizes (>120 kDa, respectively, in the stromal fraction of chloroplasts. These complexes showed the same mobility as each monomer on two-dimensional (2D SDS-PAGE after BN-PAGE. The 730 kDa complex containing GOGAT dissociated into monomers, and multiple complexes of NiR reversibly converted into monomers, in response to the changes in the pH of the stromal solvent. On the other hand, the bands detected by anti-GS antibody were present not only in stroma as a conventional decameric holoenzyme complex of 420 kDa, but also in thylakoids as a novel complex of 560 kDa. The polypeptide in the 560 kDa complex showed slower mobility than that of the 420 kDa complex on the 2D SDS-PAGE, implying the assembly of distinct GS isoforms or a post-translational modification of the same GS protein. The function of these multiple complexes was evaluated by in-gel GS activity under native conditions and by the binding ability of NiR and GOGAT with their physiological electron donor, ferredoxin. The results indicate that these multiplicities in size and localization of the three nitrogen assimilatory enzymes may be involved in the physiological regulation of their enzyme function, in a similar way as recently described cases of carbon assimilatory enzymes.

  16. Narrative exposure therapy: an evidence-based treatment for multiple and complex trauma

    Directory of Open Access Journals (Sweden)

    Ruud A. Jongedijk

    2014-12-01

    Full Text Available Narrative exposure therapy (NET is a recently developed, short-term treatment for patients with a posttraumatic stress disorder (PTSD as a result of multiple trauma. NET can be applied very successfully in patients with complex trauma complaints (Jongedijk, 2014; Schauer, Neuner, & Elbert, 2011.An important feature of NET is that trauma processing is never an isolated event but is always embedded in the context of a traumatic event and in the life history as a whole. At the start, the lifeline is laid. The lifeline is made up of a rope, with flowers (happy events, stones (traumatic events, sometimes candles (grief, or recently also sticks for aggressive acts (NET for offenders; see Stenmark, Cuneyt Guzey, Elbert, & Holen, 2014. These symbols are laid down along the rope, in chronological order. Subsequently, in the subsequent therapy sessions the lifeline is processed in chronological order, giving attention to all the important events a person has experienced in his or her life, both the adverse as well as the pleasurable ones. The narration ends with a written testimony.To date, there is good evidence NET is effective in the treatment of PTSD patients, with support from 18 RCTs (N=950. For culturally diverse populations, NET is recommended as the most evidence-based trauma treatment, besides culturally adapted CBT. NET has been investigated in different populations in Africa, Europe, and Asia. In Asia, research has been carried out in Sri Lanka as well as in China. In China, NET was conducted and investigated with survivors of the Sichuan earthquake (Zang, Hunt, & Cox, 2013, 2014. NET is understandable, even appealing and also supportive for patients with multiple trauma. In this presentation, the treatment principles and the practice of NET will be explained.

  17. Waste management under multiple complexities: Inexact piecewise-linearization-based fuzzy flexible programming

    International Nuclear Information System (INIS)

    Sun Wei; Huang, Guo H.; Lv Ying; Li Gongchen

    2012-01-01

    Highlights: ► Inexact piecewise-linearization-based fuzzy flexible programming is proposed. ► It’s the first application to waste management under multiple complexities. ► It tackles nonlinear economies-of-scale effects in interval-parameter constraints. ► It estimates costs more accurately than the linear-regression-based model. ► Uncertainties are decreased and more satisfactory interval solutions are obtained. - Abstract: To tackle nonlinear economies-of-scale (EOS) effects in interval-parameter constraints for a representative waste management problem, an inexact piecewise-linearization-based fuzzy flexible programming (IPFP) model is developed. In IPFP, interval parameters for waste amounts and transportation/operation costs can be quantified; aspiration levels for net system costs, as well as tolerance intervals for both capacities of waste treatment facilities and waste generation rates can be reflected; and the nonlinear EOS effects transformed from objective function to constraints can be approximated. An interactive algorithm is proposed for solving the IPFP model, which in nature is an interval-parameter mixed-integer quadratically constrained programming model. To demonstrate the IPFP’s advantages, two alternative models are developed to compare their performances. One is a conventional linear-regression-based inexact fuzzy programming model (IPFP2) and the other is an IPFP model with all right-hand-sides of fussy constraints being the corresponding interval numbers (IPFP3). The comparison results between IPFP and IPFP2 indicate that the optimized waste amounts would have the similar patterns in both models. However, when dealing with EOS effects in constraints, the IPFP2 may underestimate the net system costs while the IPFP can estimate the costs more accurately. The comparison results between IPFP and IPFP3 indicate that their solutions would be significantly different. The decreased system uncertainties in IPFP’s solutions demonstrate

  18. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...

  19. A theoretical characterization of multiple isomers of the He2I2 complex

    International Nuclear Information System (INIS)

    Valdés, Álvaro; Barragán, Patricia; Pérez de Tudela, Ricardo; Delgado-Tellez, Laura; Medina, Juan S.; Prosmiti, Rita

    2012-01-01

    Graphical abstract: Minimum energy path as a function of angle for planar (a) and non-planar (b) configurations. The probability distributions for the five lowest vibrational vdW states of He 2 I 2 are also depicted. Highlights: ► The work presented here is the most detailed description on intermolecular interactions and model structures for the He 2 I 2 cluster. ► The results obtained from high level ab initio calculations and exact quantum calculations. ► Comparison with available experimental data from similar He 2 -dihalogen complexes provides information on intermolecular forces. ► These findings contributes to evaluate our approaches for extending them to larger systems. ► Accurate PESs for small molecules interacting with He atoms are in demand for studying superfluidity in He nanodroplets. - Abstract: The present work has been directed at studying the structures and stabilization energetics of different conformers of the ground state He 2 I 2 cluster. The full interaction between I 2 molecule and the He atoms is obtained from a sum-of-potentials scheme, using an analytical He–I 2 potential parametrized to ab initio calculations plus the He–He interaction. Quantum mechanical variational calculations are carried out, and binding energies as well as radial/angular probability density distributions are computed for the lower-lying vibrational van der Waals states. We found that they correspond to three different structural models, namely tetrahedral, linear and ‘police-nightstick’. Comparison of these results with recent experimental data available from high-resolution spectroscopy for similar tetraatomic He 2 -dihalogen complexes, contributes to evaluate their relative stability, and provides information about the importance of the multiple minima (global and local) of the potential surface used.

  20. Episodic intrusion, internal differentiation, and hydrothermal alteration of the miocene tatoosh intrusive suite south of Mount Rainier, Washington

    Science.gov (United States)

    du Bray, E.A.; Bacon, C.R.; John, D.A.; Wooden, J.L.; Mazdab, F.K.

    2011-01-01

    The Miocene Tatoosh intrusive suite south of Mount Rainier is composed of three broadly granodioritic plutons that are manifestations of ancestral Cascades arc magmatism. Tatoosh intrusive suite plutons have individually diagnostic characteristics, including texture, mineralogy, and geochemistry, and apparently lack internal contacts. New ion-microprobe U-Pb zircon ages indicate crystallization of the Stevens pluton ca. 19.2 Ma, Reflection-Pyramid pluton ca. 18.5 Ma, and Nisqually pluton ca. 17.5 Ma. The Stevens pluton includes rare, statistically distinct ca. 20.1 Ma zircon antecrysts. Wide-ranging zircon rare earth element (REE), Hf, U, and Th concentrations suggest late crystallization from variably evolved residual liquids. Zircon Eu/Eu*-Hf covariation is distinct for each of the Reflection-Pyramid, Nisqually, and Stevens plutons. Although most Tatoosh intrusive suite rocks have been affected by weak hydrothermal alteration, and sparse mineralized veins cut some of these rocks, significant base or precious metal mineralization is absent. At the time of shallow emplacement, each of these magma bodies was largely homogeneous in bulk composition and petrographic features, but, prior to final solidification, each of the Tatoosh intrusive suite plutons developed internal compositional variation. Geochemical and petrographic trends within each pluton are most consistent with differential loss of residual melt, possibly represented by late aplite dikes or erupted as rhyolite, from crystal-rich magma. Crystal-rich magma that formed each pluton evidently accumulated in reservoirs below the present level of exposure and then intruded to a shallow depth. Assembled by episodic intrusion, the Tatoosh intrusive suite may be representative of midsized composite plutonic complexes beneath arc volcanoes. ?? 2011 Geological Society of America.

  1. Magmatic Diversity of the Wehrlitic Intrusions in the Oceanic Lower Crust of the Northern Oman Ophiolite

    Science.gov (United States)

    Kaneko, R.; Adachi, Y.; Miyashita, S.

    2014-12-01

    The Oman ophiolite extends along the east coast of Oman, and is the world's largest and best-preserved slice of obducted oceanic lithosphere. The magmatic history of this ophiolite is complex and is generally regarded as having occurred in three stages (MOR magmatism, subduction magmatism and intraplate magmatism). Wehrlitic intrusions constitute an important element of oceanic lower crust of the ophiolite, and numerous intrusions cut gabbro units in the northern Salahi block of this ophiolite. In this study area, we identified two different types of wehrlitic intrusions. One type of the intrusions mainly consists of dunite, plagioclase (Pl) wehrlite and mela-olivine (Ol) gabbro, in which the crystallization sequence is Ol followed by the contemporaneous crystallization of Pl and clinopyroxene (Cpx). This type is called "ordinary" wehrlitic intrusions and has similar mineral compositions to host gabbros (Adachi and Miyashita 2003; Kaneko et al. 2014). Another type of the intrusions is a single intrusion that crops out in an area 250 m × 150 m along Wadi Salahi. This intrusion consists of Pl-free "true" wehrlite, in which the crystallization sequence is Ol and then Cpx. The forsterite contents (Fo%) of Ol from the "ordinary" wehrlitic intrusions and "true" wehrlitic intrusions have ranges of 90.8-87.0 (NiO = 0.36-0.13 wt%) and 84.7 (NiO = 0.31 wt%), respectively. Cr numbers (Cr#) of Cr-spinel from the "true" wehrlitic intrusions show higher Cr# value of 0.85 than those of the "ordinary" wehrlitic intrusions (0.48-0.64). But the former is characterized by very high Fe3+ values (YFe3+ = 0.49-0.68). Kaneko et al. (2014) showed that the "ordinary" ubiquitous type has similar features to MOR magmatism and the depleted type in the Fizh block (Adachi and Miyashita 2003) links to subduction magmatism. These types are distinguished by their mineral chemistries (TiO2 and Na2O contents of Cpx). The TiO2 and Na2O contents of Cpx from the "true" wehrlitic intrusions have 0

  2. Multiple dimensions of transitions in complex socio-ecological systems - A case from China

    Science.gov (United States)

    Liu, Wei; Yang, Wu; Vina, Andres; Schröter, Dagmar; Liu, Jianguo

    2013-04-01

    Transitions in complex socio-ecological systems are intermediate phases between two successive and more stable periods or states and involve various societal, ecological, and biophysical changes that are often non-linear and inter-related. Understanding transitions is challenging but important for managing socio-ecological systems for achieving environmental sustainability and improving human well-being. Long-term and intensive research is warranted to disclose common patterns and mechanisms of socio-ecological transitions and to develop ideas and methods for studying and planning sustainable transitions. Based on a long-term research on human-nature relationships in Wolong Nature Reserve in China, we studied multiple concurrent social, economic, and ecological transitions during the last 15 years. As a UNESCO biosphere reserve, Wolong lies within a global biodiversity hotspot and a World Heritage site. It contains the largest populations of the world-famous endangered giant pandas and several thousand other animal and plant species. Like most nature reserves in China and many other developing countries, Wolong is also home to many local residents who undertake a variety of activities that involve interaction with ecosystem. For the majority of the 20th century, local people in Wolong lived under poverty line in a closed subsistence-based agricultural economy. Their demands on for wood (as fuel and raw materials) from the natural forests were high and resulted in severe deforestation, habitat degradation, and landslides. Since late 1990s, a series of major economic (e.g., tourism development) and environmental (e.g., payment for ecosystem services programs) policies have been implemented in the reserve as adaptive strategies to cope with poverty and ecological degradation. Within a decade, we have observed major transitions in land use (i.e., from extractive use to non-consumptive use), economic structure (i.e., from a subsistence-based agricultural economy to an

  3. Pukala intrusion, its age and connection to hydrothermal alteration in Orivesi, southwestern Finland

    Directory of Open Access Journals (Sweden)

    Matti Talikka

    2005-01-01

    Full Text Available The Pukala intrusion is situated in the Paleoproterozoic Svecofennian domain of the Fennoscandian Shield in the contact region between the Central Finland Granitoid Complex and the Tampere Belt. The acid subvolcanic intrusion, which is in contact or close to severalaltered domains, mainly consists of porphyritic granodiorite and trondhjemite. The Pukala intrusion was emplaced into volcanic sequence in an island-arc or fore-arc setting before or during the early stages of the main regional deformation phase of the Svecofennian orogeny. On the basis of the geochemical data, the Pukala intrusion is a peraluminous volcanic-arc granitoid. After crystallisation at 1896±3 Ma, multiphase deformation and metamorphismcaused alteration, recrystallisation, and orientation of the minerals, and tilted the intrusion steeply towards south. The 1851±5 Ma U-Pb age for titanite is connected to the late stages of the Svecofennian tectonometamorphic evolution of the region. Several hydrothermally altered domains are located in the felsic and intermediate metavolcanic rocks of the Tampere Belt within less than one kilometre south of the Pukala intrusion. Alteration is divided into three basic types: partial silica alteration, chlorite-sericite±silica alteration, and sericite alteration in shear zones. The first two types probably formed during the emplacement and crystallisation of the Pukala intrusion, and the third is linked to late shearing. Intense sericitisation and comb quartz bands in the contact of theintrusion and the altered domain at Kutemajärvi suggest that the hydrothermal system was driven by the Pukala intrusion.

  4. On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Pastro, Valerio

    2012-01-01

    We present a protocol that allows to prove in zero-knowledge that committed values xi, yi, zi, i = 1,…,l satisfy xiyi = zi, where the values are taken from a finite field. For error probability 2− u the size of the proof is linear in u and only logarithmic in l. Therefore, for any fixed error...... theoretically secure. Using this type of commitments we obtain, in the preprocessing model, a perfect zero-knowledge interactive proof for circuit satisfiability of circuit C where the proof has size O(|C|). We then generalize our basic scheme to a protocol that verifies l instances of an algebraic circuit D...... over K with v inputs, in the following sense: given committed values xi,j and zi, with i = 1,…,l and j = 1,…,v, the prover shows that D(xi,1,…,xi,v) = zi for i = 1,…,l. The interesting property is that the amortized complexity of verifying one circuit only depends on the multiplicative depth...

  5. MULTIPLE HUMAN TRACKING IN COMPLEX SITUATION BY DATA ASSIMILATION WITH PEDESTRIAN BEHAVIOR MODEL

    Directory of Open Access Journals (Sweden)

    W. Nakanishi

    2012-07-01

    Full Text Available A new method of multiple human tracking is proposed. The key concept is that to assume a tracking process as a data assimilation process. Despite the importance of understanding pedestrian behavior in public space with regard to achieving more sophisticated space design and flow control, automatic human tracking in complex situation is still challenging when people move close to each other or are occluded by others. For this difficulty, we stochastically combine existing tracking method by image processing with simulation models of walking behavior. We describe a system in a form of general state space model and define the components of the model according to the review on related works. Then we apply the proposed method to the data acquired at the ticket gate of the railway station. We show the high performance of the method, as well as compare the result with other model to present the advantage of integrating the behavior model to the tracking method. We also show the method's ability to acquire passenger flow information such as ticket gate choice and OD data automatically from the tracking result.

  6. Predicting Falls in People with Multiple Sclerosis: Fall History Is as Accurate as More Complex Measures

    Directory of Open Access Journals (Sweden)

    Michelle H. Cameron

    2013-01-01

    Full Text Available Background. Many people with MS fall, but the best method for identifying those at increased fall risk is not known. Objective. To compare how accurately fall history, questionnaires, and physical tests predict future falls and injurious falls in people with MS. Methods. 52 people with MS were asked if they had fallen in the past 2 months and the past year. Subjects were also assessed with the Activities-specific Balance Confidence, Falls Efficacy Scale-International, and Multiple Sclerosis Walking Scale-12 questionnaires, the Expanded Disability Status Scale, Timed 25-Foot Walk, and computerized dynamic posturography and recorded their falls daily for the following 6 months with calendars. The ability of baseline assessments to predict future falls was compared using receiver operator curves and logistic regression. Results. All tests individually provided similar fall prediction (area under the curve (AUC 0.60–0.75. A fall in the past year was the best predictor of falls (AUC 0.75, sensitivity 0.89, specificity 0.56 or injurious falls (AUC 0.69, sensitivity 0.96, specificity 0.41 in the following 6 months. Conclusion. Simply asking people with MS if they have fallen in the past year predicts future falls and injurious falls as well as more complex, expensive, or time-consuming approaches.

  7. Targeting MUC1-C suppresses polycomb repressive complex 1 in multiple myeloma.

    Science.gov (United States)

    Tagde, Ashujit; Markert, Tahireh; Rajabi, Hasan; Hiraki, Masayuki; Alam, Maroof; Bouillez, Audrey; Avigan, David; Anderson, Kenneth; Kufe, Donald

    2017-09-19

    The polycomb repressive complex 1 (PRC1) includes the BMI1, RING1 and RING2 proteins. BMI1 is required for survival of multiple myeloma (MM) cells. The MUC1-C oncoprotein is aberrantly expressed by MM cells, activates MYC and is also necessary for MM cell survival. The present studies show that targeting MUC1-C with (i) stable and inducible silencing and CRISPR/Cas9 editing and (ii) the pharmacologic inhibitor GO-203, which blocks MUC1-C function, downregulates BMI1, RING1 and RING2 expression. The results demonstrate that MUC1-C drives BMI1 transcription by a MYC-dependent mechanism. MUC1-C thus promotes MYC occupancy on the BMI1 promoter and thereby activates BMI1 expression. We also show that the MUC1-C→MYC pathway induces RING2 expression. Moreover, in contrast to BMI1 and RING2, we found that MUC1-C drives RING1 by an NF-κB p65-dependent mechanism. Targeting MUC1-C and thereby the suppression of these key PRC1 proteins was associated with downregulation of the PRC1 E3 ligase activity as evidenced by decreases in ubiquitylation of histone H2A. Targeting MUC1-C also resulted in activation of the PRC1-repressed tumor suppressor genes, PTEN, CDNK2A and BIM . These findings identify a heretofore unrecognized role for MUC1-C in the epigenetic regulation of MM cells.

  8. Stochastic production phase design for an open pit mining complex with multiple processing streams

    Science.gov (United States)

    Asad, Mohammad Waqar Ali; Dimitrakopoulos, Roussos; van Eldert, Jeroen

    2014-08-01

    In a mining complex, the mine is a source of supply of valuable material (ore) to a number of processes that convert the raw ore to a saleable product or a metal concentrate for production of the refined metal. In this context, expected variation in metal content throughout the extent of the orebody defines the inherent uncertainty in the supply of ore, which impacts the subsequent ore and metal production targets. Traditional optimization methods for designing production phases and ultimate pit limit of an open pit mine not only ignore the uncertainty in metal content, but, in addition, commonly assume that the mine delivers ore to a single processing facility. A stochastic network flow approach is proposed that jointly integrates uncertainty in supply of ore and multiple ore destinations into the development of production phase design and ultimate pit limit. An application at a copper mine demonstrates the intricacies of the new approach. The case study shows a 14% higher discounted cash flow when compared to the traditional approach.

  9. Intrusion scenarios in fusion waste disposal sites

    International Nuclear Information System (INIS)

    Zucchetti, M.; Zucchetti, M.; Rocco, P.

    1998-01-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  10. Intrusion scenarios in fusion waste disposal sites

    Energy Technology Data Exchange (ETDEWEB)

    Zucchetti, M. [European Commission, JRC, Institute for Advanced Material, Ispra, Vatican City State, Holy See (Italy); Zucchetti, M.; Rocco, P. [Energetics Dept., Polytechnic of Turin (Italy)

    1998-07-01

    Results of analyses on human intrusions into repositories of fusion radioactive waste are presented. The main topics are: duration of the institutional control, occurrence of intrusion, intrusion scenarios, acceptable risk limits and probabilistic data. Application to fusion waste repositories is implemented with a computational model: wells drilling is considered as the possible scenario. Doses and risks to intruder for different SEAFP-2 cases turn out to be very small. No intervention to reduce the hazard is necessary. (authors)

  11. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  12. An international perspective on Facebook intrusion.

    Science.gov (United States)

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. Intrusive Images in Psychological Disorders

    Science.gov (United States)

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  14. THE PALEOPROTEROZOIC IMANDRA-VARZUGA RIFTING STRUCTURE (KOLA PENINSULA: INTRUSIVE MAGMATISM AND MINERAGENY

    Directory of Open Access Journals (Sweden)

    V. V. Chashchin

    2014-01-01

    Full Text Available The article provides data on the structure of the Paleoproterozoic intercontinental Imandra-Varzuga rifting structure (IVS and compositions of intrusive formations typical of the early stage of the IVS development and associated mineral resources. IVS is located in the central part of the Kola region. Its length is about 350 km, and its width varies from 10 km at the flanks to 50 km in the central part. IVS contains an association of the sedimentary-volcanic, intrusive and dyke complexes. It is a part of a large igneous Paleoproterozoic province of the Fennoscandian Shield spreading for a huge area (about 1 million km2, which probably reflects the settings of the head part of the mantle plume. Two age groups of layered intrusions were associated with the initial stage of the IVS development. The layered intrusions of the Fedorovo-Pansky and Monchegorsk complexes (about 2.50 Ga are confined to the northern flank and the western closure of IVS, while intrusions of the Imandra complex (about 2.45 Ga are located at the southern flank of IVS. Intrusions of older complexes are composed of rock series from dunite to gabbro and anorthosites (Monchegorsk complex and from orthopyroxenite to gabbro and anorthosites (Fedorovo-Pansky complex. Some intrusions of this complexes reveal features of multiphase ones. The younger Imandra complex intrusions (about 2.45 Ga are stratified from orthopyroxenite to ferrogabbro. Their important feature is comagmatical connection with volcanites. All the intrusive complexes have the boninite-like mantle origin enriched by lithophyle components. Rocks of these two complexеs with different age have specific geochemical characteristics. In the rocks of the Monchegorsk and Fedorovo-Pansky complexes, the accumulation of REE clearly depends on the basicity of the rocks, the spectrum of REE is non-fractionated and ‘flat’, and the Eu positive anomaly is slightly manifested. In the rocks of the Imandra complex, the level of

  15. Multiple promoters and alternative splicing: Hoxa5 transcriptional complexity in the mouse embryo.

    Directory of Open Access Journals (Sweden)

    Yan Coulombe

    2010-05-01

    Full Text Available The genomic organization of Hox clusters is fundamental for the precise spatio-temporal regulation and the function of each Hox gene, and hence for correct embryo patterning. Multiple overlapping transcriptional units exist at the Hoxa5 locus reflecting the complexity of Hox clustering: a major form of 1.8 kb corresponding to the two characterized exons of the gene and polyadenylated RNA species of 5.0, 9.5 and 11.0 kb. This transcriptional intricacy raises the question of the involvement of the larger transcripts in Hox function and regulation.We have undertaken the molecular characterization of the Hoxa5 larger transcripts. They initiate from two highly conserved distal promoters, one corresponding to the putative Hoxa6 promoter, and a second located nearby Hoxa7. Alternative splicing is also involved in the generation of the different transcripts. No functional polyadenylation sequence was found at the Hoxa6 locus and all larger transcripts use the polyadenylation site of the Hoxa5 gene. Some larger transcripts are potential Hoxa6/Hoxa5 bicistronic units. However, even though all transcripts could produce the genuine 270 a.a. HOXA5 protein, only the 1.8 kb form is translated into the protein, indicative of its essential role in Hoxa5 gene function. The Hoxa6 mutation disrupts the larger transcripts without major phenotypic impact on axial specification in their expression domain. However, Hoxa5-like skeletal anomalies are observed in Hoxa6 mutants and these defects can be explained by the loss of expression of the 1.8 kb transcript. Our data raise the possibility that the larger transcripts may be involved in Hoxa5 gene regulation.Our observation that the Hoxa5 larger transcripts possess a developmentally-regulated expression combined to the increasing sum of data on the role of long noncoding RNAs in transcriptional regulation suggest that the Hoxa5 larger transcripts may participate in the control of Hox gene expression.

  16. Multiple geographic origins of commensalism and complex dispersal history of Black Rats.

    Science.gov (United States)

    Aplin, Ken P; Suzuki, Hitoshi; Chinen, Alejandro A; Chesser, R Terry; Ten Have, José; Donnellan, Stephen C; Austin, Jeremy; Frost, Angela; Gonzalez, Jean Paul; Herbreteau, Vincent; Catzeflis, Francois; Soubrier, Julien; Fang, Yin-Ping; Robins, Judith; Matisoo-Smith, Elizabeth; Bastos, Amanda D S; Maryanto, Ibnu; Sinaga, Martua H; Denys, Christiane; Van Den Bussche, Ronald A; Conroy, Chris; Rowe, Kevin; Cooper, Alan

    2011-01-01

    The Black Rat (Rattus rattus) spread out of Asia to become one of the world's worst agricultural and urban pests, and a reservoir or vector of numerous zoonotic diseases, including the devastating plague. Despite the global scale and inestimable cost of their impacts on both human livelihoods and natural ecosystems, little is known of the global genetic diversity of Black Rats, the timing and directions of their historical dispersals, and the risks associated with contemporary movements. We surveyed mitochondrial DNA of Black Rats collected across their global range as a first step towards obtaining an historical genetic perspective on this socioeconomically important group of rodents. We found a strong phylogeographic pattern with well-differentiated lineages of Black Rats native to South Asia, the Himalayan region, southern Indochina, and northern Indochina to East Asia, and a diversification that probably commenced in the early Middle Pleistocene. We also identified two other currently recognised species of Rattus as potential derivatives of a paraphyletic R. rattus. Three of the four phylogenetic lineage units within R. rattus show clear genetic signatures of major population expansion in prehistoric times, and the distribution of particular haplogroups mirrors archaeologically and historically documented patterns of human dispersal and trade. Commensalism clearly arose multiple times in R. rattus and in widely separated geographic regions, and this may account for apparent regionalism in their associated pathogens. Our findings represent an important step towards deeper understanding the complex and influential relationship that has developed between Black Rats and humans, and invite a thorough re-examination of host-pathogen associations among Black Rats.

  17. Combined therapies to treat complex diseases: The role of the gut microbiota in multiple sclerosis.

    Science.gov (United States)

    Calvo-Barreiro, Laura; Eixarch, Herena; Montalban, Xavier; Espejo, Carmen

    2018-02-01

    The commensal microbiota has emerged as an environmental risk factor for multiple sclerosis (MS). Studies in experimental autoimmune encephalomyelitis (EAE) models have shown that the commensal microbiota is an essential player in triggering autoimmune demyelination. Likewise, the commensal microbiota modulates the host immune system, alters the integrity and function of biological barriers and has a direct effect on several types of central nervous system (CNS)-resident cells. Moreover, a characteristic gut dysbiosis has been recognized as a consistent feature during the clinical course of MS, and the MS-related microbiota is gradually being elucidated. This review highlights animal studies in which commensal microbiota modulation was tested in EAE, as well as the mechanisms of action and influence of the commensal microbiota not only in the local milieu but also in the innate and adaptive immune system and the CNS. Regarding human research, this review focuses on studies that show how the commensal microbiota might act as a pathogenic environmental risk factor by directing immune responses towards characteristic pathogenic profiles of MS. We speculate how specific microbiome signatures could be obtained and used as potential pathogenic events and biomarkers for the clinical course of MS. Finally, we review recently published and ongoing clinical trials in MS patients regarding the immunomodulatory properties exerted by some microorganisms. Because MS is a complex disease with a large variety of associated environmental risk factors, we suggest that current treatments combined with strategies that modulate the commensal microbiota would constitute a broader immunotherapeutic approach and improve the clinical outcome for MS patients. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Scripted collaboration in serious gaming for complex learning: Effects of multiple perspectives when acquiring water management skills

    NARCIS (Netherlands)

    Hummel, Hans; Van Houcke, Jasper; Nadolski, Rob; Van der Hiele, Tony; Kurvers, Hub; Löhr, Ansje

    2010-01-01

    Hummel, H. G. K., Van Houcke, J., Nadolski, R. J., Van der Hiele, T., Kurvers, H., & Löhr, A. (2011). Scripted collaboration in gaming for complex learning: Effects of multiple perspectives when acquiring water management skills. British Journal of Educational Technology, 42(6),

  19. Mathematics Teachers' Visualization of Complex Number Multiplication and the Roots of Unity in a Dynamic Geometry Environment

    Science.gov (United States)

    Caglayan, Gunhan

    2016-01-01

    This qualitative research, drawing on the theoretical frameworks by Even (1990, 1993) and Sfard (2007), investigated five high school mathematics teachers' geometric interpretations of complex number multiplication along with the roots of unity. The main finding was that mathematics teachers constructed the modulus, the argument, and the conjugate…

  20. Intrusive and Non-Intrusive Load Monitoring (A Survey

    Directory of Open Access Journals (Sweden)

    Marco Danilo Burbano Acuña

    2015-05-01

    Full Text Available There is not discussion about the need of energyconservation, it is well known that energy resources are limitedmoreover the global energy demands will double by the end of2030, which certainly will bring implications on theenvironment and hence to all of us.Non-Intrusive load monitoring (NILM is the process ofrecognize electrical devices and its energy consumption basedon whole home electric signals, where this aggregated load datais acquired from a single point of measurement outside thehousehold. The aim of this approach is to get optimal energyconsumption and avoid energy wastage. Intrusive loadmonitoring (ILM is the process of identify and locate singledevices through the use of sensing systems to support control,monitor and intervention of such devices. The aim of thisapproach is to offer a base for the development of importantapplications for remote and automatic intervention of energyconsumption inside buildings and homes as well. For generalpurposes this paper states a general framework of NILM andILM approaches.Appliance discerns can be tackled using approaches fromdata mining and machine learning, finding out the techniquesthat fit the best this requirements, is a key factor for achievingfeasible and suitable appliance load monitoring solutions. Thispaper presents common and interesting methods used.Privacy concerns have been one of the bigger obstacles forimplementing a widespread adoption of these solutions; despitethis fact, developed countries like those inside the EU and theUK have established a deadline for the implementation ofsmart meters in the whole country, whereas USA governmentstill struggles with the acceptance of this solution by itscitizens.The implementation of security over these approachesalong with fine-grained energy monitoring would lead to abetter public agreement of these solutions and hence a fasteradoption of such approaches. This paper reveals a lack ofsecurity over these approaches with a real scenario.

  1. Radiological risks due to intrusion into a deep bedrock repository

    International Nuclear Information System (INIS)

    Nordlinder, S.; Bergstroem, U.; Edlund, O.

    1999-01-01

    The Swedish concept for disposal of high-level waste is a deep (500 m) bedrock repository (SFL) protected by multiple barriers that isolate the waste from the environment for such a long time that the physical decay will cause a substantial reduction of the radioactivity. The aim of concentration and isolation of high-level waste is to reduce the radiation risk. Intrusion in the repository may introduce a small residual risk to individuals. A risk analysis was performed comprising dose assessment and probabilities of occurrence. Intrusions may be considered to take place either due to conscious actions or by actions without any knowledge about the repository. For conscious intrusion it may be assumed that there will be enough knowledge to manage the radiation situation in a professional manner. Several reasons for making inadvertent intrusion are possible. Independently of the purpose, the most probable initial way of coming into contact with the radioactive material is by deep drilling. Examples of causes for drilling could be general scientific purposes or exploitation of geothermal energy. Dose assessments were made for intrusion due to inclined drilling directly into a canister, and drilling near an initially malfunctioning canister from which radionuclides have leaked into the groundwater. For the former case, external pathways were considered due to exposure from a core of the canister with fuel and contaminated bore dust. The most common drilling method is with water flushing for removal of bore dust, which will not cause any substantial transfer of radionuclides to air. For the second case, it was assumed that there was a well in the vicinity. The only pathway considered was therefore consumption of water because it dominates the exposure. The highest dose rates to man were, as expected, obtained by drilling into the canister. Dose rates decrease with time after closure. During the first time the relatively short-lived radionuclides Cs-137 and Sr-90 give

  2. Clinically practical intensity modulation for complex head and neck lesions using multiple, static MLC fields

    International Nuclear Information System (INIS)

    Verhey, L.J.; Xia, P.; Akazawa, P.

    1997-01-01

    Purpose: A number of different beam delivery methods have been proposed for implementing intensity modulated radiotherapy (IMRT), including fixed gantry with multiple static MLC fields (MSMLC - often referred to as 'stop and shoot'), fixed gantry with dynamic MLC (DMLC), intensity modulated arc therapy (IMAT), Tomotherapy and Peacock MIMiC. Using two complex head and neck cases as examples, we have compared dose distributions achievable with 3-D conformal radiotherapy (3DCRT) to those which can be achieved using IMRT delivered with MSMLC, DMLC and Peacock MIMiC. The goal is to demonstrate the potential value of IMRT in the treatment of complex lesions in the head and neck and to determine whether MSMLC, the simplest of the proposed IMRT methods, can produce dose distributions which are competitive with dynamic IMRT methods and which can be implemented in clinically acceptable times. Materials and Methods: Two patients with nasopharyngeal carcinoma were selected from the archives of the Department of Radiation Oncology at the University of California, San Francisco (UCSF). These patients were previously planned and treated with CT-based 3-D treatment planning methods which are routinely used at UCSF, including non-axial beam directions and partial transmission blocks when indicated. The CT data tapes were then read into a test version of CORVUS, an inverse treatment planning program being developed by NOMOS Corporation, target volumes and critical normal structures were outlined on axial CT slices and dose goals and limits were defined for the targets and normal tissues of interest. Optimized dose plans were then obtained for each delivery method including MSMLC (4 or 5 hand-selected beams with 3 levels of intensity), DMLC (9 evenly spaced axial beams with 10 levels of intensity) and Peacock MIMiC (55 axial beams spanning 270 degrees with 10 levels of intensity). Dose-volume histograms (DVH's) for all IMRT plans were then compared with the 3DCRT plans. Treatment

  3. Human intrusion: issues concerning its assessment

    International Nuclear Information System (INIS)

    Grimwood, P.D.; Smith, G.M.

    1989-01-01

    The potential significance of human intrusion in the performance assessment of radioactive waste repositories has been increasingly recognized in recent years. It is however an area of assessment in which subjective judgments dominate. This paper identifies some of the issues involved. These include regulatory criteria, scenario development, probability assignment, consequence assessment and measures to mitigate human intrusion

  4. Universal principles governing multiple random searchers on complex networks: The logarithmic growth pattern and the harmonic law

    Science.gov (United States)

    Weng, Tongfeng; Zhang, Jie; Small, Michael; Harandizadeh, Bahareh; Hui, Pan

    2018-03-01

    We propose a unified framework to evaluate and quantify the search time of multiple random searchers traversing independently and concurrently on complex networks. We find that the intriguing behaviors of multiple random searchers are governed by two basic principles—the logarithmic growth pattern and the harmonic law. Specifically, the logarithmic growth pattern characterizes how the search time increases with the number of targets, while the harmonic law explores how the search time of multiple random searchers varies relative to that needed by individual searchers. Numerical and theoretical results demonstrate these two universal principles established across a broad range of random search processes, including generic random walks, maximal entropy random walks, intermittent strategies, and persistent random walks. Our results reveal two fundamental principles governing the search time of multiple random searchers, which are expected to facilitate investigation of diverse dynamical processes like synchronization and spreading.

  5. Outpatient physiotherapy and complex inpatient rehabilitation in multiple sclerosis patients: are there any differences?

    Czech Academy of Sciences Publication Activity Database

    Řasová, K.; Bartušková, T.; Rybníčková, M.; Dobrovodská, G.; Marková, M.; Jandová, D.; Zimová, D.; Bučilová, V.; Štětkářová, I.; Špaňhelová, S.; Kovari, M.; Cichy, B.; Krupová, M.; Vlčková, K.; Martinková, Patrícia

    2013-01-01

    Roč. 19, 11 Suppl. (2013), s. 116-116 ISSN 1352-4585. [Congress of the European-Committee-for-Treatment-and-Research-in-Multiple-Sclerosis /29./. 02.10.2013-05.10.2013, Copenhagen] Grant - others:Univerzita Karlova(CZ) Prvouk P34 Institutional support: RVO:67985807 Keywords : physiotherapy * multiple sclerosis Subject RIV: FH - Neurology

  6. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  7. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  8. Variable sulfur isotope composition of sulfides provide evidence for multiple sources of contamination in the Rustenburg Layered Suite, Bushveld Complex

    Science.gov (United States)

    Magalhães, Nivea; Penniston-Dorland, Sarah; Farquhar, James; Mathez, Edmond A.

    2018-06-01

    The Rustenburg Layered Suite (RLS) of the Bushveld Complex (BC) is famous for its platinum group element (PGE) ore, which is hosted in sulfides. The source of sulfur necessary to generate this type of mineralization is inferred to be the host rock of the intrusion. The RLS has a sulfur isotopic signature that indicates the presence of Archean surface-derived material (Δ33 S ≠ 0) in the magma. This signature, with an average value of Δ33 S = 0.112 ± 0.024 ‰, deviates from the expected Δ33 S value of the mantle of 0 ± 0.008 ‰. Previous work suggested that this signature is uniform throughout the RLS, which contrasts with radiogenic isotopes which vary throughout the igneous stratigraphy of the RLS. In this study, samples from key intervals within the igneous stratigraphy were analyzed, showing that Δ33 S values vary in the same stratigraphic levels as Sr and Nd isotopes. However, the variation is not consistent; in some levels there is a positive correlation and in others a negative correlation. This observation suggests that in some cases distinct magma pulses contained assimilated sulfur from different sources. Textural analysis shows no evidence for late addition of sulfur. These results also suggest that it is unlikely that large-scale assimilation and/or efficient mixing of host rock material in a single magma chamber occurred during emplacement. The data do not uniquely identify the source of sulfur in the different layers of the RLS, but the variation in sulfur isotope composition and its relationship to radiogenic isotope data calls for a reevaluation of the models for the formation and evolution of the RLS, which has the potential to impact the knowledge of how PGE deposits form.

  9. AdaBoost-based algorithm for network intrusion detection.

    Science.gov (United States)

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  10. Separation of compounds with multiple -OH groups from dilute aqueous solutions via complexation with organoboronate

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Tina Kuo Fung [Univ. of California, Berkeley, CA (United States)

    1992-05-01

    The complexing extractant agent investigated in this work is 3-nitrophenylboronic acid (NPBA) in its anionic form (NPB). NPBA and Aliquat 336 (quaternary amine) is dissolved in 2-ethyl-l-hexanol, and the extractant is contacted with aq. NaOH. Solutes investigated were 1,2-propanediol, glycerol, fructose, sorbitol and lactic acid. Batch extraction experiments were performed at 25°C. Partition coefficients, distribution ratios and loadings are reported for varying concentrations of solute and NPB. All solutes complexed with NPB-, with all complexes containing only one NPB- per complex. The 1:1 complexation constants for the solutes glycerol, fructose and sorbitol follow trends similar to complexation with B(OH)4- (aq.), i.e. the complexation constants increase with increasing number of -OH groups available for complexation. Assumption of 1:1 complex is not valid for 1, 2-propanediol, which showed overloading (more than one mole of solute complexed to one mole NPB-) at higher concentrations. The -OH group on the NPB- which is left uncomplexed after one solute molecule had bound to the other two -OH groups may be responsible for the overloading. Overloading is also observed in extraction of tactic acid, but through a different mechanism. It was found that TOMA+ can extract lactic acid to an extent comparable to the uptake of lactic acid by NPB-. The complexation is probably through formation of an acid-base ion pair. Losses of NPBA into the aqueous phase could lead to problems, poor economics in industrial separation processes. One way of overcoming this problem would be to incorporate the NPBA onto a solid support.

  11. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  12. Use of multiple singular value decompositions to analyze complex intracellular calcium ion signals

    KAUST Repository

    Martinez, Josue G.; Huang, Jianhua Z.; Burghardt, Robert C.; Barhoumi, Rola; Carroll, Raymond J.

    2009-01-01

    ) to extract the signals from such movies, in a way that is semi-automatic and tuned closely to the actual data and their many complexities. These complexities include the following. First, the images themselves are of no interest: all interest focuses

  13. The Sonju Lake layered intrusion, northeast Minnesota: Internal structure and emplacement history inferred from magnetic fabrics

    Science.gov (United States)

    Maes, S.M.; Tikoff, B.; Ferre, E.C.; Brown, P.E.; Miller, J.D.

    2007-01-01

    The Sonju Lake intrusion (SLI), in northeastern Minnesota, is a layered mafic complex of Keweenawan age (1096.1 ?? 0.8 Ma) related to the Midcontinent rift. The cumulate paragenesis of the intrusion is recognized as broadly similar to the Skaergaard intrusion, a classic example of closed-system differentiation of a tholeiitic mafic magma. The SLI represents nearly closed-system differentiation through bottom-up fractional crystallization. Geochemical studies have identified the presence of a stratabound, 50-100 m thick zone anomalously enriched in Au + PGE. Similar to the PGE reefs of the Skaergaard intrusion, this PGE-enriched zone is hosted within oxide gabbro cumulates, about two-third of the way up from the base of the intrusion. We present a petrofabric study using the anisotropy of magnetic susceptibility (AMS) to investigate the emplacement and flow patterns within the Sonju Lake intrusion. Petrographic and electron microprobe studies, combined with AMS and hysteresis measurements indicate the primary source of the magnetic signal is pseudo-single domain (PSD) magnetite or titanomagnetite. Low field AMS was measured at 32 sites within the Sonju Lake intrusion, which provided information about primary igneous fabrics. The magnetic fabrics in the layered series of the Sonju Lake intrusion are consistent with sub-horizontal to inclined emplacement of the intrusion and show evidence that the cumulate layers were deposited in a dynamic environment. Well-aligned magnetic lineations, consistently plunging shallowly toward the southwest, indicate the source of the magma is a vertical sill-like feeder, presumably located beneath the Finland granite. The Finland granite acted as a density trap for the Sonju Lake magmas, forcing lateral flow of magma to the northeast. The strongly oblate magnetic shape fabrics indicate the shallowly dipping planar fabrics were enhanced by compaction of the crystal mush. ?? 2007 Elsevier B.V. All rights reserved.

  14. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr

    2014-01-28

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user\\'s symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  15. Clinical vocabulary as a boundary object in multidisciplinary care management of multiple chemical sensitivity, a complex and chronic condition.

    Science.gov (United States)

    Sampalli, Tara; Shepherd, Michael; Duffy, Jack

    2011-04-14

    Research has shown that accurate and timely communication between multidisciplinary clinicians involved in the care of complex and chronic health conditions is often challenging. The domain knowledge for these conditions is heterogeneous, with poorly categorized, unstructured, and inconsistent clinical vocabulary. The potential of boundary object as a technique to bridge communication gaps is explored in this study. A standardized and controlled clinical vocabulary was developed as a boundary object in the domain of a complex and chronic health condition, namely, multiple chemical sensitivity, to improve communication among multidisciplinary clinicians. A convenience sample of 100 patients with a diagnosis of multiple chemical sensitivity, nine multidisciplinary clinicians involved in the care of patients with multiple chemical sensitivity, and 36 clinicians in the community participated in the study. Eighty-two percent of the multidisciplinary and inconsistent vocabulary was standardized using the Systematized Nomenclature of Medicine - Clinical Terms (SNOMED(®) CT as a reference terminology. Over 80% of the multidisciplinary clinicians agreed on the overall usefulness of having a controlled vocabulary as a boundary object. Over 65% of clinicians in the community agreed on the overall usefulness of the vocabulary. The results from this study are promising and will be further evaluated in the domain of another complex chronic condition, ie, chronic pain. The study was conducted as a preliminary analysis for developing a boundary object in a heterogeneous domain of knowledge.

  16. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr; Alouini, Mohamed-Slim

    2014-01-01

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user's symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  17. Identification and characterization of multiple emissive species in aggregated minor antenna complexes

    Czech Academy of Sciences Publication Activity Database

    Wahadoszamen, M.; Belgio, Erica; Rahman, M.A.; Ara, A.M.; Ruban, A.V.; van Grondelle, R.

    2016-01-01

    Roč. 1857, č. 12 (2016), s. 1917-1924 ISSN 0005-2728 Institutional support: RVO:61388971 Keywords : Light harvesting * Minor antenna complexes * Photoprotective energy dissipation Subject RIV: EE - Microbiology, Virology Impact factor: 4.932, year: 2016

  18. Mediator independently orchestrates multiple steps of preinitiation complex assembly in vivo

    OpenAIRE

    Eyboulet, Fanny; Wydau-Dematteis, Sandra; Eychenne, Thomas; Alibert, Olivier; Neil, Helen; Boschiero, Claire; Nevers, Marie-Claire; Volland, Herv?; Cornu, David; Redeker, Virginie; Werner, Michel; Soutourina, Julie

    2015-01-01

    Mediator is a large multiprotein complex conserved in all eukaryotes, which has a crucial coregulator function in transcription by RNA polymerase II (Pol II). However, the molecular mechanisms of its action in vivo remain to be understood. Med17 is an essential and central component of the Mediator head module. In this work, we utilised our large collection of conditional temperature-sensitive med17 mutants to investigate Mediator's role in coordinating preinitiation complex (PIC) formation i...

  19. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian

    2016-01-01

    and cryptographic hash functions is to reconsider and simplify the round function of the Knudsen-Nyberg cipher from 1995. The mapping F(x) := x3 is used as the main component there and is also the main component of our family of proposals called “MiMC”. We study various attack vectors for this construction and give...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  20. Alpha intrusion on ovenight polysomnogram

    Directory of Open Access Journals (Sweden)

    Nahapetian R

    2014-06-01

    Full Text Available No abstract available. Article truncated after 150 words. A 30 year-old Army veteran with a past medical history significant for chronic lumbar back pain stemming from a fall-from-height injury sustained in 2006 was referred to the sleep laboratory for evaluation of chronic fatigue and excessive daytime hypersomnolence. His Epworth sleepiness scale score was 16. He denied a history of snoring and witnessed apnea. Body Mass Index (BMI was 25.7 kg/m2. His main sleep related complaints were frequent nocturnal arousals, poor sleep quality, un-refreshing sleep, prolonged latency to sleep onset, and nightmares. An In-lab attended diagnostic polysomnogram was performed. Sleep efficiency was reduced (73% and overall arousal index was not significantly elevated (3.2 events/hour. The sleep study showed rapid eye movement (REM related sleep disordered breathing that did not meet diagnostic criteria for sleep apnea. There was no evidence for period limb movement disorder. However, the study was significant for alpha wave intrusion in stage N2 non-REM and stage ...

  1. Multiple complex odontomas and subsequent occurrence of an ossifying fibroma at the same site as the removed odontoma

    Directory of Open Access Journals (Sweden)

    Kou Matsuo

    2013-06-01

    Full Text Available We report a rare case of multiple complex odontomas and the subsequent occurrence of an ossifying fibroma at the same site as one of the removed odontomas. A 3-year-old Japanese boy presented three complex odontomas at the unerupted deciduous first and second molars and permanent first molar on the left side of the mandible. The two odontomas at the deciduous teeth were immediately extirpated, and, after 2 years of follow-up, the odontoma at the unerupted permanent first molar was removed. At the age of 7 years, a small odontoma surrounding the deciduous second molar emerged as a recurrence. When the patient was 9 years old, an ossifying fibroma occurred near the apex of the first premolar, i.e., the site where one of the original odontomas existed. Furthermore, a small radiopaque mass over the crown of the unerupted permanent second molar was observed at the age of 10 years; this mass was probably an additional fourth complex odontoma. This is not only a rare case report of ossifying fibroma associated with multiple complex odontomas but also a valuable time course observation of the development of such odontogenic tumors.

  2. Multiple domains of fission yeast Cdc19p (MCM2) are required for its association with the core MCM complex.

    Science.gov (United States)

    Sherman, D A; Pasion, S G; Forsburg, S L

    1998-07-01

    The members of the MCM protein family are essential eukaryotic DNA replication factors that form a six-member protein complex. In this study, we use antibodies to four MCM proteins to investigate the structure of and requirements for the formation of fission yeast MCM complexes in vivo, with particular regard to Cdc19p (MCM2). Gel filtration analysis shows that the MCM protein complexes are unstable and can be broken down to subcomplexes. Using coimmunoprecipitation, we find that Mis5p (MCM6) and Cdc21p (MCM4) are tightly associated with one another in a core complex with which Cdc19p loosely associates. Assembly of Cdc19p with the core depends upon Cdc21p. Interestingly, there is no obvious change in Cdc19p-containing MCM complexes through the cell cycle. Using a panel of Cdc19p mutants, we find that multiple domains of Cdc19p are required for MCM binding. These studies indicate that MCM complexes in fission yeast have distinct substructures, which may be relevant for function.

  3. [Intensive care treatment of traumatic brain injury in multiple trauma patients : Decision making for complex pathophysiology].

    Science.gov (United States)

    Trimmel, H; Herzer, G; Schöchl, H; Voelckel, W G

    2017-09-01

    Traumatic brain injury (TBI) and hemorrhagic shock due to uncontrolled bleeding are the major causes of death after severe trauma. Mortality rates are threefold higher in patients suffering from multiple injuries and additionally TBI. Factors known to impair outcome after TBI, namely hypotension, hypoxia, hypercapnia, acidosis, coagulopathy and hypothermia are aggravated by the extent and severity of extracerebral injuries. The mainstays of TBI intensive care may be, at least temporarily, contradictory to the trauma care concept for multiple trauma patients. In particular, achieving normotension in uncontrolled bleeding situations, maintenance of normocapnia in traumatic lung injury and thromboembolic prophylaxis are prone to discussion. Due to an ongoing uncertainty about the definition of normotensive blood pressure values, a cerebral perfusion pressure-guided cardiovascular management is of key importance. In contrast, there is no doubt that early goal directed coagulation management improves outcome in patients with TBI and multiple trauma. The timing of subsequent surgical interventions must be based on the development of TBI pathology; therefore, intensive care of multiple trauma patients with TBI requires an ongoing and close cooperation between intensivists and trauma surgeons in order to individualize patient care.

  4. Modeling complex effects of multiple environmental stresses on carbon dynamics of Mid-Atlantic temperate forests

    Science.gov (United States)

    Yude Pan; Richard Birdsey; John Hom; Kevin McCullough

    2007-01-01

    We used our GIS variant of the PnET-CN model to investigate changes of forest carbon stocks and fluxes in Mid-Atlantic temperate forests over the last century (1900-2000). Forests in this region are affected by multiple environmental changes including climate, atmospheric CO2 concentration, N deposition and tropospheric ozone, and extensive land disturbances. Our...

  5. Periodontal changes following molar intrusion with miniscrews

    Directory of Open Access Journals (Sweden)

    Shahin Bayani

    2015-01-01

    Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height.

  6. A Citizen's Guide to Vapor Intrusion Mitigation

    Science.gov (United States)

    This guide describes how vapor intrusion is the movement of chemical vapors from contaminated soil and groundwater into nearby buildings.Vapors primarily enter through openings in the building foundation or basement walls.

  7. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  8. Acknowledging the dilemmas of intrusive media

    DEFF Research Database (Denmark)

    Mathieu, David; Finger, Juliane; Dias, Patrcia

    2017-01-01

    Part of the stakeholder consultation addressed strategies that media audiences are developing to cope with pressures and intrusions in a changing media environment, characterised by digitalisation and interactive possibilities. We interviewed ten stakeholders representing interests such as content...... production, media literacy, media regulation, and activism. Consulting with these stakeholders left the impression that pressures and intrusions from media lack widespread acknowledgement, and that little is known about audiences’ strategies to cope with media. Even when intrusions are acknowledged, we find...... no consensual motivation, nor any clear avenue for action. Therefore, we have analysed different discursive positions that prevent acknowledging or taking action upon the pressures and intrusions that we presented to these stakeholders. The discursive positions are outlined below....

  9. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  10. Prevention and analysis of hacker's intrusion

    International Nuclear Information System (INIS)

    Liu Baoxu; An Dehai; Xu Rongsheng

    2000-01-01

    The author analyzes the behavior characteristics and relevant technologies about the hacker's intrusion, and gives some corresponding solutions pertinently. To the recent events about hackers, the author gives detailed introduction and puts forward the relevant advice and valuable consideration

  11. Dealing with Tight Couplings and Multiple Interactions in Complex Technological Systems

    DEFF Research Database (Denmark)

    Aanestad, M.; Jensen, Tina Blegind; Grisot, M.

    In this paper we discuss the challenges of dealing with interdependencies in complex assemblages of heterogeneous and interconnected information systems (IS), which we conceptualize as organizationwide information infrastructures. We draw on Perrow's studies of complex technological systems, where...... couplings between information systems, actors, and work practices in the hospital environment. The paper's main focus is on describing what it entails in practice to deal with these interdependencies during and after implementation. We emphasize the work of sorting out and dealing with various types...... interactions, mechanisms, and couplings are emphasized. We base our paper on an empirical case study from a Norwegian hospital, where a seemingly trivial project aimed at the introduction of scanners turned out to be more complex than expected. This we claim is partly due to the interdependencies and tight...

  12. Intrusion problematic during water supply systems’ operation

    OpenAIRE

    Jesus Mora-Rodriguez, P. Amparo López-Jimenez, Helena M. Ramos

    2011-01-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuse...

  13. The Complex Neutrosophic Soft Expert Relation and Its Multiple Attribute Decision-Making Method

    Directory of Open Access Journals (Sweden)

    Ashraf Al-Quran

    2018-01-01

    Full Text Available This paper introduces a novel soft computing technique, called the complex neutrosophic soft expert relation (CNSER, to evaluate the degree of interaction between two hybrid models called complex neutrosophic soft expert sets (CNSESs. CNSESs are used to represent two-dimensional data that are imprecise, uncertain, incomplete and indeterminate. Moreover, it has a mechanism to incorporate the parameter set and the opinions of all experts in one model, thus making it highly suitable for use in decision-making problems where the time factor plays a key role in determining the final decision. The complex neutrosophic soft expert set and complex neutrosophic soft expert relation are both defined. Utilizing the properties of CNSER introduced, an empirical study is conducted on the relationship between the variability of the currency exchange rate and Malaysian exports and the time frame (phase of the interaction between these two variables. This study is supported further by an algorithm to determine the type and the degree of this relationship. A comparison between different existing relations and CNSER to show the ascendancy of our proposed CNSER is provided. Then, the notion of the inverse, complement and composition of CNSERs along with some related theorems and properties are introduced. Finally, we define the symmetry, transitivity and reflexivity of CNSERs, as well as the equivalence relation and equivalence classes on CNSESs. Some interesting properties are also obtained.

  14. Problem-solving with multiple interdependent criteria: better solution to complex problems

    International Nuclear Information System (INIS)

    Carlsson, C.; Fuller, R.

    1996-01-01

    We consider multiple objective programming (MOP) problems with additive interdependencies, this is when the states of some chosen objective are attained through supportive or inhibitory feed-backs from several other objectives. MOP problems with independent objectives (when the cause-effect relations between the decision variables and the objectives are completely known) will be treated as special cases of the MOP in which we have interdependent objectives. We illustrate our ideas by a simple three-objective real-life problem

  15. Multiple D2 heteroreceptor complexes: new targets for treatment of schizophrenia

    Science.gov (United States)

    Borroto-Escuela, Dasiel O.; Pintsuk, Julia; Schäfer, Thorsten; Friedland, Kristina; Ferraro, Luca; Tanganelli, Sergio; Liu, Fang; Fuxe, Kjell

    2016-01-01

    The dopamine (DA) neuron system most relevant for schizophrenia is the meso-limbic-cortical DA system inter alia densely innervating subcortical limbic regions. The field of dopamine D2 receptors and schizophrenia changed markedly with the discovery of many types of D2 heteroreceptor complexes in subcortical limbic areas as well as the dorsal striatum. The results indicate that the D2 is a hub receptor which interacts not only with many other G protein-coupled receptors (GPCRs) including DA isoreceptors but also with ion-channel receptors, receptor tyrosine kinases, scaffolding proteins and DA transporters. Disturbances in several of these D2 heteroreceptor complexes may contribute to the development of schizophrenia through changes in the balance of diverse D2 homo- and heteroreceptor complexes mediating the DA signal, especially to the ventral striato-pallidal γ-aminobutyric acid (GABA) pathway. This will have consequences for the control of this pathway of the glutamate drive to the prefrontal cortex via the mediodorsal thalamic nucleus which can contribute to psychotic processes. Agonist activation of the A2A protomer in the A2A–D2 heteroreceptor complex inhibits D2 Gi/o mediated signaling but increases the D2 β-arrestin2 mediated signaling. Through this allosteric receptor–receptor interaction, the A2A agonist becomes a biased inhibitory modulator of the Gi/o mediated D2 signaling, which may the main mechanism for its atypical antipsychotic properties especially linked to the limbic A2A–D2 heterocomplexes. The DA and glutamate hypotheses of schizophrenia come together in the signal integration in D2–N-methyl-d-aspartate (NMDA) and A2A–D2–metabotropic glutamate receptor 5 (mGlu5) heteroreceptor complexes, especially in the ventral striatum. 5-Hydroxytryptamine 2A (5-HT2A)–D2 heteroreceptor complexes are special targets for atypical antipsychotics with high potency to block their 5-HT2A protomer signaling in view of the potential development of

  16. Multiple origins of elytral reticulation modifications in the west palearctic Agabus bipustulatus complex (coleoptera, dytiscidae.

    Directory of Open Access Journals (Sweden)

    Marcus K Drotz

    2010-02-01

    Full Text Available The Agabus bipustulatus complex includes one of Europe's most widely distributed and common diving beetles. This complex, which is known for its large morphological variation, has a complex demographic and altitudinal variation in elytral reticulation. The various depth of the reticulation imprint, both in smaller and larger meshes, results in both mat and shiny individuals, as well as intermediate forms. The West Palearctic lowland is inhabited by a sexually dimorphic form, with shiny males and mat females. In mountain regions, shiny individuals of both sexes are found intermixed with mat individuals or in pure populations in central and southern areas, whereas pure populations of mat individuals are exclusively found in the northern region at high altitude. Sexual selection is proposed as a driving force in shaping this variation. However, the occurrence of different types of reticulation in both sexes and disjunct geographical distribution patterns suggest an additional function of the reticulation. Here we investigate the phylogeographical history, genetic structure and reticulation variation of several named forms within the Agabus bipustulatus complex including A. nevadensis. The molecular analyses recognised several well-supported clades within the complex. Several of the named forms had two or more independent origins. Few south European populations were uniform in reticulation patterns, and the males were found to display large variation. Reticulation diversity and population genetic variability were clearly correlated to altitude, but no genetic differences were detected among populations with mixed or homogenous forms. Observed reduction in secondary reticulation in female and increased variance in male at high altitude in South Europe may be explained by the occurrence of an additional selective force, beside sexual selection. The combined effect of these selective processes is here demonstrated in an extreme case to generate

  17. Multiple origins of elytral reticulation modifications in the west palearctic Agabus bipustulatus complex (coleoptera, dytiscidae).

    Science.gov (United States)

    Drotz, Marcus K; Brodin, Tomas; Nilsson, Anders N

    2010-02-03

    The Agabus bipustulatus complex includes one of Europe's most widely distributed and common diving beetles. This complex, which is known for its large morphological variation, has a complex demographic and altitudinal variation in elytral reticulation. The various depth of the reticulation imprint, both in smaller and larger meshes, results in both mat and shiny individuals, as well as intermediate forms. The West Palearctic lowland is inhabited by a sexually dimorphic form, with shiny males and mat females. In mountain regions, shiny individuals of both sexes are found intermixed with mat individuals or in pure populations in central and southern areas, whereas pure populations of mat individuals are exclusively found in the northern region at high altitude. Sexual selection is proposed as a driving force in shaping this variation. However, the occurrence of different types of reticulation in both sexes and disjunct geographical distribution patterns suggest an additional function of the reticulation. Here we investigate the phylogeographical history, genetic structure and reticulation variation of several named forms within the Agabus bipustulatus complex including A. nevadensis. The molecular analyses recognised several well-supported clades within the complex. Several of the named forms had two or more independent origins. Few south European populations were uniform in reticulation patterns, and the males were found to display large variation. Reticulation diversity and population genetic variability were clearly correlated to altitude, but no genetic differences were detected among populations with mixed or homogenous forms. Observed reduction in secondary reticulation in female and increased variance in male at high altitude in South Europe may be explained by the occurrence of an additional selective force, beside sexual selection. The combined effect of these selective processes is here demonstrated in an extreme case to generate isolation barriers between

  18. An Online National Archive of Multiple-Choice Questions for Astro 101 and the Development of the Question Complexity Rubric

    Science.gov (United States)

    Cormier, S.; Prather, E.; Brissenden, G.

    2011-09-01

    We are developing a national archive of multiple-choice questions for use in the Astronomy 101 classroom. These questions are intended to supplement an instructor's implementation of Think-Pair-Share or for their assessment purposes (i.e., exams and homework). We are also developing the Question Complexity Rubric (QCR) to guide members of the Astro 101 teaching and learning community in assisting us with hierarchically ranking questions in this archive based on their conceptual complexity. Using the QCR, a score is assigned to differentiate each question based on the cognitive steps necessary to comprehensively explain the reasoning pathway to the correct answer. The lowest QCR score is given to questions with a reasoning pathway requiring only declarative knowledge. The highest QCR score is given to questions with a reasoning pathway that requires multiple connected cognitive steps. When completed, the online question archive will provide users with the utility to 1) use the QCR to score questions 2) search for and download questions based on topic and/or QCR score, and 3) add their own questions to the archive. Stop by our poster to test your skills at determining question complexity by trying out the QCR with our sample questions.

  19. Managing a complex project using a risk-risk multiple domain matrix

    International Nuclear Information System (INIS)

    Pointurier, C.; Marle, F.; Jaber, H.

    2014-01-01

    This communication aims at presenting a clustering methodology applied to a complex project consisting of the delivery of three interdependent subsystems. This enables small and complementary task forces to be constituted, enhancing the communication and coordination on transverse issues related to the complexity of the whole system. The problem is to gather and exploit data for such systems, with numerous and heterogeneous risks of different domains (product, process, organization). The method consists in regrouping actors through the clustering of the risks they own. The result is a highlight on important and transverse risk interdependencies, within and between projects. These should not be neglected in order to avoid potential severe issues, whether during the project or during the exploitation of its deliverable. An application on a real program of plant implementation in the CEA-DAM is presented, with a sensitivity analysis of the clustering results to the inputs and chosen configurations of the problem. (authors)

  20. Experimental and Theoretical Investigations of Infrared Multiple Photon Dissociation Spectra of Aspartic Acid Complexes with Zn2+ and Cd2.

    Science.gov (United States)

    Boles, Georgia C; Hightower, Randy L; Coates, Rebecca A; McNary, Christopher P; Berden, Giel; Oomens, Jos; Armentrout, P B

    2018-04-12

    Complexes of aspartic acid (Asp) cationized with Zn 2+ : Zn(Asp-H) + , Zn(Asp-H) + (ACN) where ACN = acetonitrile, and Zn(Asp-H) + (Asp); as well as with Cd 2+ , CdCl + (Asp), were examined by infrared multiple photon dissociation (IRMPD) action spectroscopy using light generated from a free electron laser. A series of low-energy conformers for each complex was found using quantum chemical calculations to identify the structures formed experimentally. The main binding motif observed for the heavy-metal complex, CdCl + (Asp)[N,CO,CO s ], is a charge-solvated, tridentate structure, where the metal center binds to the backbone amino group and carbonyl oxygens of the backbone and side-chain carboxylic acids. Likewise, the deprotonated Zn(Asp-H) + (ACN) and Zn(Asp-H) + (Asp) complexes show comparable [N,CO - ,CO s ](ACN) and [N,CO - ,CO s ][N,CO,CO s ] coordinations, respectively. Interestingly, there was only minor spectral evidence for the analogous Zn(Asp-H) + [N,CO - ,CO s ] binding motif, even though this species is predicted to be the lowest-energy conformer. Instead, rearrangement and partial dissociation of the amino acid are observed, as spectral features most consistent with the experimental spectrum are exhibited by a four-coordinate Zn(Asp-NH 4 ) + [CO 2 - ,CO s ](NH 3 ) complex. Analysis of the mechanistic pathway leading from the predicted lowest-energy conformer to the isobaric deaminated complex is explored theoretically. Further, comparison of the current work to that of Zn 2+ and Cd 2+ complexes of asparagine (Asn) allows additional conclusions regarding populated conformers and effects of carboxamide versus carboxylic acid binding to be drawn.

  1. Multiple Mating, Paternity and Complex Fertilisation Patterns in the Chokka Squid Loligo reynaudii.

    Directory of Open Access Journals (Sweden)

    Marie-Jose Naud

    Full Text Available Polyandry is widespread and influences patterns of sexual selection, with implications for sexual conflict over mating. Assessing sperm precedence patterns is a first step towards understanding sperm competition within a female and elucidating the roles of male- and female-controlled factors. In this study behavioural field data and genetic data were combined to investigate polyandry in the chokka squid Loligo reynaudii. Microsatellite DNA-based paternity analysis revealed multiple paternity to be the norm, with 79% of broods sired by at least two males. Genetic data also determined that the male who was guarding the female at the moment of sampling was a sire in 81% of the families tested, highlighting mate guarding as a successful male tactic with postcopulatory benefits linked to sperm deposition site giving privileged access to extruded egg strings. As females lay multiple eggs in capsules (egg strings wherein their position is not altered during maturation it is possible to describe the spatial / temporal sequence of fertilisation / sperm precedence There were four different patterns of fertilisation found among the tested egg strings: 1 unique sire; 2 dominant sire, with one or more rare sires; 3 randomly mixed paternity (two or more sires; and 4 a distinct switch in paternity occurring along the egg string. The latter pattern cannot be explained by a random use of stored sperm, and suggests postcopulatory female sperm choice. Collectively the data indicate multiple levels of male- and female-controlled influences on sperm precedence, and highlights squid as interesting models to study the interplay between sexual and natural selection.

  2. U-Pb age in zircon of intrusive granite at Acopiara complex, Crystal region, domain Central Ceara, Brazil; Idade U-PB em zircao de granito intrusivo no Complexo Acopiara, Regiao de Cristais, Dominio Ceara Central

    Energy Technology Data Exchange (ETDEWEB)

    Neri, T.F.O.; Hamelak, G.M.S.; Azevedo, L.R.; Mattos, I.C.; Verissimo, C.U.V.; Nogueira Neto, J.A., E-mail: neri@ufc.br [Universidade Federal do Ceara (UFC), Fortaleza (Brazil). Departamento de Geologia; Lima, M.N. [Universidade Federal de Goias (UFGO), Goiania, GO (Brazil). Curso de Geologia

    2015-07-01

    Granitic body mineralogically composed by two micas, located at Crystal region, Ceara Central domain and intruded into lithotypes from Acopiara complex, provided an age of ∼526 Ma, indicating important period of magma generation of granitic composition associated with crustal anatexia, during Paleozoic.

  3. THE COMPLEX TREATMENT OF THE PATIENT WITH MULTIPLE SPINE AND SPINAL CORD MALFORMATIONS

    Directory of Open Access Journals (Sweden)

    S. V. Vissarionov

    2011-01-01

    Full Text Available Clinical case of the patient with the congenital deformation of thoracic and lumbar parts of the spine due to multiple congenital anomalies of vertebrae (disturbance of formation, fusion and segmentation, a terminale filum lipoma at the level of L5, tethered cord, rightside lower leg monoparesis. Multistage surgical treatment was performed: removing of intracanal deformity, correction and stabilization of the deformity at the thoracic and lumbar part of the spine. Patient was followed up during 2,5 years after the last step of the surgical operation. No evidence of recurrence or neurological deterioration were observed.

  4. A vertical-energy-thresholding procedure for data reduction with multiple complex curves.

    Science.gov (United States)

    Jung, Uk; Jeong, Myong K; Lu, Jye-Chyi

    2006-10-01

    Due to the development of sensing and computer technology, measurements of many process variables are available in current manufacturing processes. It is very challenging, however, to process a large amount of information in a limited time in order to make decisions about the health of the processes and products. This paper develops a "preprocessing" procedure for multiple sets of complicated functional data in order to reduce the data size for supporting timely decision analyses. The data type studied has been used for fault detection, root-cause analysis, and quality improvement in such engineering applications as automobile and semiconductor manufacturing and nanomachining processes. The proposed vertical-energy-thresholding (VET) procedure balances the reconstruction error against data-reduction efficiency so that it is effective in capturing key patterns in the multiple data signals. The selected wavelet coefficients are treated as the "reduced-size" data in subsequent analyses for decision making. This enhances the ability of the existing statistical and machine-learning procedures to handle high-dimensional functional data. A few real-life examples demonstrate the effectiveness of our proposed procedure compared to several ad hoc techniques extended from single-curve-based data modeling and denoising procedures.

  5. DUNDRUM Restriction-Intrusion of Liberty Ladders (DRILL) Audit Toolkit

    LENUS (Irish Health Repository)

    Kennedy, Harry G

    2011-09-01

    This series of rating \\'ladders\\' is intended to allow a quantitative and qualitative analysis of the use of restrictive and intrusive interventions as part of the therapeutic management of violence and aggression in psychiatric hospital settings. This is an evolving handbook. The ladders are currently organised to facilitate a behavioural analysis. Context, antecedents, behaviour, interventions, consequences are conceptualised as a series of events organised in temporal sequence so that causes, interactions and effects can be considered. The complexity of analysis possible is limited by the statistical power of the numbers of cases and events available. \\r\

  6. Count out your intrusions: Effects of verbal encoding on intrusive memories

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.

    2009-01-01

    Peri-traumatic information processing is thought to affect the development of intrusive trauma memories. This study aimed to replicate and improve the study by Holmes, Brewin, and Hennessy (2004, Exp. 3) on the role of peri-traumatic verbal processing in analogue traumatic intrusion development.

  7. Multiple alteration events in the East Bull Lake anorthosite-gabbro layered complex, NE Ontario, Canada: evidence from fracture mineralogy and 40Ar-39Ar dating

    International Nuclear Information System (INIS)

    Kamineni, D.C.; McCrank, G.F.; Stone, D.; Geological Survey of Canada, Ottawa, Ontario)

    1987-01-01

    The East Bull Lake anorthosite-gabbro layered complex contains a variety of alteration minerals. Some of the more common ones are calcic amphiboles, biotite, epidote, adularia, quartz, chlorite, calcite, prehnite, pumpellyite, laumontite, gypsum, iron hydroxides and clays. The mode of occurrence and the data related to the stability of the alteration minerals suggest that they were formed under pressure-temperature conditions of: (1) epidote-amphibolite/greenschist facies; (2) prehnite-pumpellyite facies; (3) zeolite facies; and (4) low-temperature mineral facies. 40 Ar- 39 Ar data of hornblende and adularia indicate that the pluton is affected by distinct alteration events. Two mafic dyke intrusions, that overlap the alteration events, are recognised in the pluton. Synthesis of available radiometric ages suggests that the pluton intruded at 2472 +- 70 Ma, and was subjected to alteration as late as the Paleozoic and Cenozoic Eras. (author)

  8. Retrievals of Surface Air Temperature Using Multiple Satellite Data Combinations over Complex Terrain in the Korean Peninsula

    Science.gov (United States)

    Jang, K.; Won, M.; Yoon, S.; Lim, J.

    2016-12-01

    Surface air temperature (Tair) is a fundamental factor for terrestrial environments and plays a major role in the fields of applied meteorology, climatology, and ecology. The satellite remotely sensed data offers the opportunity to estimate Tair on the earth's surface with high spatial and temporal resolutions. The Moderate Resolution Imaging Spectroradiometer (MODIS) provides effective Tair retrievals although restricted to clear sky condition. MODIS Tair over complex terrain can result in significant retrieval errors due to the retrieval height mismatch to the elevation of local weather stations. In this study, we propose the methodology to estimate Tair over complex terrain for all sky conditions using multiple satellite data fusion based on the pixel-wise regression method. The combination of synergistic information from MODIS Tair and the brightness temperature (Tb) retrievals at 37 GHz frequency from the satellite microwave sensor were used for analysis. The air temperature lapse rate was applied to estimate the near-surface Tair considering the complex terrain such as mountainous regions. The retrieval results produced from this study showed a good agreement (RMSE Administration (KMA). The gaps in the MODIS Tair data due to cloud contamination were successfully filled using the proposed method which yielded similar accuracy as retrievals of clear sky. The results of this study indicate that the satellite data fusion can continuously produce Tair retrievals with reasonable accuracy and that the application of the temperature lapse rate can lead to improvement of the reliability over complex terrains such as the Korean Peninsula.

  9. Contribution to uranium geochemistry in intrusive granites

    International Nuclear Information System (INIS)

    Coulomb, R.

    1959-01-01

    This work aims to define the position of a certain number of French granitic deposits within the field of the geochemistry of granites in general, and of the geochemistry of uranium in particular. The regions concerned are: - 3 French Hercynian ranges, in the Vendee, in Brittany and in the Morvan, - 1 African range, probably precambrian, of the Hoggar. For each range, the petrochemical framework is first of all determined and then the degree of chemical homogeneity of the rocks is evaluated. In the petrochemical groups thus obtained the geochemical behaviour of the uranium is studied. From a point of view of the geochemistry of the granites under investigation, a comparison of the laws of distribution of the major elements in the 4 ranges shows up a convergence of average composition which was not anticipated by geological and petrographic considerations alone. The statistical and geochemical distribution laws of the total uranium as a function of the petrochemical variations are established. A study of the chemical forms of uranium in the rocks has drawn an attention to the qualitative and quantitative importance of the fraction of this uranium soluble in dilute acids. We have therefore reconsidered on the one hand, the laws of distribution of the insoluble uranium, which represents essentially the uranium fixed in crystalline structures (zircon, allanite...), and we have justified on the other hand the interest presented by the soluble uranium: this, although more complex in character, presents a geochemical unity in post magmatic phenomena which makes possible to find a genetic connection between the uraniferous deposits and the intrusive massifs. Finally we have given a plan of the geochemical cycle of uranium, in which we hope to have provided some more accurate data on the igneous phase. (author) [fr

  10. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  11. Multiple major histocompatibility complex class I genes in Asian anurans: Ontogeny and phylogeny.

    Science.gov (United States)

    Didinger, Chelsea; Eimes, John A; Lillie, Mette; Waldman, Bruce

    2017-05-01

    Amphibians, as the first terrestrial vertebrates, offer a window into early major histocompatibility complex (MHC) evolution. We characterized the MHC class I of two Korean amphibians, the Asiatic toad (Bufo gargarizans) and the Japanese tree frog (Hyla japonica). We found at least four transcribed MHC class I (MHC I) loci, the highest number confirmed in any anuran to date. Furthermore, we identified MHC I transcripts in terrestrial adults, and possibly in aquatic larvae, of both species. We conducted a phylogenetic analysis based on MHC I sequence data and found that B. gargarizans and H. japonica cluster together in the superfamily Nobleobatrachia. We further identified three supertypes shared by the two species. Our results reveal substantial variation in the number of MHC I loci in anurans and suggest that certain supertypes have particular physiochemical properties that may confer pathogen resistance. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. DEWA: A Multiaspect Approach for Multiple Face Detection in Complex Scene Digital Image

    Directory of Open Access Journals (Sweden)

    Setiawan Hadi

    2013-09-01

    Full Text Available A new approach for detecting faces in a digital image with unconstrained background has been developed. The approach is composed of three phases: segmentation phase, filtering phase and localization phase. In the segmentation phase, we utilized both training and non-training methods, which are implemented in user selectable color space. In the filtering phase, Minkowski addition-based objects removal has been used for image cleaning. In the last phase, an image processing method and a data mining method are employed for grouping and localizing objects, combined with geometric-based image analysis. Several experiments have been conducted using our special face database that consists of simple objects and complex objects. The experiment results demonstrated that the detection accuracy is around 90% and the detection speed is less than 1 second in average.

  13. Multiple Magma Batches Recorded in Tephra Deposits from the Toba Complex, Sumatra.

    Science.gov (United States)

    Pearce, N. J. G.; Westgate, J.; Gatti, E.

    2015-12-01

    The Toba Caldera Complex is the largest Quaternary caldera on Earth, and has generated three voluminous and compositionally similar rhyolitic tuffs, viz. the Oldest (OTT, 800 ka), Middle (MTT, ~500 ka) and Youngest Toba Tuffs (YTT, 75 ka). These tephra deposits are widespread across Indonesia, Malaysia, South China Sea, Sea of Bengal, India and Indian Ocean and provide useful stratigraphic markers in oceanic, lacustrine and terrestrial environments. Single shard trace element analysis of these deposits reveals the changing availability of different batches of magma through time, with Sr, Ba and Y contents defining 5 discrete magma populations in YTT, 4 populations in MTT and only a single, low Ba population in OTT. Within an individual eruption these populations are clearly distinct, but between eruptions (e.g. MTT and YTT) some of these populations overlap while others do not, indicating both the longevity (and/or continuous supply of fresh material) and evolution of these magma batches in the Toba Complex. Major element compositions of the different groups show equilibration at different pressures (based on Q'-Ab'-Or'), with the equilibration of low Ba populations at ~160 MPa, increasing to depths of ~210 MPa for the highest Ba population. The proportions of different populations of glass in distal YTT shows that relatively little of the high Ba population makes it into the distal record across India, and that this population appears to be over-represented in the proximal free glass and pumice from the caldera walls. This data may shed light on magma availability and tephra dispersal during the YTT eruption. Similarly, the glass composition of individual pumices from proximal deposits record regional, compositional and temporal differences in the erupted products. These show, for example, the apparent mingling of some of the magma batches and also that the high Ba population appears early (i.e. stratigraphically lower) in the northern caldera wall.

  14. Remaking collective knowledge: An analysis of the complex and multiple effects of inquiries into historical institutional child abuse.

    Science.gov (United States)

    Wright, Katie

    2017-12-01

    This article provides an overview and critical analysis of inquiries into historical institutional child abuse and examines their multiple functions and complex effects. The article takes a broadly international view but focuses primarily on Australia, the UK and Ireland, jurisdictions in which there have been major national inquiries. Drawing on sociological and other social science literature, it begins by considering the forms, functions, and purposes of inquiries. An overview of emergent concerns with institutional abuse in the 1980s and 1990s is then provided, followed by an examination of the response of many governments since that time in establishing inquiries. Key findings and recommendations are considered. The final sections of the article explore the evaluation of inquiries, both during their operation and in their aftermath. Policy change and legislative reform are discussed but the focus is on aspects often underplayed or overlooked, including an inquiry's credibility, its role in processes of knowledge production, and the part it plays in producing social and cultural shifts. In the context of growing numbers of inquiries across Western democracies, including the Australian Royal Commission into Institutional Responses to Child Sexual Abuse, it is argued that grasping the complexity of the inquiry mechanism, with its inherent tensions and its multiple effects, is crucial to evaluating inquiry outcomes. Copyright © 2017 The Author. Published by Elsevier Ltd.. All rights reserved.

  15. Multiple cell adhesion molecules shaping a complex nicotinic synapse on neurons.

    Science.gov (United States)

    Triana-Baltzer, Gallen B; Liu, Zhaoping; Gounko, Natalia V; Berg, Darwin K

    2008-09-01

    Neuroligin, SynCAM, and L1-CAM are cell adhesion molecules with synaptogenic roles in glutamatergic pathways. We show here that SynCAM is expressed in the chick ciliary ganglion, embedded in a nicotinic pathway, and, as shown previously for neuroligin and L1-CAM, acts transcellularly to promote synaptic maturation on the neurons in culture. Moreover, we show that electroporation of chick embryos with dominant negative constructs disrupting any of the three molecules in vivo reduces the total amount of presynaptic SV2 overlaying the neurons expressing the constructs. Only disruption of L1-CAM and neuroligin, however, reduces the number of SV2 puncta specifically overlaying nicotinic receptor clusters. Disrupting L1-CAM and neuroligin together produces no additional decrement, indicating that they act on the same subset of synapses. SynCAM may affect synaptic maturation rather than synapse formation. The results indicate that individual neurons can express multiple synaptogenic molecules with different effects on the same class of nicotinic synapses.

  16. Quantitative Analysis of Complex Multiple-Choice Items in Science Technology and Society: Item Scaling

    Directory of Open Access Journals (Sweden)

    Ángel Vázquez Alonso

    2005-05-01

    Full Text Available The scarce attention to assessment and evaluation in science education research has been especially harmful for Science-Technology-Society (STS education, due to the dialectic, tentative, value-laden, and controversial nature of most STS topics. To overcome the methodological pitfalls of the STS assessment instruments used in the past, an empirically developed instrument (VOSTS, Views on Science-Technology-Society have been suggested. Some methodological proposals, namely the multiple response models and the computing of a global attitudinal index, were suggested to improve the item implementation. The final step of these methodological proposals requires the categorization of STS statements. This paper describes the process of categorization through a scaling procedure ruled by a panel of experts, acting as judges, according to the body of knowledge from history, epistemology, and sociology of science. The statement categorization allows for the sound foundation of STS items, which is useful in educational assessment and science education research, and may also increase teachers’ self-confidence in the development of the STS curriculum for science classrooms.

  17. Heterogeneity in Multiple Sclerosis: Scratching the Surface of a Complex Disease

    Science.gov (United States)

    Disanto, Giulio; Berlanga, Antonio J.; Handel, Adam E.; Para, Andrea E.; Burrell, Amy M.; Fries, Anastasia; Handunnetthi, Lahiru; De Luca, Gabriele C.; Morahan, Julia M.

    2011-01-01

    Multiple Sclerosis (MS) is the most common demyelinating disease of the central nervous system. Although the etiology and the pathogenesis of MS has been extensively investigated, no single pathway, reliable biomarker, diagnostic test, or specific treatment have yet been identified for all MS patients. One of the reasons behind this failure is likely to be the wide heterogeneity observed within the MS population. The clinical course of MS is highly variable and includes several subcategories and variants. Moreover, apart from the well-established association with the HLA-class II DRB1*15:01 allele, other genetic variants have been shown to vary significantly across different populations and individuals. Finally both pathological and immunological studies suggest that different pathways may be active in different MS patients. We conclude that these “MS subtypes” should still be considered as part of the same disease but hypothesize that spatiotemporal effects of genetic and environmental agents differentially influence MS course. These considerations are extremely relevant, as outcome prediction and personalised medicine represent the central aim of modern research. PMID:21197462

  18. Evidential reasoning research on intrusion detection

    Science.gov (United States)

    Wang, Xianpei; Xu, Hua; Zheng, Sheng; Cheng, Anyu

    2003-09-01

    In this paper, we mainly aim at D-S theory of evidence and the network intrusion detection these two fields. It discusses the method how to apply this probable reasoning as an AI technology to the Intrusion Detection System (IDS). This paper establishes the application model, describes the new mechanism of reasoning and decision-making and analyses how to implement the model based on the synscan activities detection on the network. The results suggest that if only rational probability values were assigned at the beginning, the engine can, according to the rules of evidence combination and hierarchical reasoning, compute the values of belief and finally inform the administrators of the qualities of the traced activities -- intrusions, normal activities or abnormal activities.

  19. Infrared multiple photon dissociation spectroscopy of group I and group II metal complexes with Boc-hydroxylamine.

    Science.gov (United States)

    Dain, Ryan P; Gresham, Gary; Groenewold, Gary S; Steill, Jeffrey D; Oomens, Jos; Van Stipdonk, Michael J

    2013-08-30

    Hydroxamates are essential growth factors for some microbes, acting primarily as siderophores that solubilize iron for transport into a cell. Here we determined the intrinsic structure of 1:1 complexes between Boc-protected hydroxylamine and group I ([M(L)](+)) and group II ([M(L-H)](+)) cations, where M and L are the cation and ligand, respectively, which are convenient models for the functional unit of hydroxamate siderphores. The relevant complex ions were generated by electrospray ionization (ESI) and isolated and stored in a Fourier transform ion cyclotron resonance (FT-ICR) mass spectrometer. Infrared spectra of the isolated complexes were collected by monitoring (infrared) photodissociation yield as a function of photon energy. Experimental spectra were then compared to those predicted by density functional theory (DFT) calculations. The infrared multiple photon dissociation (IRMPD) spectra collected are in good agreement with those predicted to be lowest-energy by DFT. The spectra for the group I complexes contain six resolved absorptions that can be attributed to amide I and II type and hydroxylamine N-OH vibrations. Similar absorptions are observed for the group II cation complexes, with shifts of the amide I and amide II vibrations due to the change in structure with deprotonation of the hydroxylamine group. IRMPD spectroscopy unequivocally shows that the intrinsic binding mode for the group I cations involves the O atoms of the amide carbonyl and hydroxylamine groups of Boc-hydroxylamine. A similar binding mode is preferred for the group II cations, except that in this case the metal ion is coordinated by the O atom of the deprotonated hydroxylamine group. Copyright © 2013 John Wiley & Sons, Ltd.

  20. New Biocatalyst with Multiple Enzymatic Activities for Treatment of Complex Food Wastewaters

    Directory of Open Access Journals (Sweden)

    Olga Senko

    2008-01-01

    Full Text Available The cells of filamentous fungus R. oryzae entrapped in the polyvinyl alcohol cryogelare capable of producing various extracellular hydrolytic enzymes (proteases, amylases, lipases and are used for the treatment of complex wastewaters of food industry. Five types of media simulating the wastewater of various food enterprises were treated under batch conditions for 600 h. Fats containing mostly residues of unsaturated fatty acids, as well as casein, glucose, sucrose, starch, soybean flour and various salts were the main components of the treated wastewaters. The immobilized cells concurrently possessed lipolytic, amylolytic and proteolytic activities. The level of each enzymatic activity depended on the wastewater content. The physiological state of immobilized cells was monitored by bioluminescent method. The intracellular adenosine triphosphate (ATP concentration determined in the granules with immobilized cells was high enough and almost constant for all the period of biocatalyst application confirming thereby the active metabolic state of the cells. The study of mechanical strength of biocatalyst granules allowed revealing the differences in the values of modulus of biocatalyst elasticity at the beginning and at the end of its use for the wastewater treatment. The decrease in chemical oxygen demand of the tested media after their processing by immobilized biocatalyst was 68–79 % for one working cycle.

  1. Trafficking of plant plasma membrane aquaporins: multiple regulation levels and complex sorting signals.

    Science.gov (United States)

    Chevalier, Adrien S; Chaumont, François

    2015-05-01

    Aquaporins are small channel proteins which facilitate the diffusion of water and small neutral molecules across biological membranes. Compared with animals, plant genomes encode numerous aquaporins, which display a large variety of subcellular localization patterns. More specifically, plant aquaporins of the plasma membrane intrinsic protein (PIP) subfamily were first described as plasma membrane (PM)-resident proteins, but recent research has demonstrated that the trafficking and subcellular localization of these proteins are complex and highly regulated. In the past few years, PIPs emerged as new model proteins to study subcellular sorting and membrane dynamics in plant cells. At least two distinct sorting motifs (one cytosolic, the other buried in the membrane) are required to direct PIPs to the PM. Hetero-oligomerization and interaction with SNAREs (soluble N-ethylmaleimide-sensitive factor protein attachment protein receptors) also influence the subcellular trafficking of PIPs. In addition to these constitutive processes, both the progression of PIPs through the secretory pathway and their dynamics at the PM are responsive to changing environmental conditions. © The Author 2014. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  2. Genetic complexity and multiple infections with more Parvovirus species in naturally infected cats

    Directory of Open Access Journals (Sweden)

    Battilani Mara

    2011-03-01

    Full Text Available Abstract Parvoviruses of carnivores include three closely related autonomous parvoviruses: canine parvovirus (CPV, feline panleukopenia virus (FPV and mink enteritis virus (MEV. These viruses cause a variety of serious diseases, especially in young patients, since they have a remarkable predilection for replication in rapidly dividing cells. FPV is not the only parvovirus species which infects cats; in addition to MEV, the new variants of canine parvovirus, CPV-2a, 2b and 2c have also penetrated the feline host-range, and they are able to infect and replicate in cats, causing diseases indistinguishable from feline panleukopenia. Furthermore, as cats are susceptible to both CPV-2 and FPV viruses, superinfection and co-infection with multiple parvovirus strains may occur, potentially facilitating recombination and high genetic heterogeneity. In the light of the importance of cats as a potential source of genetic diversity for parvoviruses and, since feline panleukopenia virus has re-emerged as a major cause of mortality in felines, the present study has explored the molecular characteristics of parvovirus strains circulating in cat populations. The most significant findings reported in this study were (a the detection of mixed infection FPV/CPV with the presence of one parvovirus variant which is a true intermediate between FPV/CPV and (b the quasispecies cloud size of one CPV sample variant 2c. In conclusion, this study provides new important results about the evolutionary dynamics of CPV infections in cats, showing that CPV has presumably started a new process of readaptation in feline hosts.

  3. The Question Complexity Rubric: Development and Application for a National Archive of Astro 101 Multiple-Choice Questions

    Science.gov (United States)

    Cormier, Sebastien; Prather, E. E.; Brissenden, G.; Collaboration of Astronomy Teaching Scholars CATS

    2011-01-01

    For the last two years we have been developing an online national archive of multiple-choice questions for use in the Astro 101 classroom. These questions are intended to either supplement an instructor's implementation of Think-Pair-Share or be used for assessment purposes (i.e. exams and homework). In this talk we will describe the development, testing and implementation of the Question Complexity Rubric (QCR), which is designed to guide the ranking of questions in this archive based on their conceptual complexity. Using the QCR, a score is assigned to differentiate each question based on the cognitive steps necessary to comprehensively explain the reasoning pathway to the correct answer. The lowest QCR score is given to questions with a reasoning pathway requiring only declarative knowledge whereas the highest QCR score is given to questions that require multiple pathways of multi-step reasoning. When completed, the online question archive will provide users with the utility to 1) search for and download questions based on subject and average QCR score, 2) use the QCR to score questions, and 3) add their own questions to the archive. We will also discuss other potential applications of the QCR, such as how it informs our work in developing and testing of survey instruments by allowing us to calibrate the range of question complexity. This material is based upon work supported by the National Science Foundation under Grant No. 0715517, a CCLI Phase III Grant for the Collaboration of Astronomy Teaching Scholars (CATS). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

  4. Perceived illness intrusion among patients on hemodialysis

    International Nuclear Information System (INIS)

    Bapat, Usha; Kedlaya, Prashanth G; Gokulnath

    2009-01-01

    Dialysis therapy is extremely stressful as it interferes with all spheres of daily activities of the patients. This study is aimed at understanding the perceived illness intrusion among patients on hemodialysis (HD) and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD) stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering sociodemographics and a 13 item illness intrusion checklist covering the various aspects of life was carried out. The study patients were asked to rate the illness intrusion and the extent. The data were analyzed statistically. The mean age of the subjects was 50.28 + - 13.69 years, males were predominant (85%), 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear families. The mean duration on dialysis was 24 + - 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%), work (70%) finance (55%), diet (50%) sexual life (38%) and psychological status (25%). Illness had not intruded in areas of relationship with spouse (67%), friends (76%), family (79%), social (40%) and religious functions (72%). Statistically significant association was noted between illness intrusion and occupation (P= 0.02). (author)

  5. Perceived illness intrusion among patients on hemodialysis

    Directory of Open Access Journals (Sweden)

    Bapat Usha

    2009-01-01

    Full Text Available Dialysis therapy is extremely stressful as it interferes with all spheres of daily acti-vities of the patients. This study is aimed at understanding the perceived illness intrusion among pa-tients on hemodialysis (HD and to find the association between illness intrusion and patient demo-graphics as well as duration of dialysis. A cross sectional study involving 90 patients with chronic kidney disease (CKD stage V, on HD was performed during the period from 2005 to 2006. The subjects included were above 18 years of age, willing, stable and on dialysis for at least two months. Patients with psychiatric co-morbidity were excluded. A semi-structured interview schedule covering socio-demographics and a 13 item illness intrusion checklist covering the various aspects of life was ca-rried out. The study patients were asked to rate the illness intrusion and the extent. The data were ana-lyzed statistically. The mean age of the subjects was 50.28 ± 13.69 years, males were predominant (85%, 73% were married, 50% belonged to Hindu religion, 25% had pre-degree education, 25% were employed and 22% were housewives. About 40% and 38% of the study patients belonged to middle and upper socio-economic strata respectively; 86% had urban background and lived in nuclear fami-lies. The mean duration on dialysis was 24 ± 29.6 months. All the subjects reported illness intrusion to a lesser or greater extent in various areas including: health (44%, work (70% finance (55%, diet (50% sexual life (38% and psychological status (25%. Illness had not intruded in areas of rela-tionship with spouse (67%, friends (76%, family (79%, social (40% and religious functions (72%. Statistically significant association was noted between illness intrusion and occupation (P= 0.02.

  6. Human sex hormone-binding globulin gene expression- multiple promoters and complex alternative splicing

    Directory of Open Access Journals (Sweden)

    Rosner William

    2009-05-01

    Full Text Available Abstract Background Human sex hormone-binding globulin (SHBG regulates free sex steroid concentrations in plasma and modulates rapid, membrane based steroid signaling. SHBG is encoded by an eight exon-long transcript whose expression is regulated by a downstream promoter (PL. The SHBG gene was previously shown to express a second major transcript of unknown function, derived from an upstream promoter (PT, and two minor transcripts. Results We report that transcriptional expression of the human SHBG gene is far more complex than previously described. PL and PT direct the expression of at least six independent transcripts each, resulting from alternative splicing of exons 4, 5, 6, and/or 7. We mapped two transcriptional start sites downstream of PL and PT, and present evidence for a third SHBG gene promoter (PN within the neighboring FXR2 gene; PN regulates the expression of at least seven independent SHBG gene transcripts, each possessing a novel, 164-nt first exon (1N. Transcriptional expression patterns were generated for human prostate, breast, testis, liver, and brain, and the LNCaP, MCF-7, and HepG2 cell lines. Each expresses the SHBG transcript, albeit in varying abundance. Alternative splicing was more pronounced in the cancer cell lines. PL- PT- and PN-derived transcripts were most abundant in liver, testis, and prostate, respectively. Initial findings reveal the existence of a smaller immunoreactive SHBG species in LNCaP, MCF-7, and HepG2 cells. Conclusion These results extend our understanding of human SHBG gene transcription, and raise new and important questions regarding the role of novel alternatively spliced transcripts, their function in hormonally responsive tissues including the breast and prostate, and the role that aberrant SHBG gene expression may play in cancer.

  7. Magmatic intrusions in the lunar crust

    Science.gov (United States)

    Michaut, C.; Thorey, C.

    2015-10-01

    The lunar highlands are very old, with ages covering a timespan between 4.5 to 4.2 Gyr, and probably formed by flotation of light plagioclase minerals on top of the lunar magma ocean. The lunar crust provides thus an invaluable evidence of the geological and magmatic processes occurring in the first times of the terrestrial planets history. According to the last estimates from the GRAIL mission, the lunar primary crust is particularly light and relatively thick [1] This low-density crust acted as a barrier for the dense primary mantle melts. This is particularly evident in the fact that subsequent mare basalts erupted primarily within large impact basin: at least part of the crust must have been removed for the magma to reach the surface. However, the trajectory of the magma from the mantle to the surface is unknown. Using a model of magma emplacement below an elastic overlying layer with a flexural wavelength Λ, we characterize the surface deformations induced by the presence of shallow magmatic intrusions. We demonstrate that, depending on its size, the intrusion can show two different shapes: a bell shape when its radius is smaller than 4 times Λ or a flat top with small bended edges if its radius is larger than 4 times Λ[2]. These characteristic shapes for the intrusion result in characteristic deformations at the surface that also depend on the topography of the layer overlying the intrusion [3].Using this model we provide evidence of the presence of intrusions within the crust of the Moon as surface deformations in the form of low-slope lunar domes and floor-fractured craters. All these geological features have morphologies consistent with models of magma spreading at depth and deforming an overlying elastic layer. Further more,at floor-fractured craters, the deformation is contained within the crater interior, suggesting that the overpressure at the origin of magma ascent and intrusion was less than the pressure due to the weight of the crust removed by

  8. Adaptive intrusion data system (AIDS) software routines

    International Nuclear Information System (INIS)

    Corlis, N.E.

    1980-07-01

    An Adaptive Intrusion Data System (AIDS) was developed to collect information from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique digital data-compression, storage, and formatting system; it also incorporates a capability for video selection and recording for assessment of the sensors monitored by the system. The system is software reprogrammable to numerous configurations that may be used for the collection of environmental, bilevel, analog, and video data. This report describes the software routines that control the different AIDS data-collection modes, the diagnostic programs to test the operating hardware, and the data format. Sample data printouts are also included

  9. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  10. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  11. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  12. [Indiscriminate use of Latin name for natural Cordyceps sinensis insect-fungi complex and multiple Ophiocordyceps sinensis fungi].

    Science.gov (United States)

    Yao, Yi-Sang; Zhu, Jia-Shi

    2016-04-01

    Natural Cordyceps sinensis(Dongchongxiacao) is an insect-fungi complex containing multiple Ophiocordyceps sinensis(≡Cordyceps sinensis) fungi and dead body of larva of the family of Hepialidae. But natural C. sinensis and O. sinensis fungi use the same Latin name, resulting in uncertainty of the specific meaning, even disturbing the formulation and implementation of governmental policies and regulations, and influencing consumer psychology onthe market. This paper reviews the history and current status of the indiscriminate use of the Latin name O. sinensis for both the natural insect-fungi complex C. sinensis and O. sinensis fungi and lists the rename suggetions. Some scholars suggested using the term O. sinensis for the fungi and renaming the natural C. sinensis "Chinese cordyceps". Others suggested renaming the natural C. sinensis "Ophiocordyceps & Hepialidae". Both suggestions have not reached general consensus due to various academic concerns. This paper also reviews the exacerbation of the academic uncertainties when forcing implementing the 2011 Amsterdam Declaration "One Fungus=One Name" under the academic debate. Joint efforts of mycological, zoological and botany-TCM taxonomists and properly initiating the dispute systems offered by International Mycology Association may solve the debate on the indiscriminate use of the Latin name O.sinensis for the natural insect-fungi complex,the teleomorph and anamorph(s) of O. sinensis fungi. Copyright© by the Chinese Pharmaceutical Association.

  13. The Legionella pneumophila IcmSW complex interacts with multiple Dot/Icm effectors to facilitate type IV translocation.

    Directory of Open Access Journals (Sweden)

    Eric D Cambronne

    2007-12-01

    Full Text Available Many gram-negative pathogens use a type IV secretion system (T4SS to deliver effector proteins into eukaryotic host cells. The fidelity of protein translocation depends on the efficient recognition of effector proteins by the T4SS. Legionella pneumophila delivers a large number of effector proteins into eukaryotic cells using the Dot/Icm T4SS. How the Dot/Icm system is able to recognize and control the delivery of effectors is poorly understood. Recent studies suggest that the IcmS and IcmW proteins interact to form a stable complex that facilitates translocation of effector proteins by the Dot/Icm system by an unknown mechanism. Here we demonstrate that the IcmSW complex is necessary for the productive translocation of multiple Dot/Icm effector proteins. Effector proteins that were able to bind IcmSW in vitro required icmS and icmW for efficient translocation into eukaryotic cells during L. pneumophila infection. We identified regions in the effector protein SidG involved in icmSW-dependent translocation. Although the full-length SidG protein was translocated by an icmSW-dependent mechanism, deletion of amino terminal regions in the SidG protein resulted in icmSW-independent translocation, indicating that the IcmSW complex is not contributing directly to recognition of effector proteins by the Dot/Icm system. Biochemical and genetic studies showed that the IcmSW complex interacts with a central region of the SidG protein. The IcmSW interaction resulted in a conformational change in the SidG protein as determined by differences in protease sensitivity in vitro. These data suggest that IcmSW binding to effectors could enhance effector protein delivery by mediating a conformational change that facilitates T4SS recognition of a translocation domain located in the carboxyl region of the effector protein.

  14. Relationship between vapor intrusion and human exposure to trichloroethylene.

    Science.gov (United States)

    Archer, Natalie P; Bradford, Carrie M; Villanacci, John F; Crain, Neil E; Corsi, Richard L; Chambers, David M; Burk, Tonia; Blount, Benjamin C

    2015-01-01

    Trichloroethylene (TCE) in groundwater has the potential to volatilize through soil into indoor air where it can be inhaled. The purpose of this study was to determine whether individuals living above TCE-contaminated groundwater are exposed to TCE through vapor intrusion. We examined associations between TCE concentrations in various environmental media and TCE concentrations in residents. For this assessment, indoor air, outdoor air, soil gas, and tap water samples were collected in and around 36 randomly selected homes; blood samples were collected from 63 residents of these homes. Additionally, a completed exposure survey was collected from each participant. Environmental and blood samples were analyzed for TCE. Mixed model multiple linear regression analyses were performed to determine associations between TCE in residents' blood and TCE in indoor air, outdoor air, and soil gas. Blood TCE concentrations were above the limit of quantitation (LOQ; ≥ 0.012 µg L(-1)) in 17.5% of the blood samples. Of the 36 homes, 54.3%, 47.2%, and >84% had detectable concentrations of TCE in indoor air, outdoor air, and soil gas, respectively. Both indoor air and soil gas concentrations were statistically significantly positively associated with participants' blood concentrations (P = 0.0002 and P = 0.04, respectively). Geometric mean blood concentrations of residents from homes with indoor air concentrations of >1.6 µg m(-3) were approximately 50 times higher than geometric mean blood TCE concentrations in participants from homes with no detectable TCE in indoor air (P < .0001; 95% CI 10.4-236.4). This study confirms the occurrence of vapor intrusion and demonstrates the magnitude of exposure from vapor intrusion of TCE in a residential setting.

  15. Complex, non-monotonic dose-response curves with multiple maxima: Do we (ever) sample densely enough?

    Science.gov (United States)

    Cvrčková, Fatima; Luštinec, Jiří; Žárský, Viktor

    2015-01-01

    We usually expect the dose-response curves of biological responses to quantifiable stimuli to be simple, either monotonic or exhibiting a single maximum or minimum. Deviations are often viewed as experimental noise. However, detailed measurements in plant primary tissue cultures (stem pith explants of kale and tobacco) exposed to varying doses of sucrose, cytokinins (BA or kinetin) or auxins (IAA or NAA) revealed that growth and several biochemical parameters exhibit multiple reproducible, statistically significant maxima over a wide range of exogenous substance concentrations. This results in complex, non-monotonic dose-response curves, reminiscent of previous reports of analogous observations in both metazoan and plant systems responding to diverse pharmacological treatments. These findings suggest the existence of a hitherto neglected class of biological phenomena resulting in dose-response curves exhibiting periodic patterns of maxima and minima, whose causes remain so far uncharacterized, partly due to insufficient sampling frequency used in many studies.

  16. Work Zone Intrusion Report Interface Design

    Science.gov (United States)

    2018-02-02

    While necessary for roadways, work zones present a safety risk to crew. Half of road workers deaths between 2005 and 2010 were due to collisions with motorists intruding on the work zone. Therefore, addressing intrusions is an important step for ensu...

  17. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  18. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  19. Root resorption after orthodontic intrusion and extrusion:.

    NARCIS (Netherlands)

    Han, G.; Huang, S.; Hoff, J.W. Von den; Zeng, X.; Kuijpers-Jagtman, A.M.

    2005-01-01

    The aim of this investigation was to compare root resorption in the same individual after application of continuous intrusive and extrusive forces. In nine patients (mean age 15.3 years), the maxillary first premolars were randomly intruded or extruded with a continuous force of 100 cN for eight

  20. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  1. Petrology of the Sutherland commanage melilite intrusives

    International Nuclear Information System (INIS)

    Viljoen, K.S.

    1990-01-01

    The petrology of the Sutherland Commonage olivine melilitite intrusives have been investigated using petrographic and chemical methods. The results of the geochemical study suggest that the Commonage melilites were derived by the melting of a recently metasomatised region of the asthenosphere, probably under the influence of an ocean-island-type hotspot situated in the lower mantle

  2. Does supporting multiple student strategies lead to greater learning and motivation? Investigating a source of complexity in the architecture of intelligent tutoring systems

    NARCIS (Netherlands)

    Waalkens, Maaike; Aleven, Vincent; Taatgen, Niels

    Intelligent tutoring systems (ITS) support students in learning a complex problem-solving skill. One feature that makes an ITS architecturally complex, and hard to build, is support for strategy freedom, that is, the ability to let students pursue multiple solution strategies within a given problem.

  3. Infrared multiple photon dissociation action spectroscopy of alkali metal cation-cyclen complexes: Effects of alkali metal cation size on gas-phase conformation

    NARCIS (Netherlands)

    Austin, C.A.; Chen, Y.; Kaczan, C.M.; Berden, G.; Oomens, J.; Rodgers, M.T.

    2013-01-01

    The gas-phase structures of alkali metal cationized complexes of cyclen (1,4,7,10-tetraazacyclododecane) are examined via infrared multiple photon dissociation (IRMPD) action spectroscopy and electronic structure theory calculations. The measured IRMPD action spectra of four M+(cyclen) complexes are

  4. Late metal carbene complexes generated by multiple C-H activations: examining the continuum of M=C bond reactivity.

    Science.gov (United States)

    Whited, Matthew T; Grubbs, Robert H

    2009-10-20

    Unactivated C(sp(3))-H bonds are ubiquitous in organic chemicals and hydrocarbon feedstocks. However, these resources remain largely untapped, and the development of efficient homogeneous methods for hydrocarbon functionalization by C-H activation is an attractive and unresolved challenge for synthetic chemists. Transition-metal catalysis offers an attractive possible means for achieving selective, catalytic C-H functionalization given the thermodynamically favorable nature of many desirable partial oxidation schemes and the propensity of transition-metal complexes to cleave C-H bonds. Selective C-H activation, typically by a single cleavage event to produce M-C(sp(3)) products, is possible through myriad reported transition-metal species. In contrast, several recent reports have shown that late transition metals may react with certain substrates to perform multiple C-H activations, generating M=C(sp(2)) complexes for further elaboration. In light of the rich reactivity of metal-bound carbenes, such a route could open a new manifold of reactivity for catalytic C-H functionalization, and we have targeted this strategy in our studies. In this Account, we highlight several early examples of late transition-metal complexes that have been shown to generate metal-bound carbenes by multiple C-H activations and briefly examine factors leading to the selective generation of metal carbenes through this route. Using these reports as a backdrop, we focus on the double C-H activation of ethers and amines at iridium complexes supported by Ozerov's amidophosphine PNP ligand (PNP = [N(2-P(i)Pr(2)-4-Me-C(6)H(3))(2)](-)), allowing isolation of unusual square-planar iridium(I) carbenes. These species exhibit reactivity that is distinct from the archetypal Fischer and Schrock designations. We present experimental and theoretical studies showing that, like the classical square-planar iridium(I) organometallics, these complexes are best described as nucleophilic at iridium. We discuss

  5. Simulation of seawater intrusion in coastal aquifers: Some typical ...

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    Seawater intrusion; coastal aquifers; density-dependent flow and ... The seawater intrusion mechanism in coastal aquifers generally causes the occurrence of ... (4) The dynamic viscosity of the fluid does not change with respect to salinity and.

  6. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  7. As, Bi, Hg, S, Sb, Sn and Te geochemistry of the J-M Reef, Stillwater Complex, Montana: constraints on the origin of PGE-enriched sulfides in layered intrusions

    Science.gov (United States)

    Zientek, M.L.; Fries, T.L.; Vian, R.W.

    1990-01-01

    The J-M Reef is an interval of disseminated sulfides in the Lower Banded series of the Stillwater Complex that is enriched in the platinum group elements (PGE). Palladium and Pt occur in solid solution in base-metal sulfides and as discrete PGE minerals. PGE minerals include sulfides, tellurides, arsenides, antimonides, bismuthides, and alloys with Fe, Sn, Hg, and Au. Several subpopulations can be delineated based on whole-rock chemical analyses for As, Bi, Cu, Hg, Pd, Pt, S, Sb and Te for samples collected from and adjacent to the J-M Reef. In general, samples from within the reef have higher Pt/Cu, Pd/Cu, Pd/Pt, Te/Bi and S/(Te+Bi) than those collected adjacent to the reef. Vertical compositional profiles through the reef suggest that Pd/Cu and Pt/Cu decrease systematically upsection from mineralized to barren rock. The majority of samples with elevated As, Sb and Hg occur adjacent to the reef, not within it, or in sulfide-poor rocks. Neither magma mixing nor fluid migration models readily explain why the minor quantities of sulfide minerals immediately adjacent to the sulfide-enriched layers that form the J-M Reef have different element ratios than the sulfide minerals that form the reef. If all the sulfides formed by exsolution during a magma mixing event and the modal proportion of sulfide now in the rocks are simply the result of mechanical processes that concentrated the sulfides into some layers and not others, then the composition of the sulfide would not be expected to be different. Models that rely upon ascending liquids or fluids are incompatible with the presence of sulfides that are not enriched in PGE immediately below or interlayered with the PGE-enriched sulfides layers. PGE-enriched postcumulus fluids should have reacted to the same extent with sulfides immediately outside the reef as within the reef. One explanation is that some of the sulfide minerals in the rocks outside the reef have a different origin than those that make up the reef. The

  8. Complex care by multiple medical and dental specialists of a patient with aggressive Gorlin-Goltz syndrome.

    Science.gov (United States)

    Nagy, K; Kiss, E; Erdei, C; Oberna, F; Fejérdy, P; Márton, K; Vajo, Z

    2008-06-01

    Gorlin-Goltz syndrome is a genetically predisposed disease characterised by multiple basal cell carcinomas, odontogenic keratocysts and ectopic calcifications. The aim of this study was to show successful treatment of a 37-year-old male patient by cooperation between different dental and medical specialists. Because of the recurrence of a large basal cell carcinoma after multiple operations and a total dose telecobalt irradiation of 66 Gy, the patient's nose was ablated, with resection of the upper lip and part of the maxilla. The intraoral prosthetic treatment helped to restore the subtotal edentulousness. In order to enhance the application of the dental prosthesis, an Abbe plasty was performed at the second stage of surgery. As previous irradiation of the area precluded the use of facial implants immediately after the intraoral treatment, a temporary artificial nose prosthesis was created. The patient tolerated the procedures well and is completely disease-free 12 months after the surgery. Besides presenting a rare and complicated case of Gorlin-Goltz syndrome, the main purpose of this report is to show that, if different specialists in a dental-clinical team (maxillofacial surgeon, oncologist, radiation oncologist, prosthodontist and psychiatrist) combine their skills and expertise, successful management is possible even in a challenging complex case.

  9. Educational renewal of physician training in Australia and New Zealand: Multiple educational innovations in a complex environment.

    Science.gov (United States)

    Udemans, Rebecca; Stokes, Marie-Louise; Rigby, Louise; Khanna, Priya; Christiansen, Jonathan

    2018-03-21

    The Royal Australasian College of Physicians is renewing its specialty training programs and shifting towards competency-based medical education. Our aim is to improve the quality and rigor of training and graduate outcomes, and promote high standards of physician practice to serve the health of patients, families, and communities in a changing healthcare environment. We are progressing holistic change and multiple educational innovations in a complex environment. Numerous stakeholders, a disparate training landscape and a largely volunteer supervisor workforce pose challenges in supporting effective implementation. This paper describes our progress and experience with three key components of our education renewal program: curricular renewal, a new selection process and faculty development. It offers reflections on the practical challenges, lessons learned and factors critical for success. Our experience highlights opportunities for training organizations to maximize their influence over workplace training experiences and outcomes by taking a systems approach to the design, delivery and evaluation of the components of education renewal. We found that design, development and delivery of our multiple educational innovations have benefited from co-design approaches, progressive and concurrent development, continual exploration of new strategies, and implementation as soon as viable with a commitment to iterative improvements over time.

  10. Intrusive trauma memory: A review and functional analysis

    NARCIS (Netherlands)

    Krans, J.; Näring, G.W.B.; Becker, E.S.; Holmes, E.A.

    2009-01-01

    Our contribution to this special issue focuses on the phenomenon of intrusive trauma memory. While intrusive trauma memories can undoubtedly cause impairment, we argue that they may exist for a potentially adaptive reason. Theory and experimental research on intrusion development are reviewed and

  11. The Interaction Network Ontology-supported modeling and mining of complex interactions represented with multiple keywords in biomedical literature.

    Science.gov (United States)

    Özgür, Arzucan; Hur, Junguk; He, Yongqun

    2016-01-01

    hierarchical display of these 34 interaction types and their ancestor terms in INO resulted in the identification of specific gene-gene interaction patterns from the LLL dataset. The phenomenon of having multi-keyword interaction types was also frequently observed in the vaccine dataset. By modeling and representing multiple textual keywords for interaction types, the extended INO enabled the identification of complex biological gene-gene interactions represented with multiple keywords.

  12. Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system

    OpenAIRE

    Kokkonen, Tero

    2016-01-01

    Almost all the organisations and even individuals rely on complex structures of data networks and networked computer systems. That complex data ensemble, the cyber domain, provides great opportunities, but at the same time it offers many possible attack vectors that can be abused for cyber vandalism, cyber crime, cyber espionage or cyber terrorism. Those threats produce requirements for cyber security situational awareness and intrusion detection capability. This dissertation conc...

  13. The state of the art in intrusion prevention and detection

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes infor

  14. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  15. Low grade mosaic for a complex supernumerary ring chromosome 18 in an adult patient with multiple congenital anomalies

    Directory of Open Access Journals (Sweden)

    Hoogeboom A Jeannette M

    2010-07-01

    Full Text Available Abstract Background Several cases have been reported of patients with a ring chromosome 18 replacing one of the normal chromosomes 18. Less common are patients with a supernumerary ring chromosomes 18. High resolution whole genome examination in patients with multiple congenital abnormalities might reveal cytogenetic abnormalities of an unexpected complexity. Results We report a 24 years old male patient with lower spinal anomalies, hypospadia, bifid scrotum, cryptorchism, anal atresia, kidney stones, urethra anomalies, radial dysplasia, and a hypoplastic thumb. Some of the anomalies overlap with the VACTERL association. Chromosome analysis of cultured peripheral blood lymphocytes revealed an additional ring chromosome in 13% of the metaphases. Both parents had a normal karyotype, demonstrating the de novo origin of this ring chromosome. FISH analysis using whole chromosome paints showed that the additional chromosomal material was derived from chromosome 18. Chromosome analysis of cultured fibroblasts revealed only one cell with the supernumerary ring chromosome in the 400 analyzed. To characterize the ring chromosome in more detail peripheral blood derived DNA was analyzed using SNP-arrays. The array results indicated a 5 Mb gain of the pericentromeric region of chromosome 18q10-q11.2. FISH analysis using BAC-probes located in the region indicated the presence of 6 signals on the r(18 chromosome. In addition, microsatellite analysis demonstrated that the unique supernumerary ring chromosome was paternally derived and both normal copies showed biparental disomy. Conclusions We report on an adult patient with multiple congenital abnormalities who had in 13% of his cells a unique supernumerary ring chromosome 18 that was composed of 6 copies of the 5 Mb gene rich region of 18q11.

  16. Multilayer Statistical Intrusion Detection in Wireless Networks

    Science.gov (United States)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  17. Distributed fiber optic moisture intrusion sensing system

    Science.gov (United States)

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  18. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  19. Sulfide intrusion and detoxification in seagrasses ecosystems

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    Sulfide intrusion in seagrasses represents a global threat to seagrasses and thereby an important parameter in resilience of seagrass ecosystems. In contrast seegrasses colonize and grow in hostile sediments, where they are constantly exposed to invasion of toxic gaseous sulfide. Remarkably little...... strategies of seagrasses to sustain sulfide intrusion. Using stable isotope tracing, scanning electron microscopy with x-ray analysis, tracing sulfur compounds combined with ecosystem parameters we found different spatial, intraspecific and interspecific strategies to cope with sulfidic sediments. 1...... not present in terrestrial plants at that level. Sulfide is not necessarily toxic but used as sulfur nutrition, presupposing healthy seagrass ecosystems that can support detoxification mechanisms. Presence or absence of those mechanisms determines susceptibility of seagrass ecosystems to sediment sulfide...

  20. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  1. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  2. WIPP performance assessment: impacts of human intrusion

    International Nuclear Information System (INIS)

    Anderson, D.R.; Hunter, R.L.; Bertram-Howery, S.G.; Lappin, A.R.

    1989-01-01

    The Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico is a research and development facility that may become the USA's first and only mined geologic repository for transuranic waste. Human intrusion into the WIPP repository after closure has been shown by preliminary sensitivity analyses and calculations of consequences to be an important, and perhaps the most important, factor in long-term repository performance

  3. AMDIS Case Conference: Intrusive Medication Safety Alerts.

    Science.gov (United States)

    Graham, J; Levick, D; Schreiber, R

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center's dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  4. AMDIS Case Conference: Intrusive Medication Safety Alerts

    OpenAIRE

    Graham, J.; Levick, D.; Schreiber, R.

    2010-01-01

    Clinical decision support that provides enhanced patient safety at the point of care frequently encounters significant pushback from clinicians who find the process intrusive or time-consuming. We present a hypothetical medical center’s dilemma about its allergy alerting system and discuss similar problems faced by real hospitals. We then share some lessons learned and best practices for institutions who wish to implement these tools themselves.

  5. INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE

    OpenAIRE

    Owais, Faizan

    2008-01-01

    Is marketing practice destroying the faith of consumers? It may be argued that marketing practice over recent years has taken a more direct approach that appears intrusive and manipulative to consumers. The marketing activities we see today are a desperate attempt to grab consumer attention in any way possible and it is all spelling out bad news for marketing. Marketers have been faced with many challenges, with markets at saturation point, competitiveness is on the rise and marketers are...

  6. Stochastic Tools for Network Intrusion Detection

    OpenAIRE

    Yu, Lu; Brooks, Richard R.

    2017-01-01

    With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detecti...

  7. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  8. Accurate quantification of 5 German cockroach (GCr) allergens in complex extracts using multiple reaction monitoring mass spectrometry (MRM MS).

    Science.gov (United States)

    Mindaye, S T; Spiric, J; David, N A; Rabin, R L; Slater, J E

    2017-12-01

    German cockroach (GCr) allergen extracts are complex and heterogeneous products, and methods to better assess their potency and composition are needed for adequate studies of their safety and efficacy. The objective of this study was to develop an assay based on liquid chromatography and multiple reaction monitoring mass spectrometry (LC-MRM MS) for rapid, accurate, and reproducible quantification of 5 allergens (Bla g 1, Bla g 2, Bla g 3, Bla g 4, and Bla g 5) in crude GCr allergen extracts. We first established a comprehensive peptide library of allergens from various commercial extracts as well as recombinant allergens. Peptide mapping was performed using high-resolution MS, and the peptide library was then used to identify prototypic and quantotypic peptides to proceed with MRM method development. Assay development included a systematic optimization of digestion conditions (buffer, digestion time, and trypsin concentration), chromatographic separation, and MS parameters. Robustness and suitability were assessed following ICH (Q2 [R1]) guidelines. The method is precise (RSD  0.99, 0.01-1384 fmol/μL), and sensitive (LLOD and LLOQ MS, we quantified allergens from various commercial GCr extracts and showed considerable variability that may impact clinical efficacy. Our data demonstrate that the LC-MRM MS method is valuable for absolute quantification of allergens in GCr extracts and likely has broader applicability to other complex allergen extracts. Definitive quantification provides a new standard for labelling of allergen extracts, which will inform patient care, enable personalized therapy, and enhance the efficacy of immunotherapy for environmental and food allergies. © 2017 The Authors. Clinical & Experimental Allergy published by John Wiley & Sons Ltd. This article has been contributed to by US Government employees and their work is in the public domain in the USA.

  9. Heat exchange modeling in a multilayered karst aquifer affected by seawater intrusion

    Directory of Open Access Journals (Sweden)

    Luca Vettorello

    2015-11-01

    Full Text Available A Feflow thermohaline model has been implemented in order to study borehole heat exchangers (BHEs activity in a coastal aquifer in the South of Italy (Province of Lecce, Puglia Region. The modeled closed-loop system consists of two double u-pipe heat exchangers, installed in 200 meters deep boreholes. The main purpose of numerical modeling was to forecast thermal plume extension in groundwater after a long period of heat exchange, calculating temperature trends in observation points during a 10 years transport simulation. The complex geological structure, including calcarenites, fractured limestones and a deep karst aquifer, has been translated into a multilayered model, with a depth-related parameter distribution, assigning different values of hydraulic, thermal and chemical properties to each layer. In particular saltwater concentration has been taken into account, considering the influence of seawater intrusion on the heat transport density-dependent model. Parameters assignment was based on experimental datasets collected during initial field investigations, including thermal characterization of soil samples and GRTs, together with historical hydrogeological and hydrochemical measures and previous groundwater surveys. After model structure configuration and aquifers parameterization, a sensitivity analysis on porosity and heat dispersivity has been conducted, to evaluate their influence on thermal transport phenomena with a multiple scenarios approach, considering in particular the uncertainty related to secondary porosity in karst systems. Feflow simulation represented the first step in environmental compatibility evaluation for the BHE plant, waiting for the necessary model calibration with groundwater temperature monitoring trends.

  10. Geochemical characteristics and tectonic setting of the Tuerkubantao mafic-ultramafic intrusion in West Junggar, Xinjiang, China

    Directory of Open Access Journals (Sweden)

    Yufeng Deng

    2015-03-01

    Full Text Available Mineral chemistry, whole-rock major oxide, and trace element compositions have been determined for the Tuerkubantao mafic-ultramafic intrusion, in order to understand the early Paleozoic tectonic evolution of the West Junggar orogenic belt at the southern margin of the Central Asian orogenic belt. The Tuerkubantao mafic-ultramafic intrusion is a well-differentiated complex comprising peridotite, olivine pyroxenite, gabbro, and diorite. The ultramafic rocks are mostly seen in the central part of the intrusion and surrounded by mafic rocks. The Tuerkubantao intrusive rocks are characterized by enrichment of large ion lithophile elements and depleted high field strength elements relative to N-MORB. In addition, the Tuerkubantao intrusion displays relatively low Th/U and Nb/U (1.13–2.98 and 2.53–7.02, respectively and high La/Nb and Ba/Nb (1.15–4.19 and 37.7–79.82, respectively. These features indicate that the primary magma of the intrusion was derived from partial melting of a previously metasomatized mantle source in a subduction setting. The trace element patterns of peridotites, gabbros, and diorite in the Tuerkubantao intrusion have sub-parallel trends, suggesting that the different rock types are related to each other by differentiation of the same primary magma. The intrusive contact between peridotite and gabbro clearly suggest that the Tuerkubantao is not a fragment of an ophiolite. However, the Tuerkubantao intrusion displays many similarities with Alaskan-type mafic-ultramafic intrusions along major sutures of Phanerozoic orogenic belts. Common features include their geodynamic setting, internal lithological zoning, and geochemistry. The striking similarities indicate that the middle Devonian Tuerkubantao intrusion likely formed in a subduction-related setting similar to that of the Alaskan-type intrusions. In combination with the Devonian magmatism and porphyry mineralization, we propose that subduction of the oceanic slab has

  11. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  12. Multiple polysaccharide-drug complex-loaded liposomes: A unique strategy in drug loading and cancer targeting.

    Science.gov (United States)

    Ruttala, Hima Bindu; Ramasamy, Thiruganesh; Gupta, Biki; Choi, Han-Gon; Yong, Chul Soon; Kim, Jong Oh

    2017-10-01

    In the present study, a unique strategy was developed to develop nanocarriers containing multiple therapeutics with controlled release characteristics. In this study, we demonstrated the synthesis of dextran sulfate-doxorubicin (DS-DOX) and alginate-cisplatin (AL-CIS) polymer-drug complexes to produce a transferrin ligand-conjugated liposome. The targeted nanoparticles (TL-DDAC) were nano-sized and spherical. The targeted liposome exhibited a specific receptor-mediated endocytic uptake in cancer cells. The enhanced cellular uptake of TL-DDAC resulted in a significantly better anticancer effect in resistant and sensitive breast cancer cells compared to that of the free drugs. Specifically, DOX and CIS at a molar ratio of 1:1 exhibited better therapeutic performance compared to that of other combinations. The combination of an anthracycline-based topoisomerase II inhibitor (DOX) and a platinum compound (CIS) resulted in significantly higher cell apoptosis (early and late) in both types of cancer cells. In conclusion, treatment with DS-DOX and AL-CIS based combination liposomes modified with transferrin (TL-DDAC) was an effective cancer treatment strategy. Further investigation in clinically relevant animal models is warranted to prove the therapeutic efficacy of this unique strategy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Addressing Complex Societal Problems: Enabling Multiple Dimensions of Proximity to Sustain Partnerships for Collective Impact in Quebec

    Directory of Open Access Journals (Sweden)

    Nii A. Addy

    2018-03-01

    Full Text Available Sustainable solutions for complex societal problems, like poverty, require informing stakeholders about progress and changes needed as they collaborate. Yet, inter-organizational collaboration researchers highlight monumental challenges in measuring seemingly intangible factors during collective impact processes. We grapple with the question: How can decision-makers coherently conceptualize and measure seemingly intangible factors to sustain partnerships for the emergence of collective impact? We conducted an inductive process case study to address this question, analyzing data from documents, observations, and interviews of 24 philanthropy leaders and multiple stakeholders in a decades-long partnership involving Canada’s largest private family foundation, government and community networks, and during which a “collective impact project” emerged in Quebec Province, Canada. The multidimensional proximity framework provided an analytical lens. During the first phase of the partnership studied, there was a lack of baseline measurement of largely qualitative factors—conceptualized as cognitive, social, and institutional proximity between stakeholders—which evaluations suggested were important for explaining which community networks successfully brought about desired outcomes. Non-measurement of these factors was a problem in providing evidence for sustained engagement of stakeholders, such as government and local businesses. We develop a multidimensional proximity model that coherently conceptualizes qualitative proximity factors, for measuring their change over time.

  14. A multiple-shape memory polymer-metal composite actuator capable of programmable control, creating complex 3D motion of bending, twisting, and oscillation

    Science.gov (United States)

    Shen, Qi; Trabia, Sarah; Stalbaum, Tyler; Palmre, Viljar; Kim, Kwang; Oh, Il-Kwon

    2016-04-01

    Development of biomimetic actuators has been an essential motivation in the study of smart materials. However, few materials are capable of controlling complex twisting and bending deformations simultaneously or separately using a dynamic control system. Here, we report an ionic polymer-metal composite actuator having multiple-shape memory effect, and is able to perform complex motion by two external inputs, electrical and thermal. Prior to the development of this type of actuator, this capability only could be realized with existing actuator technologies by using multiple actuators or another robotic system. This paper introduces a soft multiple-shape-memory polymer-metal composite (MSMPMC) actuator having multiple degrees-of-freedom that demonstrates high maneuverability when controlled by two external inputs, electrical and thermal. These multiple inputs allow for complex motions that are routine in nature, but that would be otherwise difficult to obtain with a single actuator. To the best of the authors’ knowledge, this MSMPMC actuator is the first solitary actuator capable of multiple-input control and the resulting deformability and maneuverability.

  15. A multiple-shape memory polymer-metal composite actuator capable of programmable control, creating complex 3D motion of bending, twisting, and oscillation.

    Science.gov (United States)

    Shen, Qi; Trabia, Sarah; Stalbaum, Tyler; Palmre, Viljar; Kim, Kwang; Oh, Il-Kwon

    2016-04-15

    Development of biomimetic actuators has been an essential motivation in the study of smart materials. However, few materials are capable of controlling complex twisting and bending deformations simultaneously or separately using a dynamic control system. Here, we report an ionic polymer-metal composite actuator having multiple-shape memory effect, and is able to perform complex motion by two external inputs, electrical and thermal. Prior to the development of this type of actuator, this capability only could be realized with existing actuator technologies by using multiple actuators or another robotic system. This paper introduces a soft multiple-shape-memory polymer-metal composite (MSMPMC) actuator having multiple degrees-of-freedom that demonstrates high maneuverability when controlled by two external inputs, electrical and thermal. These multiple inputs allow for complex motions that are routine in nature, but that would be otherwise difficult to obtain with a single actuator. To the best of the authors' knowledge, this MSMPMC actuator is the first solitary actuator capable of multiple-input control and the resulting deformability and maneuverability.

  16. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    CERN Document Server

    INSPIRE-00416173; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machin...

  17. Petrology, composition, and age of intrusive rocks associated with the Quartz Hill molybdenite deposit, southeastern Alaska.

    Science.gov (United States)

    Hudson, T.; Smith, James G.; Elliott, R.L.

    1979-01-01

    A large porphyry molybdenum deposit (Quartz Hill deposit) was recently discovered in the heart of the Coast Range batholithic complex about 70 km E of Ketchikan, SE Alaska. Intrusive rocks associated with the mineral deposit form two composite epizonal to hypabyssal stocks and many dikes in country rocks. All observed metallization and alteration is within the Quartz Hill stock. Molybdenite forms fracture coatings and occurs in veins with quartz. Alteration is widespread and includes development of secondary quartz, pyrite, K-feldspar, biotite, white mica, chlorite, and zeolite. Field relations indicate that the stocks were emplaced after regional uplift and erosion of the Coast Range batholithic complex, and K-Ar data show that intrusion and alteration took place in late Oligocene time, about 27 to 30 Ma ago. Data from the Ketchikan quadrangle indicate that porphyry molybdenum metallization in the Coast Range batholithic complex is associated with regionally extensive but spotty, middle Tertiary or younger, felsic magmatism. -from Authors

  18. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  19. High precision ages from the Torres del Paine Intrusion, Chile

    Science.gov (United States)

    Michel, J.; Baumgartner, L.; Cosca, M.; Ovtcharova, M.; Putlitz, B.; Schaltegger, U.

    2006-12-01

    The upper crustal bimodal Torres del Paine Intrusion, southern Chile, consists of the lower Paine-Mafic- Complex and the upper Paine-Granite. Geochronologically this bimodal complex is not well studied except for a few existing data from Halpern (1973) and Sanchez (2006). The aim of this study is to supplement the existing data and to constrain the age relations between the major magmatic pulses by applying high precision U-Pb dating on accessory zircons and 40Ar/39Ar-laser-step-heating-ages on biotites from the Torres del Paine Intrusion. The magmatic rocks from mafic complex are fine to medium-grained and vary in composition from quartz- monzonites to granodiorites and gabbros. Coarse-grained olivine gabbros have intruded these rocks in the west. The granitic body is represented by a peraluminous, biotite-orthoclase-granite and a more evolved leucocratic granite in the outer parts towards the host-rock. Field observations suggest a feeder-zone for the granite in the west and that the granite postdates the mafic complex. Two granite samples of the outermost margins in the Northeast and South were analyzed. The zircons were dated by precise isotope-dilution U-Pb techniques of chemically abraded single grains. The data are concordant within the analytical error and define weighted mean 206/238U ages of 12.59 ± 0.03 Ma and 12.58 ± 0.01 Ma for the two samples respectively. A 40Ar/39Ar-age for the second sample yield a date of 12.37 ± 0.11 Ma. Three 40Ar/39Ar -ages of biotites were obtained for rocks belonging to the mafic complex. A hbl-bio- granodiorite from the central part, approximately 150 m below the subhorizontal contact with the granite, gives an age of 12.81 ± 0.11 Ma. A hbl-bio-granodiorite and an olivine-gabbro west of the feeder-zone date at 12.42 ± 0.14 Ma and 12.49 ± 0.11 Ma, respectively. The obtained older age of 12.81 Ma for the granodiorite in the central part is consistent with structural relationships of brittle fracturing of the mafic

  20. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas; Walter, Thomas R.; Ruch, Joel; Bonforte, Alessandro; Puglisi, Giuseppe

    2014-01-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  1. Experimental study of the interplay between magmatic rift intrusion and flank instability with application to the 2001 Mount Etna eruption

    KAUST Repository

    Le Corvec, Nicolas

    2014-07-01

    Mount Etna volcano is subject to transient magmatic intrusions and flank movement. The east flank of the edifice, in particular, is moving eastward and is dissected by the Timpe Fault System. The relationship of this eastward motion with intrusions and tectonic fault motion, however, remains poorly constrained. Here we explore this relationship by using analogue experiments that are designed to simulate magmatic rift intrusion, flank movement, and fault activity before, during, and after a magmatic intrusion episode. Using particle image velocimetry allows for a precise temporal and spatial analysis of the development and activity of fault systems. The results show that the occurrence of rift intrusion episodes has a direct effect on fault activity. In such a situation, fault activity may occur or may be hindered, depending on the interplay of fault displacement and flank acceleration in response to dike intrusion. Our results demonstrate that a complex interplay may exist between an active tectonic fault system and magmatically induced flank instability. Episodes of magmatic intrusion change the intensity pattern of horizontal flank displacements and may hinder or activate associated faults. We further compare our results with the GPS data of the Mount Etna 2001 eruption and intrusion. We find that syneruptive displacement rates at the Timpe Fault System have differed from the preeruptive or posteruptive periods, which shows a good agreement of both the experimental and the GPS data. Therefore, understanding the flank instability and flank stability at Mount Etna requires consideration of both tectonic and magmatic forcing. Key Points Analyzing Mount Etna east flank dynamics during the 2001 eruption Good correlation between analogue models and GPS data Understanding the different behavior of faulting before/during/after an eruption © 2014. American Geophysical Union. All Rights Reserved.

  2. Post-transcriptional generation of miRNA variants by multiple nucleotidyl transferases contributes to miRNA transcriptome complexity.

    Science.gov (United States)

    Wyman, Stacia K; Knouf, Emily C; Parkin, Rachael K; Fritz, Brian R; Lin, Daniel W; Dennis, Lucas M; Krouse, Michael A; Webster, Philippa J; Tewari, Muneesh

    2011-09-01

    Modification of microRNA sequences by the 3' addition of nucleotides to generate so-called "isomiRs" adds to the complexity of miRNA function, with recent reports showing that 3' modifications can influence miRNA stability and efficiency of target repression. Here, we show that the 3' modification of miRNAs is a physiological and common post-transcriptional event that shows selectivity for specific miRNAs and is observed across species ranging from C. elegans to human. The modifications result predominantly from adenylation and uridylation and are seen across tissue types, disease states, and developmental stages. To quantitatively profile 3' nucleotide additions, we developed and validated a novel assay based on NanoString Technologies' nCounter platform. For certain miRNAs, the frequency of modification was altered by processes such as cell differentiation, indicating that 3' modification is a biologically regulated process. To investigate the mechanism of 3' nucleotide additions, we used RNA interference to screen a panel of eight candidate miRNA nucleotidyl transferases for 3' miRNA modification activity in human cells. Multiple enzymes, including MTPAP, PAPD4, PAPD5, ZCCHC6, ZCCHC11, and TUT1, were found to govern 3' nucleotide addition to miRNAs in a miRNA-specific manner. Three of these enzymes-MTPAP, ZCCHC6, and TUT1-have not previously been known to modify miRNAs. Collectively, our results indicate that 3' modification observed in next-generation small RNA sequencing data is a biologically relevant process, and identify enzymatic mechanisms that may lead to new approaches for modulating miRNA activity in vivo.

  3. Klotho: a humeral mediator in CSF and plasma that influences longevity and susceptibility to multiple complex disorders, including depression.

    Science.gov (United States)

    Pavlatou, M G; Remaley, A T; Gold, P W

    2016-08-30

    Klotho is a hormone secreted into human cerebrospinal fluid (CSF), plasma and urine that promotes longevity and influences the onset of several premature senescent phenotypes in mice and humans, including atherosclerosis, cardiovascular disease, stroke and osteoporosis. Preliminary studies also suggest that Klotho possesses tumor suppressor properties. Klotho's roles in these phenomena were first suggested by studies demonstrating that a defect in the Klotho gene in mice results in a significant decrease in lifespan. The Klotho-deficient mouse dies prematurely at 8-9 weeks of age. At 4-5 weeks of age, a syndrome resembling human ageing emerges consisting of atherosclerosis, osteoporosis, cognitive disturbances and alterations of hippocampal architecture. Several deficits in Klotho-deficient mice are likely to contribute to these phenomena. These include an inability to defend against oxidative stress in the central nervous system and periphery, decreased capacity to generate nitric oxide to sustain normal endothelial reactivity, defective Klotho-related mediation of glycosylation and ion channel regulation, increased insulin/insulin-like growth factor signaling and a disturbed calcium and phosphate homeostasis accompanied by altered vitamin D levels and ectopic calcification. Identifying the mechanisms by which Klotho influences multiple important pathways is an emerging field in human biology that will contribute significantly to understanding basic physiologic processes and targets for the treatment of complex diseases. Because many of the phenomena seen in Klotho-deficient mice occur in depressive illness, major depression and bipolar disorder represent illnesses potentially associated with Klotho dysregulation. Klotho's presence in CSF, blood and urine should facilitate its study in clinical populations.

  4. Geophysical characterization from Itu intrusive suite

    International Nuclear Information System (INIS)

    Pascholati, M.E.

    1989-01-01

    The integrated use of geophysical, geological, geochemical, petrographical and remote sensing data resulted in a substantial increase in the knowledge of the Itu Intrusive Suite. The main geophysical method was gamma-ray spectrometry together with fluorimetry and autoradiography. Three methods were used for calculation of laboratory gamma-ray spectrometry data. For U, the regression method was the best one. For K and Th, equations system and absolute calibration presented the best results. Surface gamma-ray spectrometry allowed comparison with laboratory data and permitted important contribution to the study of environmental radiation. (author)

  5. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  6. Iron isotope systematics of the Skaergaard intrusion

    DEFF Research Database (Denmark)

    Lesher, Charles; Lundstrom, C.C.; Barfod, Gry

    crystallization on non-traditional stable isotope systems, particularly iron. FeTi oxide minerals (titanomagnetite and ilmenite) appear after ~60% of the magma had solidified. This was a significant event affecting the liquid line of descent and potentially accompanied by iron isotope fractionation. Here we...... report the results of a broad study of the iron isotope compositions of gabbros within the layered and upper border series of the Skaergaard intrusion, pegmatite and granophyre associated with these gabbroic rocks, and the sandwich horizon thought to represent the product of extreme differentiation and...

  7. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  8. Introduction to gravity currents and intrusions

    CERN Document Server

    Ungarish, Marius

    2009-01-01

    The whole book is well written in a clear and pedagogical general style. … the author has, in my opinion, produced the first comprehensive book entirely devoted to the modeling of gravity currents and intrusions. This book will be particularly useful to graduate and PhD students, as well as to academics and research engineers working in this field. It may be used as a self-consistent document to get a detailed idea of the state of knowledge about a given problem or a guide toward more specialized papers. It is rich with ideas regarding the direction in which further research is warranted. This

  9. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking.

    Science.gov (United States)

    Kalivas, Benjamin C; Kalivas, Peter W

    2016-03-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumbens during a relapse episode. We delineate an accumbens microcircuit that mediates cue-induced drug seeking becoming an intrusive event. This microcircuit harbors many potential therapeutic targets. We focus on preclinical and clinical studies, showing that administering N-acetylcysteine restores uptake of synaptic glutamate by astroglial glutamate transporters and thereby inhibits intrusive thinking. We posit that because intrusive thinking is a shared endophenotype in many disorders, N-acetylcysteine has positive effects in clinical trials for a variety of neuropsychiatric disorders, including drug addiction, gambling, trichotillomania, and depression.

  10. Paleomagnetism of Siberian Trap Intrusions: Implications for the Timing and Intensity of the Magmatic Activity

    Science.gov (United States)

    Latyshev, Anton; Veselovskiy, Roman; Mirsayanova, Elina; Ulyahina, Polina

    2016-04-01

    Large Igneous Provinces (LIPs) are the areas of the exceptional interest due to associated Cu-Ni-Pt deposits, problems of the causal link between volcanic hazards and mass extinctions, and questions about mantle plume dynamics. High-precise U-Pb and 40Ar/39Ar dating determined the duration of the main phase of the most voluminous Siberian Trap province formation as 1-2 Ma (Kamo et al., 2003; Reichow et al., 2008). Recent paleomagnetic investigations demonstrated the predominance of pulsating volcanic activity during LIPs formation (Chenet et al., 2009; Pavlov et al., 2015). We perform the results of detailed paleomagnetic study of intrusive complexes from Tunguska syncline and Angara-Taseeva depression (Siberian Trap province). Our data taken together with the previous paleomagnetic results from trap intrusions revealed two different styles of magmatic activity. In the central part of Tunguska syncline emplacement of was rather even without sharp bursts. Local intrusive events coeval to volcanic eruptions took place within spatially limited areas. In contrast, in the periphery of Tunguska syncline several short and powerful peaks of magmatic activity happened on the background of weak prolonged magmatism. These events resulted in huge Padunsky, Tulunsky and some other sills in the southern part of the Siberian platform. According to our paleomagnetic data, the duration of such pulses did not exceed 10-100 thousand years. Taking into account our paleomagnetic data and recent U-Pb ages for Siberian trap intrusions from (Burgess, Bowring, 2015), it is possible to correlate intrusive complexes with the volcanic section. In particular, formation the largest Tulunsky and Padunsky sills happened right after the termination of the main phase of Permian-Triassic volcanic activity on the Siberian platform. This work was supported by grants RFBR # 16-35-60114 and 15-35-20599 and Ministry of Education and Science of the Russian Federation (grant 14.Z50.31.0017).

  11. Corticostriatal circuitry in regulating diseases characterized by intrusive thinking

    OpenAIRE

    Kalivas, Benjamin C.; Kalivas, Peter W.

    2016-01-01

    Intrusive thinking triggers clinical symptoms in many neuropsychiatric disorders. Using drug addiction as an exemplar disorder sustained in part by intrusive thinking, we explore studies demonstrating that impairments in corticostriatal circuitry strongly contribute to intrusive thinking. Neuroimaging studies have long implicated this projection in cue-induced craving to use drugs, and preclinical models show that marked changes are produced at corticostriatal synapses in the nucleus accumben...

  12. Identification of Human Intrusion Types into Radwaste Disposal Facility

    International Nuclear Information System (INIS)

    Budi Setiawan

    2007-01-01

    Human intrusion has long been recognized as a potentially important post-closure safety issue for rad waste disposal facility. It is due to the difficulties in predicting future human activities. For the preliminary study of human intrusion, identification of human intrusion types need to be recognized and investigated also the approaching of problem solving must be known to predict the prevention act and accepted risk. (author)

  13. Diabetes Intrusiveness and Wellness among Elders: A Test of the Illness Intrusiveness Model

    Science.gov (United States)

    DeCoster, Vaughn A.; Killian, Tim; Roessler, Richard T.

    2013-01-01

    Using data collected from 147 predominately African American senior citizens in Arkansas, this research examined the Illness Intrusiveness Model (Devins, 1991; Devins & Seland, 1987; Devins & Shnek, 2000) to explain variations in wellness specifically related to participants' adaptation to diabetes. The theoretical model hypothesized that…

  14. Reliable Real-time Calculation of Heart-rate Complexity in Critically Ill Patients Using Multiple Noisy Waveform Sources

    Science.gov (United States)

    2014-01-01

    systems Machine learning Automatic data processing 1 Introduction Heart-rate complexity (HRC) is a method of quantifying the amount of complex...5. Batchinsky AI, Skinner J, Necsoiu C, et al. New measures of heart-rate complexity: effect of chest trauma and hemorrhage. J Trauma. 2010;68:1178–85

  15. A new intrusion prevention model using planning knowledge graph

    Science.gov (United States)

    Cai, Zengyu; Feng, Yuan; Liu, Shuru; Gan, Yong

    2013-03-01

    Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective ability.

  16. Multi-User Low Intrusive Occupancy Detection.

    Science.gov (United States)

    Pratama, Azkario Rizky; Widyawan, Widyawan; Lazovik, Alexander; Aiello, Marco

    2018-03-06

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers' mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87-90% accuracy, demonstrating the effectiveness of the proposed approach.

  17. Multi-User Low Intrusive Occupancy Detection

    Science.gov (United States)

    Widyawan, Widyawan; Lazovik, Alexander

    2018-01-01

    Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS) of BLE (Bluetooth Low Energy) nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach. PMID:29509693

  18. Multi-User Low Intrusive Occupancy Detection

    Directory of Open Access Journals (Sweden)

    Azkario Rizky Pratama

    2018-03-01

    Full Text Available Smart spaces are those that are aware of their state and can act accordingly. Among the central elements of such a state is the presence of humans and their number. For a smart office building, such information can be used for saving energy and safety purposes. While acquiring presence information is crucial, using sensing techniques that are highly intrusive, such as cameras, is often not acceptable for the building occupants. In this paper, we illustrate a proposal for occupancy detection which is low intrusive; it is based on equipment typically available in modern offices such as room-level power-metering and an app running on workers’ mobile phones. For power metering, we collect the aggregated power consumption and disaggregate the load of each device. For the mobile phone, we use the Received Signal Strength (RSS of BLE (Bluetooth Low Energy nodes deployed around workspaces to localize the phone in a room. We test the system in our offices. The experiments show that sensor fusion of the two sensing modalities gives 87–90% accuracy, demonstrating the effectiveness of the proposed approach.

  19. Ab initio multiple spawning dynamics study of dimethylnitramine and dimethylnitramine-Fe complex to model their ultrafast nonadiabatic chemistry.

    Science.gov (United States)

    Bera, Anupam; Ghosh, Jayanta; Bhattacharya, Atanu

    2017-07-28

    Conical intersections are now firmly established to be the key features in the excited electronic state processes of polyatomic energetic molecules. In the present work, we have explored conical intersection-mediated nonadiabatic chemical dynamics of a simple analogue nitramine molecule, dimethylnitramine (DMNA, containing one N-NO 2 energetic group), and its complex with an iron atom (DMNA-Fe). For this task, we have used the ab initio multiple spawning (AIMS) dynamics simulation at the state averaged-complete active space self-consistent field(8,5)/6-31G(d) level of theory. We have found that DMNA relaxes back to the ground (S 0 ) state following electronic excitation to the S 1 excited state [which is an (n,π*) excited state] with a time constant of approximately 40 fs. This AIMS result is in very good agreement with the previous surface hopping-result and femtosecond laser spectroscopy result. DMNA does not dissociate during this fast internal conversion from the S 1 to the S 0 state. DMNA-Fe also undergoes extremely fast relaxation from the upper S 1 state to the S 0 state; however, this relaxation pathway is dissociative in nature. DMNA-Fe undergoes initial Fe-O, N-O, and N-N bond dissociations during relaxation from the upper S 1 state to the ground S 0 state through the respective conical intersection. The AIMS simulation reveals the branching ratio of these three channels as N-N:Fe-O:N-O = 6:3:1 (based on 100 independent simulations). Furthermore, the AIMS simulation reveals that the Fe-O bond dissociation channel exhibits the fastest (time constant 24 fs) relaxation, while the N-N bond dissociation pathway features the slowest (time constant 128 fs) relaxation. An intermediate time constant (30 fs) is found for the N-O bond dissociation channel. This is the first nonadiabatic chemical dynamics study of metal-contained energetic molecules through conical intersections.

  20. Ab initio multiple spawning dynamics study of dimethylnitramine and dimethylnitramine-Fe complex to model their ultrafast nonadiabatic chemistry

    Science.gov (United States)

    Bera, Anupam; Ghosh, Jayanta; Bhattacharya, Atanu

    2017-07-01

    Conical intersections are now firmly established to be the key features in the excited electronic state processes of polyatomic energetic molecules. In the present work, we have explored conical intersection-mediated nonadiabatic chemical dynamics of a simple analogue nitramine molecule, dimethylnitramine (DMNA, containing one N-NO2 energetic group), and its complex with an iron atom (DMNA-Fe). For this task, we have used the ab initio multiple spawning (AIMS) dynamics simulation at the state averaged-complete active space self-consistent field(8,5)/6-31G(d) level of theory. We have found that DMNA relaxes back to the ground (S0) state following electronic excitation to the S1 excited state [which is an (n,π*) excited state] with a time constant of approximately 40 fs. This AIMS result is in very good agreement with the previous surface hopping-result and femtosecond laser spectroscopy result. DMNA does not dissociate during this fast internal conversion from the S1 to the S0 state. DMNA-Fe also undergoes extremely fast relaxation from the upper S1 state to the S0 state; however, this relaxation pathway is dissociative in nature. DMNA-Fe undergoes initial Fe-O, N-O, and N-N bond dissociations during relaxation from the upper S1 state to the ground S0 state through the respective conical intersection. The AIMS simulation reveals the branching ratio of these three channels as N-N:Fe-O:N-O = 6:3:1 (based on 100 independent simulations). Furthermore, the AIMS simulation reveals that the Fe-O bond dissociation channel exhibits the fastest (time constant 24 fs) relaxation, while the N-N bond dissociation pathway features the slowest (time constant 128 fs) relaxation. An intermediate time constant (30 fs) is found for the N-O bond dissociation channel. This is the first nonadiabatic chemical dynamics study of metal-contained energetic molecules through conical intersections.

  1. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems

    Science.gov (United States)

    2002-04-01

    Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained

  2. A deposit model for carbonatite and peralkaline intrusion-related rare earth element deposits: Chapter J in Mineral deposit models for resource assessment

    Science.gov (United States)

    Verplanck, Philip L.; Van Gosen, Bradley S.; Seal, Robert R.; McCafferty, Anne E.

    2014-01-01

    Carbonatite and alkaline intrusive complexes, as well as their weathering products, are the primary sources of rare earth elements. A wide variety of other commodities have been exploited from carbonatites and alkaline igneous rocks including niobium, phosphate, titanium, vermiculite, barite, fluorite, copper, calcite, and zirconium. Other elements enriched in these deposits include manganese, strontium, tantalum, thorium, vanadium, and uranium. Carbonatite and peralkaline intrusion-related rare earth element deposits are presented together in this report because of the spatial, and potentially genetic, association between carbonatite and alkaline rocks. Although these rock types occur together at many locations, carbonatite and peralkaline intrusion-related rare earth element deposits are not generally found together.

  3. Salt Intrusion in the Tweed Estuary

    Science.gov (United States)

    Uncles, R. J.; Stephens, J. A.

    1996-09-01

    Results are presented from a 2-week field programme in the Tweed Estuary, U.K. Maximum values of the empirically based Estuarine Richardson Number, Ri E, occurred during neap tides, and minimum values occurred during spring tides. Estimated values of Ri Evaried between 0·3 and 2·3, suggesting the occurrence of partially mixed to stratified conditions, depending on tidal state and freshwater inflow. These relatively large values of Ri Ewere consistent with both observed strong salinity stratification and large salt fluxes due to vertical shear transport. Low values (0·5) values in the halocline. A velocity maximum occurred within the halocline during the early flood. Wave-like spatial oscillations of the halocline occurred on the ebb. The oscillation troughs were situated above deep holes located just down-estuary of the rail and old road bridges. There was an indication that the constricted flow between the bridges' arches resulted in enhanced mixing of near-surface waters and a thickening of the halocline. It is also possible that these wave-like structures were stationary, near-critical internal lee waves, triggered by the deep holes. Trapping of high-salinity waters occurred on the ebb. Saline pools were isolated within a deep hole or deeper section of bed by the falling halocline. When the salt wedge moved further down-estuary, the ' trapped ' waters were subjected to strongly ebbing, overlying freshwater, and were subsequently entrained and flushed. The salinity intrusion was a strong function of spring-neap tidal state and a weaker function of freshwater inflow. The estimated salinity intrusion varied from about 4·7 to 7·6 km during the fieldwork period. The strong dependence on tidal range followed from the comparable lengths of the tidal excursion and salinity intrusion. Long excursion lengths were also partly responsible for the short residence (or flushing) times and their strong dependence on spring-neap tidal state. For typical summer freshwater

  4. Separation of compounds with multiple -OH groups from dilute aqueous solutions via complexation with organoboronate. [1,2-propanediol

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Tina Kuo Fung.

    1992-05-01

    The complexing extractant agent investigated in this work is 3-nitrophenylboronic acid (NPBA) in its anionic form (NPB). NPBA and Aliquat 336 (quaternary amine) is dissolved in 2-ethyl-l-hexanol, and the extractant is contacted with aq. NaOH. Solutes investigated were 1,2-propanediol, glycerol, fructose, sorbitol and lactic acid. Batch extraction experiments were performed at 25{degree}C. Partition coefficients, distribution ratios and loadings are reported for varying concentrations of solute and NPB. All solutes complexed with NPB{sup {minus}}, with all complexes containing only one NPB{sup {minus}} per complex. The 1:1 complexation constants for the solutes glycerol, fructose and sorbitol follow trends similar to complexation with B(OH){sub 4}{sup {minus}} (aq.), i.e. the complexation constants increase with increasing number of {minus}OH groups available for complexation. Assumption of 1:1 complex is not valid for 1, 2-propanediol, which showed overloading (more than one mole of solute complexed to one mole NPB{sup {minus}}) at higher concentrations. The {minus}OH group on the NPB{sup {minus}} which is left uncomplexed after one solute molecule had bound to the other two {minus}OH groups may be responsible for the overloading. Overloading is also observed in extraction of tactic acid, but through a different mechanism. It was found that TOMA{sup +} can extract lactic acid to an extent comparable to the uptake of lactic acid by NPB{sup {minus}}. The complexation is probably through formation of an acid-base ion pair. Losses of NPBA into the aqueous phase could lead to problems, poor economics in industrial separation processes. One way of overcoming this problem would be to incorporate the NPBA onto a solid support.

  5. Feature Selection of Network Intrusion Data using Genetic Algorithm and Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Iwan Syarif

    2016-12-01

    Full Text Available This paper describes the advantages of using Evolutionary Algorithms (EA for feature selection on network intrusion dataset. Most current Network Intrusion Detection Systems (NIDS are unable to detect intrusions in real time because of high dimensional data produced during daily operation. Extracting knowledge from huge data such as intrusion data requires new approach. The more complex the datasets, the higher computation time and the harder they are to be interpreted and analyzed. This paper investigates the performance of feature selection algoritms in network intrusiona data. We used Genetic Algorithms (GA and Particle Swarm Optimizations (PSO as feature selection algorithms. When applied to network intrusion datasets, both GA and PSO have significantly reduces the number of features. Our experiments show that GA successfully reduces the number of attributes from 41 to 15 while PSO reduces the number of attributes from 41 to 9. Using k Nearest Neighbour (k-NN as a classifier,the GA-reduced dataset which consists of 37% of original attributes, has accuracy improvement from 99.28% to 99.70% and its execution time is also 4.8 faster than the execution time of original dataset. Using the same classifier, PSO-reduced dataset which consists of 22% of original attributes, has the fastest execution time (7.2 times faster than the execution time of original datasets. However, its accuracy is slightly reduced 0.02% from 99.28% to 99.26%. Overall, both GA and PSO are good solution as feature selection techniques because theyhave shown very good performance in reducing the number of features significantly while still maintaining and sometimes improving the classification accuracy as well as reducing the computation time.

  6. Young women's experiences of intrusive behavior in 12 countries.

    Science.gov (United States)

    Sheridan, Lorraine; Scott, Adrian J; Roberts, Karl

    2016-01-01

    The present study provides international comparisons of young women's (N = 1,734) self-reported experiences of intrusive activities enacted by men. Undergraduate psychology students from 12 countries (Armenia, Australia, England, Egypt, Finland, India, Indonesia, Italy, Japan, Portugal, Scotland, and Trinidad) indicated which of 47 intrusive activities they had personally experienced. Intrusive behavior was not uncommon overall, although large differences were apparent between countries when women's personal experiences of specific intrusive activities were compared. Correlations were carried out between self-reported intrusive experiences, the Gender Empowerment Measure (GEM), and Hofstede's dimensions of national cultures. The primary associations were between women's experiences of intrusive behavior and the level of power they are afforded within the 12 countries. Women from countries with higher GEM scores reported experiencing more intrusive activities relating to courtship and requests for sex, while the experiences of women from countries with lower GEM scores related more to monitoring and ownership. Intrusive activities, many of them constituent of harassment and stalking, would appear to be widespread and universal, and their incidence and particular form reflect national level gender inequalities. © 2015 Wiley Periodicals, Inc.

  7. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  8. Effects of igneous intrusions on the petroleum system: a review

    NARCIS (Netherlands)

    Senger, Kim; Millett, John; Planke, Sverre; Ogata, Kei; Eide, Christian Haug; Festøy, Marte; Galland, Olivier; Jerram, Dougal A.

    2017-01-01

    Igneous intrusions feature in many sedimentary basins where hydrocarbon exploration and production is continuing. Owing to distinct geophysical property contrasts with siliciclastic host rocks (e.g., higher Vp, density and resistivity than host rocks), intrusions can be easily delineated within data

  9. An evaluation of classification algorithms for intrusion detection ...

    African Journals Online (AJOL)

    An evaluation of classification algorithms for intrusion detection. ... Log in or Register to get access to full text downloads. ... Most of the available IDSs use all the 41 features in the network to evaluate and search for intrusive pattern in which ...

  10. Intrusive Memories of Distressing Information: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Eva Battaglini

    Full Text Available Although intrusive memories are characteristic of many psychological disorders, the neurobiological underpinning of these involuntary recollections are largely unknown. In this study we used functional magentic resonance imaging (fMRI to identify the neural networks associated with encoding of negative stimuli that are subsequently experienced as intrusive memories. Healthy partipants (N = 42 viewed negative and neutral images during a visual/verbal processing task in an fMRI context. Two days later they were assessed on the Impact of Event Scale for occurrence of intrusive memories of the encoded images. A sub-group of participants who reported significant intrusions (n = 13 demonstrated stronger activation in the amygdala, bilateral ACC and parahippocampal gyrus during verbal encoding relative to a group who reported no intrusions (n = 13. Within-group analyses also revealed that the high intrusion group showed greater activity in the dorsomedial (dmPFC and dorsolateral prefrontal cortex (dlPFC, inferior frontal gyrus and occipital regions during negative verbal processing compared to neutral verbal processing. These results do not accord with models of intrusions that emphasise visual processing of information at encoding but are consistent with models that highlight the role of inhibitory and suppression processes in the formation of subsequent intrusive memories.

  11. Quantification of Multiple Components of Complex Aluminum-Based Adjuvant Mixtures by Using Fourier Transform Infrared Spectroscopy and Partial Least Squares Modeling.

    Science.gov (United States)

    Dowling, Quinton M; Kramer, Ryan M

    2017-01-01

    Fourier transform infrared (FTIR) spectroscopy is widely used in the pharmaceutical industry for process monitoring, compositional quantification, and characterization of critical quality attributes in complex mixtures. Advantages over other spectroscopic measurements include ease of sample preparation, quantification of multiple components from a single measurement, and the ability to quantify optically opaque samples. This method describes the use of a multivariate model for quantifying a TLR4 agonist (GLA) adsorbed onto aluminum oxyhydroxide (Alhydrogel ® ) using FTIR spectroscopy that may be adapted to quantify other complex aluminum based adjuvant mixtures.

  12. Thermal History and Crystallinity of Sheet Intrusions

    Science.gov (United States)

    Whittington, A. G.; Nabelek, P. I.; Hofmeister, A.

    2011-12-01

    Magma emplaced in a sheet intrusion has two potential fates: to crystallize, or quench to glass. Rapidly chilled sheet margins are typically glassy or microcrystalline, while interiors are coarser-grained. The actual textures result from a combination of thermal history and crystallization kinetics, which are related by various feedback mechanisms. The thermal history of cooling sheet intrusions is often approximated using the analytical solution for a semi-infinite half-space, which uses constant thermal properties such as heat capacity (CP), thermal diffusivity (D) and thermal conductivity (k = DρCP), where ρ is density. In reality, both CP and D are strongly T-dependent for glasses and crystals, and melts have higher CP and lower D than crystals or glasses. Another first-order feature ignored in the analytical solution is latent heat of crystallization (ΔHxt), which can be implemented numerically as extra heat capacity over the crystallization interval. For rhyolite melts, D is ~0.5 mm2s-1 and k is ~1.5 Wm-1K-1, which are similar to those of major crustal rock types and granitic protoliths at magmatic temperatures, suggesting that changes in thermal properties accompanying partial melting of the crust should be relatively minor. Numerical models of hot (~920°C liquidus for 0.5 wt.% H2O) shallow rhyolite intrusions indicate that the key difference in thermal history between bodies that quench to obsidian, and those that crystallize, results from the release of latent heat of crystallization, which enables bodies that crystallize to remain at high temperatures for much longer times. The time to solidification is similar in both cases, however, because solidification requires cooling through the glass transition (Tg ~620°C) in the first case, and cooling only to the solidus (~770°C) in the second. For basaltic melts, D is ~0.3 mm2s-1 and k is ~1.0 Wm-1K-1, compared to ~0.6 mm2s-1 and 2.5 Wm-1K-1 for crystalline basalt or peridotite at magmatic temperatures

  13. Metallogenic aspects of Itu intrusive suite

    International Nuclear Information System (INIS)

    Amaral, G.; Pascholati, E.M.

    1990-01-01

    The integrated use of geological, geochemical, geophysical and remote sensing data is providing interesting new information on the metallogenic characteristics of the Itu Intrusive Suite. During World War II, up to 1959, a wolframite deposit was mined near the border of the northernmost body (Itupeva Granite). This deposit is formed by greisen veins associated with cassiterite and topaz, clearly linked with later phases of magmatic differentiation. Generally those veins are related to hydrothermal alteration of the granites and the above mentioned shear zone. U, Th and K determinations by field and laboratory gammaspectrometry were used for regional distribution analysis of those elements and its ratios and calculation of radioactivity heat production. In this aspects, the Itupeva Granite is the hottest and presents several anomalies in the Th/U ratio, indicative of late or post magmatic oxidation processes. (author)

  14. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  15. Approach for Assessing Human Intrusion into a Radwaste Repository

    International Nuclear Information System (INIS)

    Cho, Dong Keun; Kim, Jung Woo; Jeong, Jong Tae; Baik, Min Hoon

    2016-01-01

    An approach to assess human intrusion into radwaste repository resulting from future human actions was proposed based on the common principals, requirements, and recommendations from IAEA, ICRP, and OECD/NEA, with the assumption that the intrusion occurs after loss of knowledge of the hazardous nature of the disposal facility. At first, the essential boundary conditions were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The essential premises were derived on the basis of international recommendations, followed by overall approach to deal with inadvertent human intrusion. The procedure to derive protective measures was also explained with four steps regarding how to derive safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be effectively used to reduce the potential for and/or consequence of human intrusion during entire processes of realization of disposal facility.

  16. Salt water intrusion on Uznam Island - 'Wydrzany' water intake

    International Nuclear Information System (INIS)

    Kochaniec, M.

    1999-01-01

    Aquifers of Uznam Island have high risk of saline water intrusion due to geographical and geological location. Hydrogeological and geophysical researchers were taken up in order to evaluate changes in intrusion of saline water into aquifer of Uznam Island. Water intake named 'Wydrzany' was built in south part of island in 1973. Since 1975 geophysical research has shown intrusion of salt water from reservoirs and bedrock due to withdrawn of water. In 1997 geoelectrical researches evaluated changes which have taken place since 1975 in saline water intrusion into aquifers of Uznam Island. The last research result showed that intrusion front moved 1100 m to the centre of island in comparison with situation in 1975. (author)

  17. Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2017-01-01

    Full Text Available Network intrusion detection is one of the most important parts for cyber security to protect computer systems against malicious attacks. With the emergence of numerous sophisticated and new attacks, however, network intrusion detection techniques are facing several significant challenges. The overall objective of this study is to learn useful feature representations automatically and efficiently from large amounts of unlabeled raw network traffic data by using deep learning approaches. We propose a novel network intrusion model by stacking dilated convolutional autoencoders and evaluate our method on two new intrusion detection datasets. Several experiments were carried out to check the effectiveness of our approach. The comparative experimental results demonstrate that the proposed model can achieve considerably high performance which meets the demand of high accuracy and adaptability of network intrusion detection systems (NIDSs. It is quite potential and promising to apply our model in the large-scale and real-world network environments.

  18. A Machine Learning Based Intrusion Impact Analysis Scheme for Clouds

    Directory of Open Access Journals (Sweden)

    Junaid Arshad

    2012-01-01

    Full Text Available Clouds represent a major paradigm shift, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of on demand expandable computing infrastructures. However, Clouds introduce novel security challenges which need to be addressed to facilitate widespread adoption. This paper is focused on one such challenge - intrusion impact analysis. In particular, we highlight the significance of intrusion impact analysis for the overall security of Clouds. Additionally, we present a machine learning based scheme to address this challenge in accordance with the specific requirements of Clouds for intrusion impact analysis. We also present rigorous evaluation performed to assess the effectiveness and feasibility of the proposed method to address this challenge for Clouds. The evaluation results demonstrate high degree of effectiveness to correctly determine the impact of an intrusion along with significant reduction with respect to the intrusion response time.

  19. Eddy intrusion of hot plasma into the polar cap and formation of polar-cap arcs

    International Nuclear Information System (INIS)

    Chiu, Y.T.; Gorney, D.J.

    1983-01-01

    We present plasma and electric field data obtained by the S3-3 satellite over the polar caps. We demonstrate that: (1) plasma signatures in the polar cap arc formation region near 5000 km altitude show clear intrusions of plasma sheet (approx.keV) and magneto sheath (approx.100 eV) plasma into a background of low-energy polar cap plasma; (2) the combined plasma and electric field signatures (electron inverted-V, ion beam and delxE<0) are exactly the same as in the evening discrete arc. We interpret this equivalence of polar cap and evening discrete arc signatures as indication that their formation processes are identical. The spatial structures of polar cap electric fields and the associated plasma signatures are consistent with the hypothesis that plasma intrusion into the polar cap takes the form of multiple cellular eddies. This hypothesis provides a unifying view of arc formation and arc configurations

  20. Blood Mononuclear Cell Mitochondrial Respiratory Chain Complex IV Activity is Decreased in Multiple Sclerosis Patients: Effects of β-Interferon Treatment

    Directory of Open Access Journals (Sweden)

    Iain Hargreaves

    2018-02-01

    Full Text Available Objectives: Evidence of mitochondrial respiratory chain (MRC dysfunction and oxidative stress has been implicated in the pathophysiology of multiple sclerosis (MS. However, at present, there is no reliable low invasive surrogate available to evaluate mitochondrial function in these patients. In view of the particular sensitivity of MRC complex IV to oxidative stress, the aim of this study was to assess blood mononuclear cell (BMNC MRC complex IV activity in MS patients and compare these results to age matched controls and MS patients on β-interferon treatment. Methods: Spectrophotometric enzyme assay was employed to measure MRC complex IV activity in blood mononuclear cell obtained multiple sclerosis patients and aged matched controls. Results: MRC Complex IV activity was found to be significantly decreased (p < 0.05 in MS patients (2.1 ± 0.8 k/nmol × 10−3; mean ± SD] when compared to the controls (7.2 ± 2.3 k/nmol × 10−3. Complex IV activity in MS patients on β-interferon (4.9 ± 1.5 k/nmol × 10−3 was not found to be significantly different from that of the controls. Conclusions: This study has indicated evidence of peripheral MRC complex IV deficiency in MS patients and has highlighted the potential utility of BMNCs as a potential means to evaluate mitochondrial function in this disorder. Furthermore, the reported improvement of complex IV activity may provide novel insights into the mode(s of action of β-interferon.

  1. Internal Structure of a Lobate Debris Apron Complex in Eastern Hellas: Evidence for Multiple Mid-Latitude Glaciations on Mars

    Science.gov (United States)

    Quartini, E.; Holt, J. W.; Brothers, T. C.

    2011-03-01

    The past depositional history of a lobate debris apron complex in eastern Hellas has been investigated by conducting a combined analysis of its surface morphology and subsurface structure using a CTX mosaic and orbital radar sounding data from SHARAD.

  2. CASPT2 study of inverse sandwich-type dinuclear Cr(I) and Fe(I) complexes of the dinitrogen molecule: significant differences in spin multiplicity and coordination structure between these two complexes.

    Science.gov (United States)

    Nakagaki, Masayuki; Sakaki, Shigeyoshi

    2014-02-20

    Inverse sandwich-type complexes (ISTCs), (μ-N2)[M(AIP)]2 (AIPH = (Z)-1-amino-3-imino-prop-1-ene; M = Cr and Fe), were investigated with the CASPT2 method. In the ISTC of Cr, the ground state takes a singlet spin multiplicity. However, the singlet to nonet spin states are close in energy to each other. The thermal average of effective magnetic moments (μeff) of these spin multiplicities is close to the experimental value. The η(2)-side-on coordination structure of N2 is calculated to be more stable than the η(1)-end-on coordination one. This is because the d-orbital of Cr forms a strong dπ-π* bonding interaction with the π* orbital of N2 in molecular plane. In the ISTC of Fe, on the other hand, the ground state takes a septet spin multiplicity, which agrees well with the experimentally reported μeff value. The η(1)-end-on structure of N2 is more stable than the η(2)-side-on structure. In the η(1)-end-on structure, two doubly occupied d-orbitals of Fe can form two dπ-π* bonding interactions. The negative spin density is found on the bridging N2 ligand in the Fe complex but is not in the Cr complex. All these interesting differences between ISTCs of Cr and Fe are discussed on the basis of the electronic structure and bonding nature.

  3. Multiple Bistability in Quinonoid-Bridged Diiron(II) Complexes: Influence of Bridge Symmetry on Bistable Properties.

    Science.gov (United States)

    van der Meer, Margarethe; Rechkemmer, Yvonne; Breitgoff, Frauke D; Marx, Raphael; Neugebauer, Petr; Frank, Uta; van Slageren, Joris; Sarkar, Biprajit

    2016-11-21

    Quinonoid bridges are well-suited for generating dinuclear assemblies that might display various bistable properties. In this contribution we present two diiron(II) complexes where the iron(II) centers are either bridged by the doubly deprotonated form of a symmetrically substituted quinonoid bridge, 2,5-bis[4-(isopropyl)anilino]-1,4-benzoquinone (H 2 L2') with a [O,N,O,N] donor set, or with the doubly deprotonated form of an unsymmetrically substituted quinonoid bridge, 2-[4-(isopropyl)anilino]-5-hydroxy-1,4-benzoquinone (H 2 L5') with a [O,O,O,N] donor set. Both complexes display temperature-induced spin crossover (SCO). The nature of the SCO is strongly dependent on the bridging ligand, with only the complex with the [O,O,O,N] donor set displaying a prominent hysteresis loop of about 55 K. Importantly, only the latter complex also shows a pronounced light-induced spin state change. Furthermore, both complexes can be oxidized to the mixed-valent iron(II)-iron(III) form, and the nature of the bridge determines the Robin and Day classification of these forms. Both complexes have been probed by a battery of electrochemical, spectroscopic, and magnetic methods, and this combined approach is used to shed light on the electronic structures of the complexes and on bistability. The results presented here thus show the potential of using the relatively new class of unsymmetrically substituted bridging quinonoid ligands for generating intriguing bistable properties and for performing site-specific magnetic switching.

  4. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Youssef, Tarek [Florida Intl Univ., Miami, FL (United States); El Hariri, Mohammad [Florida Intl Univ., Miami, FL (United States); Habib, Hani [Florida Intl Univ., Miami, FL (United States); Mohammed, Osama [Florida Intl Univ., Miami, FL (United States); Harmon, E [Florida Intl Univ., Miami, FL (United States)

    2017-02-28

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware to trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.

  5. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  6. Pleural effusion in 11:14 translocation q1 multiple myeloma in the setting of proteasome inhibitor presents therapeutic complexity.

    Science.gov (United States)

    Ghannam, Malik; Bryan, Maria; Kuross, Erik; Berry, Brent

    2018-01-01

    Primary malignant pleural effusion has been reported in about 134 cases of multiple myeloma (MM). Associated pleural effusions in cases of MM portend a poor prognosis and identifying them is highly relevant. Reported is the case of a man diagnosed with MM who developed primary myelomatous pleural effusion in the setting of multiple relapses and subsequent mortality within 2 months of the pleural effusion diagnosis. A 61-year-old African American man was diagnosed with MM in 2011. He received induction therapy of lenalidomide and dexamethasone and an autologous stem cell transplant in 2012. Over the next 5 years, the patient went through alternating periods of remission and relapse that were treated with two rounds of thoracic spine radiation therapy and chemotherapeutic agents. In September 2017, the patient presented with worsening dyspnea and was found to have pleural effusion. Fluid analysis showed plasma cell dyscrasia. Fluid drainage was performed, then the patient was discharged after 1 week which was followed by rapid re-accumulation of fluid and rehospitalization about 10 days after discharge. The patient passed away a few weeks after the second admission. Pleural effusion carries a differential diagnosis which may include malignancy but is commonly thought to be less specific to multiple myeloma but should still remain in the differential diagnosis. To our knowledge, this is the first case of myelomatous pleural effusion (MPE) that was reported after multiple relapses of MM. MPE is a very rare complication of MM, and its presence is a strong indicator of imminent mortality and need for comfort care in case of multiple relapses. End-stage pleural effusion in MM in the setting of proteasome inhibitor adds more therapeutic and diagnostic challenges.

  7. Advantages of conducting in-situ U-Pb age dating of multiple U-bearing minerals from a single complex: Case in point - the Oka Carbonatite Complex

    Science.gov (United States)

    Chen, W.; Simonetti, A.

    2012-12-01

    A detailed radiometric investigation is currently underway focusing on U-bearing accessory minerals apatite, perovskite, and niocalite from the Oka Carbonatite Complex (Canada). One of the main objectives is to obtain a comparative chronology of melt crystallization for the complex. Unlike other commonly adopted U-bearing minerals (e.g., zircon, monazite) for in-situ dating investigations, apatite, perovskite, and niocalite contain relatively high contents of common Pb. Hence, careful assessment of the proportion and composition of the common Pb, and usage of appropriate matrix-matched external standards are imperative. The Madagascar apatite was utilized as the external standard for apatite dating, and the Emerald Lake and Durango apatites were adopted as secondary standards; the latter yield ages of 92.6 ±1.8 and 32.2 ±1.1 Ma, respectively, and these are identical to their accepted ages. Pb/U ages for apatite from Oka were obtained for different rock types, including 8 carbonatites, 4 okaites, 3 ijolites and 3 alnoites, and these define a range of ages between ~105 and ~135 Ma; this result suggests a protracted crystallization history. In total, 266 individual analyses define two peaks at ~115 and ~125Ma. For perovskite dating, the Ice River perovskite standard was utilized as the external standard. The perovskites from one okaite sample yield an age of 112.2 ±1.9 Ma, and is much younger than the previously reported U-Pb perovskite age of 131 ±7 Ma. Hence, the combined U-Pb perovskite ages also suggest a rather prolonged time of melt crystallization. Niocalite is a rare, accessory silicate mineral that occurs within the carbonatites at Oka. The international zircon standard BR266 was selected for use as the external standard and rastering was employed to minimize the Pb-U fractionation. Two niocalite samples give young ages at 110.6 ±1.2 and 115.0 ±1.9 Ma, and are identical to their respective apatite ages (given associated uncertainties) from the same

  8. A Frequency-Based Approach to Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Mian Zhou

    2004-06-01

    Full Text Available Research on network security and intrusion detection strategies presents many challenging issues to both theoreticians and practitioners. Hackers apply an array of intrusion and exploit techniques to cause disruption of normal system operations, but on the defense, firewalls and intrusion detection systems (IDS are typically only effective in defending known intrusion types using their signatures, and are far less than mature when faced with novel attacks. In this paper, we adapt the frequency analysis techniques such as the Discrete Fourier Transform (DFT used in signal processing to the design of intrusion detection algorithms. We demonstrate the effectiveness of the frequency-based detection strategy by running synthetic network intrusion data in simulated networks using the OPNET software. The simulation results indicate that the proposed intrusion detection strategy is effective in detecting anomalous traffic data that exhibit patterns over time, which include several types of DOS and probe attacks. The significance of this new strategy is that it does not depend on the prior knowledge of attack signatures, thus it has the potential to be a useful supplement to existing signature-based IDS and firewalls.

  9. Infrared multiple photon dissociation spectroscopy of group I and group II metal complexes with Boc-hydroxylamine

    NARCIS (Netherlands)

    Dain, R.P.; Gresham, G.; Groenewold, G.S.; Steill, J.D.; Oomens, J.; van Stipdonk, M.J.

    2013-01-01

    RATIONALE: Hydroxamates are essential growth factors for some microbes, acting primarily as siderophores that solubilize iron for transport into a cell. Here we determined the intrinsic structure of 1:1 complexes between Boc-protected hydroxylamine and group I ([M(L)](+)) and group II ([M(L-H)](+))

  10. Overcoming Matrix Effects in a Complex Sample: Analysis of Multiple Elements in Multivitamins by Atomic Absorption Spectroscopy

    Science.gov (United States)

    Arnold, Randy J.; Arndt, Brett; Blaser, Emilia; Blosser, Chris; Caulton, Dana; Chung, Won Sog; Fiorenza, Garrett; Heath, Wyatt; Jacobs, Alex; Kahng, Eunice; Koh, Eun; Le, Thao; Mandla, Kyle; McCory, Chelsey; Newman, Laura; Pithadia, Amit; Reckelhoff, Anna; Rheinhardt, Joseph; Skljarevski, Sonja; Stuart, Jordyn; Taylor, Cassie; Thomas, Scott; Tse, Kyle; Wall, Rachel; Warkentien, Chad

    2011-01-01

    A multivitamin tablet and liquid are analyzed for the elements calcium, magnesium, iron, zinc, copper, and manganese using atomic absorption spectrometry. Linear calibration and standard addition are used for all elements except calcium, allowing for an estimate of the matrix effects encountered for this complex sample. Sample preparation using…

  11. The Mesozoic-Cenozoic igneous intrusions and related sediment-dominated hydrothermal activities in the South Yellow Sea Basin, the Western Pacific continental margin

    Science.gov (United States)

    Yumao, Pang; Xunhua, Zhang; Guolin, Xiao; Luning, Shang; Xingwei, Guo; Zhenhe, Wen

    2018-04-01

    Various igneous complexes were identified in multi-channel seismic reflection profiles from the South Yellow Sea Basin. It is not rare that magmatic intrusions in sedimentary basins cause strong thermal perturbations and hydrothermal activities. Some intrusion-related hydrothermal vent complexes have been identified and they are considered to originate from the deep sedimentary contact aureole around igneous intrusions and terminate in upper vents structures, and are linked by a vertical conduit system. The upper vent complexes are usually eye-shaped, dome-shaped, fault-related, crater-shaped or pock-shaped in seismic profiles. A schematic model was proposed to illustrate the structures of different types of hydrothermal vent complexes. A conceptual conduit model composed of an upper pipe-like part and a lower branching part was also derived. Hydrothermal vent complexes mainly developed during the Middle-Late Cretaceous, which is coeval with, or shortly after the intrusion. The back-arc basin evolution of the area which is related to the subduction of the Paleo-Pacific plate during the Mesozoic-Cenozoic may be the principal factor for voluminous igneous complexes and vent complexes in this area. It is significant to study the characteristics of igneous complexes and related hydrothermal vent complexes, which will have implications for the future study of this area.

  12. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  13. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  14. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    Science.gov (United States)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  15. On the classification of active and passive seawater intrusion

    Science.gov (United States)

    Werner, A. D.

    2017-12-01

    Active and passive seawater intrusion (SWI) arise when the freshwater head gradient slopes downwards towards land and the sea, respectively. However, a third category exists (i.e., passive-active SWI), whereby active SWI occurs inland of a mound in piezometric surface, whereas passive SWI occurs on the seaward side of the mound. In this study, numerical modelling is used to characterize the three forms of SWI, including an overview of the transient features of active SWI. While only simple cross-sectional representations of coastal aquifer settings are considered, the analysis provides guidance on some of the key attributes of each SWI class, as an extension to previous SWI research that offers limited differentiation between the various SWI types. Threshold parameter combinations for the onset of each form of SWI are provided, as derived from sharp-interface, steady-state analytical solutions. Dispersive aspects of SWI are then explored using numerical simulation. Important differences between the various forms of SWI include the salinization of the watertable that occurs under active SWI and in the absence of recharge, and the formation of persistent freshwater lenses in aquifers experiencing active SWI but also subject to surface recharge. Attempts to characterize transient active SWI processes, in terms of buoyancy, advective and dispersive processes, using dimensionless ratios that are drawn from previous studies of steady-state SWI, highlight the complex, nonlinear relationships that govern active SWI, even for idealized circumstances.

  16. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    International Nuclear Information System (INIS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-01-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware. (paper)

  17. Modelling saline intrusion for repository performance assessment

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1989-04-01

    UK Nirex Ltd are currently considering the possibility of disposal of radioactive waste by burial in deep underground repositories. The natural pathway for radionuclides from such a repository to return to Man's immediate environment (the biosphere) is via groundwater. Thus analyses of the groundwater flow in the neighbourhood of a possible repository, and consequent radionuclide transport form an important part of a performance assessment for a repository. Some of the areas in the UK that might be considered as possible locations for a repository are near the coast. If a repository is located in a coastal region seawater may intrude into the groundwater flow system. As seawater is denser than fresh water buoyancy forces acting on the intruding saline water may have significant effects on the groundwater flow system, and consequently on the time for radionuclides to return to the biosphere. Further, the chemistry of the repository near-field may be strongly influenced by the salinity of the groundwater. It is therefore important for Nirex to have a capability for reliably modelling saline intrusion to an appropriate degree of accuracy in order to make performance assessments for a repository in a coastal region. This report describes work undertaken in the Nirex Research programme to provide such a capability. (author)

  18. Formation of continental crust by intrusive magmatism

    Science.gov (United States)

    Rozel, A. B.; Golabek, G. J.; Jain, C.; Tackley, P. J.; Gerya, T.

    2017-09-01

    How were the continents formed in the Earth? No global numerical simulation of our planet ever managed to generate continental material self-consistently. In the present study, we show that the latest developments of the convection code StagYY enable to estimate how to produce the early continents, more than 3 billion years ago. In our models, melting of pyrolitic rocks generates a basaltic melt and leaves behind a depleted solid residue (a harzburgite). The melt generated in the mantle is transported to the surface. Only basaltic rocks melting again can generate continental crust. Should the basaltic melt always reach the open air and cool down? Should the melt be intruded warm in the pre-existing crust? The present study shows that both processes have to be considered to produce continents. Indeed, granitoids can only be created in a tight window of pressure-temperature. If all basalt is quickly cooled by surface volcanism, the lithosphere will be too cold. If all basalt is intruded warm below the crust then the lithosphere will be too warm. The key is to have both volcanism and plutonism (intrusive magmatism) to reach the optimal temperature and form massive volumes of continental material.

  19. Salinity intrusion modeling for Sungai Selangor

    International Nuclear Information System (INIS)

    Mohamed Roseli Zainal Abidin; Abd Jalil Hassan; Suriyani Awang; Liew Yuk San; Norbaya Hashim

    2006-01-01

    Salinity intrusion into estuary of the Sungai Selangor has been carried out on a hydrodynamic numerical modeling to access the parameter that governed the amount of salt in the river. Issues such as water pollution and extraction of water from Sungai Selangor system has been said to be the cause of fading fireflies. The berembang trees on the river bank that become the fireflies habitat need some amount of salt for proper growth. Living at the lower reaches of Sungai Selangor, the fireflies are affected not only by the activities in their vicinity, but by activities in the entire river basin. Rapid economic development in the basin and the strong demand for the water resources puts pressure on the ecosystem. This research has been carried out to investigate the effect of water extraction along Sungai Selangor towards altering the amount of salt content in the river. The hydrodynamic modeling with regards to the salt content is expected to support long term assessment that may affect the berembang trees as a result of changes in the flow from upstream because of the water abstraction activity for domestic water supply. (Author)

  20. On the classification of seawater intrusion

    Science.gov (United States)

    Werner, Adrian D.

    2017-08-01

    Seawater intrusion (SWI) arising from aquifer depletion is often classified as ;active; or ;passive;, depending on whether seawater moves in the same direction as groundwater flow or not. However, recent studies have demonstrated that alternative forms of active SWI show distinctly different characteristics, to the degree that the term ;active SWI; may be misleading without additional qualification. In response, this article proposes to modify hydrogeology lexicon by defining and characterizing three classes of SWI, namely passive SWI, passive-active SWI and active SWI. The threshold parameter combinations for the onset of each form of SWI are developed using sharp-interface, steady-state analytical solutions. Numerical simulation is then applied to a hypothetical case study to test the developed theory and to provide additional insights into dispersive SWI behavior. The results indicate that the three classes of SWI are readily predictable, with the exception of active SWI occurring in the presence of distributed recharge. The key characteristics of each SWI class are described to distinguish their most defining features. For example, active SWI occurring in aquifers receiving distributed recharge only creates watertable salinization downstream of the groundwater mound and only where dispersion effects are significant. The revised classification of SWI proposed in this article, along with the analysis of thresholds and SWI characteristics, provides coastal aquifer custodians with an improved basis upon which to expect salinization mechanisms to impact freshwater availability following aquifer depletion.

  1. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei

    2010-01-01

    High speed of processing massive audit data is crucial for an anomaly Intrusion Detection System (IDS) to achieve real-time performance during the detection. Abstracting audit data is a potential solution to improve the efficiency of data processing. In this work, we propose two strategies of data abstraction in order to build a lightweight detection model. The first strategy is exemplar extraction and the second is attribute abstraction. Two clustering algorithms, Affinity Propagation (AP) as well as traditional k-means, are employed to extract the exemplars, and Principal Component Analysis (PCA) is employed to abstract important attributes (a.k.a. features) from the audit data. Real HTTP traffic data collected in our institute as well as KDD 1999 data are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010 Springer-Verlag.

  2. Application of multiple parallel perfused microbioreactors: Synthesis, characterization and cytotoxicity testing of the novel rare earth complexes with indole acid as a ligand.

    Science.gov (United States)

    Guan, Qing-Lin; Xing, Yong-Heng; Liu, Jing; Wei, Wen-Juan; Zhang, Rui; Wang, Xuan; Bai, Feng-Ying

    2013-11-01

    Three novel complexes, [La(phen)2(IAA)2]·NO3 (1), [Sm(phen)2(IAA)2]·NO3 (2) and [Sm(IBA)3(phen)]·phen·HNO3·H2O (3) (phen: 1,10-phenanthroline, IAA: indole-3-acetic acid, IBA: indole-3-butyric acid), were synthesized and characterized with spectroscopy (infrared and UV-visible), X-ray crystal diffraction and elemental analysis. Structural analysis revealed that each lanthanide atom in complexes 1-3 held a distorted tricapped trigonal prism geometry in a nine-coordinate mode. There were two types of coordination modes of the IAA ligand in complexes 1 and 2: a μ2-η(1):η(2) bridging mode linking two lanthanide atoms and a μ2-η(1):η(1) double monodentate bridging mode. There were three types of coordination modes of the IBA ligand: a μ2-η(1):η(1) double monodentate bridging mode, a μ1-η(2) bridging mode and a μ2-η(1):η(2) bridging mode linking two lanthanide atoms. Adjacent Sm atoms were linked via the μ2-bridging carboxylate groups of the IBA ligands to generate a binuclear building unit. The biological activity of the complexes was evaluated in human adipose tissue-derived stem cells (hADSCs) and Chang liver cells using a multiple parallel perfused microbioreactor. The results showed that cytotoxicity increased as the concentrations of complexes 1-3 increased. © 2013.

  3. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  4. Clinical Implications of Complex Pharmacokinetics for Daratumumab Dose Regimen in Patients With Relapsed/Refractory Multiple Myeloma

    DEFF Research Database (Denmark)

    Xu, Xu Steven; Yan, Xiaoyu; Puchalski, Thomas

    2017-01-01

    New therapeutic strategies are urgently needed to improve clinical outcomes in patients with multiple myeloma (MM). Daratumumab is a first-in-class, CD38 human immunoglobulin G1κ monoclonal antibody approved for treatment of relapsed or refractory MM. Identification of an appropriate dose regimen...... for daratumumab is challenging due to its target-mediated drug disposition, leading to time- and concentration-dependent pharmacokinetics. We describe a thorough evaluation of the recommended dose regimen for daratumumab in patients with relapsed or refractory MM. This article is protected by copyright. All...

  5. Non-invasive and non-intrusive gas flow measurement based on the dynamic thermal characteristics of a pipeline

    Science.gov (United States)

    Fan, Zichuan; Cai, Maolin; Xu, Weiqing

    2012-10-01

    This paper proposes a non-intrusive and non-invasive method for measuring the gas flow rate in pneumatic industry. A heater unit is fixed on the partial circumference of the external wall of a pipeline and emits specific thermal pulses in a predetermined mode. Two sensors attached to the external wall detect the upstream temperature, and the gas flow can be measured according to the relationship between the flow rate and the dynamic thermal characteristics of the pipeline. To determine the preferable relationship, the temperature field model of the measurement system is built. Then, based on the measurement modes and the corresponding simulations, the objective functions for the gas flow specified on different dynamic thermal characteristics are established. Additionally, the minimum measurement time of the method, named reference time scale, is proposed. Further, robustness tests of the measurement method are derived by considering the influences of multiple factors on the objective functions. The experiments confirm that this method does not need to open the pipeline and disturb the flow regime in order to obtain the data; this method also avoids the typical time-consuming and complex operations, resists ambient temperature disturbance and achieves approximately acceptable results.

  6. Non-invasive and non-intrusive gas flow measurement based on the dynamic thermal characteristics of a pipeline

    International Nuclear Information System (INIS)

    Fan, Zichuan; Cai, Maolin; Xu, Weiqing

    2012-01-01

    This paper proposes a non-intrusive and non-invasive method for measuring the gas flow rate in pneumatic industry. A heater unit is fixed on the partial circumference of the external wall of a pipeline and emits specific thermal pulses in a predetermined mode. Two sensors attached to the external wall detect the upstream temperature, and the gas flow can be measured according to the relationship between the flow rate and the dynamic thermal characteristics of the pipeline. To determine the preferable relationship, the temperature field model of the measurement system is built. Then, based on the measurement modes and the corresponding simulations, the objective functions for the gas flow specified on different dynamic thermal characteristics are established. Additionally, the minimum measurement time of the method, named reference time scale, is proposed. Further, robustness tests of the measurement method are derived by considering the influences of multiple factors on the objective functions. The experiments confirm that this method does not need to open the pipeline and disturb the flow regime in order to obtain the data; this method also avoids the typical time-consuming and complex operations, resists ambient temperature disturbance and achieves approximately acceptable results. (paper)

  7. Some reflections on human intrusion into a nuclear waste repository

    International Nuclear Information System (INIS)

    Westerlind, M.

    2002-01-01

    This paper summarises some of the Swedish nuclear regulators' requirements and views related to intrusion into a repository for spent nuclear fuel, in the post-closure phase. The focus is however on experiences from the interaction with various stakeholders in the Swedish process for siting a repository. It is recognised that intrusion is not a major concern but that it is regularly raised in the debate, often in connection with issues related to retrievability. It is pointed out that more attention should be paid to the repository performance after an intrusion event, both in safety assessments and in communication with stakeholders, and not only address the immediate impacts to intruders. It is believed that international co-operation would be useful for developing methodologies for defining intrusion scenarios. (author)

  8. Effect of Groundwater Pumping on Seawater Intrusion in Coastal Aquifers

    Directory of Open Access Journals (Sweden)

    M.M. Sherif

    2002-06-01

    Full Text Available Many aquifers around the globe are located in coastal areas and are thus subjected to the seawater intrusion phenomenon. The growth of population in coastal areas and the conjugate increase in human, agricultural, and industrial activities have imposed an increasing demand for freshwater. This increase in water demand is often covered by extensive pumping of fresh groundwater, causing subsequent lowering of the water table (or piezometric head and upsetting the dynamic balance between freshwater and saline water bodies. The classical result of such a development is seawater intrusion. This paper presents a review for the seawater intrusion phenomenon in coastal aquifers. The effect of pumping activities on the seawater intrusion in the Nile Delta aquifer of Egypt is investigated. It was concluded that any additional pumping should be located in the middle Delta and avoided in the eastern and western sides of the Delta.

  9. QOS and Control-Theoretic Techniques for Intrusion Tolerance

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    ...), even in the face of intrusions. This report examines two host-based resources, a router and a web server, and presents simulated models of modifications that can be made to these resources to make them QoS-capable...

  10. Heart rate, startle response, and intrusive trauma memories

    Science.gov (United States)

    Chou, Chia-Ying; Marca, Roberto La; Steptoe, Andrew; Brewin, Chris R

    2014-01-01

    The current study adopted the trauma film paradigm to examine potential moderators affecting heart rate (HR) as an indicator of peritraumatic psychological states and as a predictor of intrusive memories. We replicated previous findings that perifilm HR decreases predicted the development of intrusive images and further showed this effect to be specific to images rather than thoughts, and to detail rather than gist recognition memory. Moreover, a group of individuals showing both an atypical sudden reduction in HR after a startle stimulus and higher trait dissociation was identified. Only among these individuals was lower perifilm HR found to indicate higher state dissociation, fear, and anxiety, along with reduced vividness of intrusions. The current findings emphasize how peritraumatic physiological responses relate to emotional reactions and intrusive memory. The moderating role of individual difference in stress defense style was highlighted. PMID:24397333

  11. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  12. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  13. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  14. Nuclear waste disposal facility intrusion: an archeologist's perspective

    International Nuclear Information System (INIS)

    Virginia, C.; Christie, L.

    1981-01-01

    A scenario is presented for the intrusion of a shallow land burial site by archeologists from a future generation. A description is given for the potential widespread exposure and contamination of populations by recovered artifacts

  15. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  16. Ant colony induced decision trees for intrusion detection

    CSIR Research Space (South Africa)

    Botes, FH

    2017-06-01

    Full Text Available platform. Intrusion Detection Systems (IDS) analyse network traffic to identify suspicious patterns with the intention to compromise the system. Practitioners train classifiers to classify the data within different categories e.g. malicious or normal...

  17. Intrusion resistant underground structure (IRUS) - safety assessment and licensing

    International Nuclear Information System (INIS)

    Lange, B. A.

    1997-01-01

    This paper describes the safety goals, human exposure scenarios and critical groups, the syvac-nsure performance assessment code, groundwater pathway safety results, and inadvertent human intrusion of the IRUS. 2 tabs

  18. Probabilistic risk assessment for six vapour intrusion algorithms

    NARCIS (Netherlands)

    Provoost, J.; Reijnders, L.; Bronders, J.; Van Keer, I.; Govaerts, S.

    2014-01-01

    A probabilistic assessment with sensitivity analysis using Monte Carlo simulation for six vapour intrusion algorithms, used in various regulatory frameworks for contaminated land management, is presented here. In addition a deterministic approach with default parameter sets is evaluated against

  19. Simulation of sea water intrusion in coastal aquifers

    Indian Academy of Sciences (India)

    dependent miscible flow and transport modelling approach for simulation of seawater intrusion in coastal aquifers. A nonlinear optimization-based simulation methodology was used in this study. Various steady state simulations are performed for a ...

  20. Large-Scale Phylogenomic Analysis Reveals the Complex Evolutionary History of Rabies Virus in Multiple Carnivore Hosts.

    Directory of Open Access Journals (Sweden)

    Cécile Troupin

    2016-12-01

    Full Text Available The natural evolution of rabies virus (RABV provides a potent example of multiple host shifts and an important opportunity to determine the mechanisms that underpin viral emergence. Using 321 genome sequences spanning an unprecedented diversity of RABV, we compared evolutionary rates and selection pressures in viruses sampled from multiple primary host shifts that occurred on various continents. Two major phylogenetic groups, bat-related RABV and dog-related RABV, experiencing markedly different evolutionary dynamics were identified. While no correlation between time and genetic divergence was found in bat-related RABV, the evolution of dog-related RABV followed a generally clock-like structure, although with a relatively low evolutionary rate. Subsequent molecular clock dating indicated that dog-related RABV likely underwent a rapid global spread following the intensification of intercontinental trade starting in the 15th century. Strikingly, although dog RABV has jumped to various wildlife species from the order Carnivora, we found no clear evidence that these host-jumping events involved adaptive evolution, with RABV instead characterized by strong purifying selection, suggesting that ecological processes also play an important role in shaping patterns of emergence. However, specific amino acid changes were associated with the parallel emergence of RABV in ferret-badgers in Asia, and some host shifts were associated with increases in evolutionary rate, particularly in the ferret-badger and mongoose, implying that changes in host species can have important impacts on evolutionary dynamics.

  1. multiUQ: An intrusive uncertainty quantification tool for gas-liquid multiphase flows

    Science.gov (United States)

    Turnquist, Brian; Owkes, Mark

    2017-11-01

    Uncertainty quantification (UQ) can improve our understanding of the sensitivity of gas-liquid multiphase flows to variability about inflow conditions and fluid properties, creating a valuable tool for engineers. While non-intrusive UQ methods (e.g., Monte Carlo) are simple and robust, the cost associated with these techniques can render them unrealistic. In contrast, intrusive UQ techniques modify the governing equations by replacing deterministic variables with stochastic variables, adding complexity, but making UQ cost effective. Our numerical framework, called multiUQ, introduces an intrusive UQ approach for gas-liquid flows, leveraging a polynomial chaos expansion of the stochastic variables: density, momentum, pressure, viscosity, and surface tension. The gas-liquid interface is captured using a conservative level set approach, including a modified reinitialization equation which is robust and quadrature free. A least-squares method is leveraged to compute the stochastic interface normal and curvature needed in the continuum surface force method for surface tension. The solver is tested by applying uncertainty to one or two variables and verifying results against the Monte Carlo approach. NSF Grant #1511325.

  2. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  3. Environmental data processor of the adaptive intrusion data system

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1977-06-01

    A data acquisition system oriented specifically toward collection and processing of various meteorological and environmental parameters has been designed around a National Semiconductor IMP-16 microprocessor, This system, called the Environmental Data Processor (EDP), was developed specifically for use with the Adaptive Intrusion Data System (AIDS) in a perimeter intrusion alarm evaluation, although its design is sufficiently general to permit use elsewhere. This report describes in general detail the design of the EDP and its interaction with other AIDS components

  4. Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

    OpenAIRE

    Jingyu Wang; xuefeng Zheng; Dengliang Luo

    2011-01-01

    Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in...

  5. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  6. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  7. When Intrusion Detection Meets Blockchain Technology: A Review

    OpenAIRE

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju; Wang, Yu; Han, Jinguang

    2018-01-01

    With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks. In order to enhance the detection capability of a single IDS, collaborative intrusion detection networks (or collaborative IDSs) have been developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness ...

  8. Multisensor Fusion for Intrusion Detection and Situational Awareness

    OpenAIRE

    Hallstensen, Christoffer V

    2017-01-01

    Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent them. The question is,therefore, how to create leverage to protect an organization by improving in-trusion detection and situational awareness? This thesis seeks to contribute tothe prior art in intrusion detection and situational awareness by using a multi-sensor data fusion...

  9. Unique Challenges in WiFi Intrusion Detection

    OpenAIRE

    Milliken, Jonny

    2014-01-01

    The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more deta...

  10. Home care for children with multiple complex chronic conditions at the end of life: The choice of hospice versus home health.

    Science.gov (United States)

    Lindley, Lisa C; Mixer, Sandra J; Mack, Jennifer W

    2016-01-01

    Families desire to bring their children home at end of life, and this creates a variety of unique care needs at home. This study analyzed the child and family factors associated with hospice versus home health care use in the last year of life among children with multiple complex chronic conditions. Using the Andersen Behavioral Healthcare Utilization Model, the predisposing, enabling, and need factors of the child and family were shown to be significant predictors of hospice and home health care use. Hospice and home health care have advantages, and families may wish to use the service that best fits their needs.

  11. Post-transcriptional generation of miRNA variants by multiple nucleotidyl transferases contributes to miRNA transcriptome complexity

    OpenAIRE

    Wyman, Stacia K.; Knouf, Emily C.; Parkin, Rachael K.; Fritz, Brian R.; Lin, Daniel W.; Dennis, Lucas M.; Krouse, Michael A.; Webster, Philippa J.; Tewari, Muneesh

    2011-01-01

    Modification of microRNA sequences by the 3′ addition of nucleotides to generate so-called “isomiRs” adds to the complexity of miRNA function, with recent reports showing that 3′ modifications can influence miRNA stability and efficiency of target repression. Here, we show that the 3′ modification of miRNAs is a physiological and common post-transcriptional event that shows selectivity for specific miRNAs and is observed across species ranging from C. elegans to human. The modifications resul...

  12. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  13. Rapid laccolith intrusion driven by explosive volcanic eruption.

    Science.gov (United States)

    Castro, Jonathan M; Cordonnier, Benoit; Schipper, C Ian; Tuffen, Hugh; Baumann, Tobias S; Feisel, Yves

    2016-11-23

    Magmatic intrusions and volcanic eruptions are intimately related phenomena. Shallow magma intrusion builds subsurface reservoirs that are drained by volcanic eruptions. Thus, the long-held view is that intrusions must precede and feed eruptions. Here we show that explosive eruptions can also cause magma intrusion. We provide an account of a rapidly emplaced laccolith during the 2011 rhyolite eruption of Cordón Caulle, Chile. Remote sensing indicates that an intrusion began after eruption onset and caused severe (>200 m) uplift over 1 month. Digital terrain models resolve a laccolith-shaped body ∼0.8 km 3 . Deformation and conduit flow models indicate laccolith depths of only ∼20-200 m and overpressures (∼1-10 MPa) that likely stemmed from conduit blockage. Our results show that explosive eruptions may rapidly force significant quantities of magma in the crust to build laccoliths. These iconic intrusions can thus be interpreted as eruptive features that pose unique and previously unrecognized volcanic hazards.

  14. Fusion of arkosic sand by intrusive andesite

    Science.gov (United States)

    Bailey, Roy A.

    1954-01-01

    An andesite dike in the Valles Mountains of northern New Mexico has intruded and partly fused arkosic sediments for a distance of 50 feet from its contacts. The dike is semi-circular in form, has a maximum width of about 100 feet, and is about 500 feet long. Small associated arcuate dikes are arranged in spiral fashion around the main dike, suggesting that they were intruded along shear fractures similar to those described by Burbank (1941). The fused rocks surrounding the andesite dike are of three general types: 1) partly fused arkosic sand, 2) fused clay, and 3) hybrid rocks. The fused arkosic sand consists of relict detrital grains of quartz, orthoclose, and plagioclase, imbedded in colorless glass containing microlites of tridymite, cordierite, and magnetite. The relict quartz grains are corroded and embayed by glass; the orthoclase is sanidinized and partly fused; and the plagioclase is inverted to the high temperature form and is partly fused. The fused clay, which was originally a mixture of montmorillonite and hydromica, consists primarily of cordierite but also contains needle-like crystals of sillimanite (?) or mullite (?). The hybrid rocks originated in part by intermixing of fused arkosic sediments and andesitic liquid and in part by diffusion of mafic constituents through the fused sediments. They are rich in cordierite and magnetite and also contain hypersthene, augite, and plagioclase. The composition of pigeonite in the andesite indicates that the temperature of the andesite at the time of intrusion probably did not exceed 1200?C. Samples of arkosic sand were fused in the presence of water in a Morey bomb at 1050?C. Stability relations of certain minerals in the fused sand suggest that fusion may have taken place at a lower temperature, however, and the fluxing action of volatiles from the andesite are thought to have made this possible.

  15. Non-Intrusive Battery Health Monitoring

    Directory of Open Access Journals (Sweden)

    Gajewski Laurent

    2017-01-01

    Full Text Available The “Non-intrusive battery health monitoring”, developed by Airbus Defence and Space (ADS in cooperation with the CIRIMAT-CNRS laboratory and supported by CNES, aims at providing a diagnosis of the battery ageing in flight, called State of Health (SOH, using only the post-treatment of the battery telemetries. The battery current and voltage telemetries are used by a signal processing tool on ground to characterize and to model the battery at low frequencies which allows monitoring the evolution of its degradation with great accuracy. The frequential behaviour estimation is based on inherent disturbances on the current during the nominal functioning of the battery. For instance, on-board thermal control or equipment consumption generates random disturbances on battery current around an average current. The battery voltage response to these current random disturbances enables to model the low frequency impedance of the battery by a signal processing tool. The re-created impedance is then compared with the evolution model of the low frequencies impedance as a function of the battery ageing to estimate accurately battery degradation. Hence, this method could be applied to satellites which are already in orbit and whose battery telemetries acquisition system fulfils the constraints determined in the study. This innovative method is an improvement of present state-of-the-art and is important to have a more accurate in-flight knowledge of battery ageing which is crucial for mission and operation planning and also for possible satellite mission extension or deorbitation. This method is patented by Airbus Defence and Space and CNES.

  16. Disorder in materials with complex crystal structures: the Non-Local Coherent Potential Approximation for compounds with multiple sublattices

    International Nuclear Information System (INIS)

    Marmodoro, A; Staunton, J B

    2011-01-01

    Over the last few years the Non-Local Coherent Potential Approximation (NL-CPA) has been shown to provide an effective way to describe the electronic structure and related properties of disordered systems, where short-range order (SRO) and other local environment effects are important. Here we present its generalization to materials with multi-atom per unit cell lattices. The method is described using a Green function formalism and illustrated by an implementation for a simplified one-dimensional tight-binding model with substitutional disorder. This development paves the way for a natural reimplementation of the Korringa-Kohn-Rostoker (KKR) multiple scattering solution of Kohn-Sham equations for ab-initio calculations of real materials.

  17. Multiple primary malignancies of the liver and the colon: a complex diagnostic and decisional process with a final unanswered question.

    Science.gov (United States)

    Portolani, Nazario; Baiocchi, Gianluca; Baronchelli, Carla; Gheza, Federico; Giulini, Stefano Maria

    2014-03-29

    We herein present the case of a 78-year-old man with an incidental finding of a solid hepatic mass without symptoms and only a laparotomic cholecystectomy for acute cholecystitis in the past surgical history. A colonoscopy, a magnetic resonance imaging scan, a positron emission tomography scan, and a computed tomography scan completed the preoperative workup: a neoplastic lesion 4.3×3 cm in size was diagnosed at segments IV and V, associated with a neoplastic involvement of the splenic flexure without signs of colonic occlusion. After colonic resection, a frozen section on a granulomatous-like tissue at gastric border suggested a diagnosis of an adenocarcinoma of bilio-pancreatic type, changing the surgical strategy to include gastric resection and hepatic pedicle node dissection. The discussion turns around the idea that a final diagnosis of colon cancer with regional nodal involvement (pT3N1) and metastatic gallbladder cancer with multiple peritoneal seedings cannot be excluded.

  18. Caring for people with chronic disease: is 'muddling through' the best way to handle the multiple complexities?

    Science.gov (United States)

    Sturmberg, Joachim P

    2012-12-01

    It is stated everywhere that chronic care poses one of the biggest challenges for the future of medicine. Critical analysis however suggests that these statements are oversimplistic and based on limited, and at times, spurious assumptions. This paper highlights some basic realities: epidemiology shows that at any time, 80% of people experience 'good enough health', and that only 0.8% require tertiary medical care; most people with chronic conditions experience a stable illness trajectory; 'true' multi-morbidity is a pattern of advanced age; ageing and the physiological decline of our organ systems is a slow and steady process starting at the age of 30; and, as our health declines in a variety of patterns with disease and ageing, our psycho-socio-semiotic care needs increase dramatically. I argue that managing the complexities associated with chronic disease care successfully requires an equally complex management approach, 'muddling through', defined by Lindblom as making decisions based on successive limited comparisons. Our patients - rightly - expect that we make these decisions in their best interest. Individual health care professionals and health care policy makers firmly need to put the patient at the centre of the health care system. © 2012 Blackwell Publishing Ltd.

  19. Effects of training on short- and long-term skill retention in a complex multiple-task environment.

    Science.gov (United States)

    Sauer, J; Hockey, G R; Wastell, D G

    2000-12-01

    The paper reports the results of an experiment on the performance and retention of a complex task. This was a computer-based simulation of the essential elements of a spacecraft's life support system. It allowed the authors to take a range of measures, including primary and secondary task performance, system intervention and information sampling strategies, mental model structure, and subjective operator state. The study compared the effectiveness of two methods of training, based on low level (procedure-based) and high level (system-based) understanding. Twenty-five participants were trained extensively on the task, then given a 1-h testing session. A second testing session was carried out 8 months after the first (with no intervening practice) with 17 of the original participants. While training had little effect on control performance, there were considerable effects on system management strategies, as well as in structure of operator's mental model. In the second testing session, the anticipated general performance decrement did not occur, though for complex faults there was an increase in selectivity towards the primary control task. The relevance of the findings for training and skill retention in real work environments is discussed in the context of a model of compensatory control.

  20. Out of Arabia: a complex biogeographic history of multiple vicariance and dispersal events in the gecko genus Hemidactylus (Reptilia: Gekkonidae).

    Science.gov (United States)

    Smíd, Jiří; Carranza, Salvador; Kratochvíl, Lukáš; Gvoždík, Václav; Nasher, Abdul Karim; Moravec, Jiří

    2013-01-01

    The geological history of the Arabian Peninsula has played a crucial role in shaping current diversity and distribution patterns of many Arabian and African faunal elements. The gecko genus Hemidactylus is not an exception. In this study, we provide an insight into the phylogeny and systematics of 45 recognized species of the so-called Arid clade of the genus Hemidactylus from Arabia, the Horn of Africa, the Levant and Iran. The material comprises 358 specimens sequenced for up to two mitochondrial (12S rRNA, cytochrome b) and four nuclear (mc1r, cmos, rag1, rag2) genes with 4766 bp of the concatenated alignment length. A robust calibrated phylogeny and reconstruction of historical biogeography are inferred. We link the history of this genus with major geological events that occurred in the region within the last 30 million years. Two basal divergences correspond with the break-ups of the Arabian and African landmasses and subsequent separation of Socotra from the Arabian mainland, respectively, segregating the genus by means of vicariance. Formation of the Red Sea led to isolation and subsequent radiation in the Arabian Peninsula, which was followed by multiple independent expansions: 13.1 Ma to Iran; 9.8 Ma to NE Africa; 8.2 to Socotra Archipelago; 7-7.3 Ma two colonizations to the Near East; 5.9 Ma to NE Africa; and 4.1 to Socotra. Moreover, using multiple genetic markers we detected cryptic diversity within the genus, particularly in south-western Arabia and the Ethiopian highlands, and confirmed the existence of at least seven new species in the area. These findings highlight the role of Arabia and the Horn of Africa as an important Hemidactylus diversity hotspot.

  1. Out of Arabia: a complex biogeographic history of multiple vicariance and dispersal events in the gecko genus Hemidactylus (Reptilia: Gekkonidae.

    Directory of Open Access Journals (Sweden)

    Jiří Smíd

    Full Text Available The geological history of the Arabian Peninsula has played a crucial role in shaping current diversity and distribution patterns of many Arabian and African faunal elements. The gecko genus Hemidactylus is not an exception. In this study, we provide an insight into the phylogeny and systematics of 45 recognized species of the so-called Arid clade of the genus Hemidactylus from Arabia, the Horn of Africa, the Levant and Iran. The material comprises 358 specimens sequenced for up to two mitochondrial (12S rRNA, cytochrome b and four nuclear (mc1r, cmos, rag1, rag2 genes with 4766 bp of the concatenated alignment length. A robust calibrated phylogeny and reconstruction of historical biogeography are inferred. We link the history of this genus with major geological events that occurred in the region within the last 30 million years. Two basal divergences correspond with the break-ups of the Arabian and African landmasses and subsequent separation of Socotra from the Arabian mainland, respectively, segregating the genus by means of vicariance. Formation of the Red Sea led to isolation and subsequent radiation in the Arabian Peninsula, which was followed by multiple independent expansions: 13.1 Ma to Iran; 9.8 Ma to NE Africa; 8.2 to Socotra Archipelago; 7-7.3 Ma two colonizations to the Near East; 5.9 Ma to NE Africa; and 4.1 to Socotra. Moreover, using multiple genetic markers we detected cryptic diversity within the genus, particularly in south-western Arabia and the Ethiopian highlands, and confirmed the existence of at least seven new species in the area. These findings highlight the role of Arabia and the Horn of Africa as an important Hemidactylus diversity hotspot.

  2. Mouse hippocampal GABAB1 but not GABAB2 subunit-containing receptor complex levels are paralleling retrieval in the multiple-T-maze

    Directory of Open Access Journals (Sweden)

    Soheil eKeihan Falsafi

    2015-10-01

    Full Text Available GABAB receptors are heterodimeric G-protein coupled receptors known to be involved in learning and memory. Although a role for GABAB receptors in cognitive processes is evident, there is no information on hippocampal GABAB receptor complexes in a multiple T maze (MTM task, a robust paradigm for evaluation of spatial learning.Trained or untrained (yoked control C57BL/6J male mice (n=10/group were subjected to the MTM task and sacrificed 6 hours following their performance. Hippocampi were taken, membrane proteins extracted and run on blue native PAGE followed by immunoblotting with specific antibodies against GABAB1, GABAB1a and GABAB2. Immunoprecipitation with subsequent mass spectrometric identification of co-precipitates was carried out to show if GABAB1 and GABAB2 as well as other interacting proteins co-precipitate. An antibody shift assay (ASA and a proximity ligation assay (PLA were also used to see if the two GABAB subunits are present in the receptor complex.Single bands were observed on Western blots, each representing GABAB1, GABAB1a or GABAB2 at an apparent molecular weight of approximately 100 kDa. Subsequently, densitometric analysis revealed that levels of GABAB1 and GABAB1a but not GABAB2- containing receptor complexes were significantly higher in trained than untrained groups. Immunoprecipitation followed by mass spectrometric studies confirmed the presence of GABAB1, GABAB2, calcium calmodulin kinases I and II, GluA1 and GluA2 as constituents of the complex. ASA and PLA also showed the presence of the two subunits of GABAB receptor within the complex. It is shown that increased levels of GABAB1 subunit-containing complexes are paralleling performance in a land maze.

  3. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  4. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    Science.gov (United States)

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  5. Matrix elements of the electric multiple transition and relativistic correction operators in the case of complex configurations

    International Nuclear Information System (INIS)

    Kanyauskas, Yu.M.; Rudzikas, Z.B.

    1976-01-01

    Operators and their submatrix elements are studied in the framework of the electric multipole transitions of complex atoms with account of relativistic corrections of the order of the square of the fine structure constant. The analysis is performed by means of irreducible tensor operators and genealogical coefficients. It has been assumed that angular momenta of individual shells are coupled with each other according to ls, lk, jk and jj coupling. Formulas are given for the operator which causes the relativistic corrections for the single-electron multipole transition and for its submatrix element in the case of configurations with two unfilled shells. A possibility is discussed of using the formulas suggested for calculation. As follows from analysis, the relativistic correction operators even with the pure ls coupling allow intercombination transitions with ΔS equals +-1. The expressions obtained may turn out to be useful for performing calculations in the case of the intermediate type of coupling

  6. Electron transfer across multiple hydrogen bonds: the case of ureapyrimidinedione-substituted vinyl ruthenium and osmium complexes.

    Science.gov (United States)

    Pichlmaier, Markus; Winter, Rainer F; Zabel, Manfred; Zális, Stanislav

    2009-04-08

    Ruthenium and osmium complexes 2a,b and 3a,b featuring the N-4,6-dioxo-5,5-dibutyl- or the N-4,6-dioxo-5,5-di-(2-propenyl)-1,4,5,6-tetrahydropyrimidin-2-yl-N'(4-ethenylphenyl)-urea ligand dimerize by a self-complementary quadruply hydrogen-bonding donor/donor/acceptor/acceptor (DDAA) motif. We provide evidence that the dimeric structures are maintained in nonpolar solvents and in 0.1 M NBu(4)PF(6)/CH(2)Cl(2) supporting electrolyte solution. All complexes are reversibly oxidized in two consecutive two-electron oxidations (DeltaE(1/2) approximately = 500 mV) without any discernible potential splitting for the oxidation of the individual hydrogen-bridged redox active moieties. IR and UV/vis/NIR spectroelectrochemistry show a one-step conversion of the neutral to the dication without any discernible features of an intermediate monooxidized radical cation. Oxidation-induced IR changes of the NH and CO groups that are involved in hydrogen bonding are restricted to the styryl-bonded urea NH function. IR band assignments are aided by quantum chemical calculations. Our experimental findings clearly show that, at least in the present systems, the ureapyrimidinedione (Upy) DDAA hydrogen-bonding motif does not support electron transfer. The apparent reason is that neither of the hydrogen-bonding functionalities contributes to the occupied frontier levels. This results in nearly degenerate pairs of MOs representing the in-phase and out-of-phase combinations of the individual monomeric building blocks.

  7. Reduced gas seepages in ophiolitic complexes: Evidences for multiple origins of the H2-CH4-N2 gas mixtures

    Science.gov (United States)

    Vacquand, Christèle; Deville, Eric; Beaumont, Valérie; Guyot, François; Sissmann, Olivier; Pillot, Daniel; Arcilla, Carlo; Prinzhofer, Alain

    2018-02-01

    This paper proposes a comparative study of reduced gas seepages occurring in ultrabasic to basic rocks outcropping in ophiolitic complexes based on the study of seepages from Oman, the Philippines, Turkey and New Caledonia. This study is based on analyses of the gas chemical composition, noble gases contents, stable isotopes of carbon, hydrogen and nitrogen. These seepages are mostly made of mixtures of three main components which are H2, CH4 and N2 in various proportions. The relative contents of the three main gas components show 4 distinct types of gas mixtures (H2-rich, N2-rich, N2-H2-CH4 and H2-CH4). These types are interpreted as reflecting different zones of gas generation within or below the ophiolitic complexes. In the H2-rich type, associated noble gases display signatures close to the value of air. In addition to the atmospheric component, mantle and crustal contributions are present in the N2-rich, N2-H2-CH4 and H2-CH4 types. H2-bearing gases are either associated with ultra-basic (pH 10-12) spring waters or they seep directly in fracture systems from the ophiolitic rocks. In ophiolitic contexts, ultrabasic rocks provide an adequate environment with available Fe2+ and alkaline conditions that favor H2 production. CH4 is produced either directly by reaction of dissolved CO2 with basic-ultrabasic rocks during the serpentinization process or in a second step by H2-CO2 interaction. H2 is present in the gas when no more carbon is available in the system to generate CH4. The N2-rich type is notably associated with relatively high contents of crustal 4He and in this gas type N2 is interpreted as issued mainly from sediments located below the ophiolitic units.

  8. Perceived illness intrusions among continuous ambulatory peritoneal dialysis patients

    Directory of Open Access Journals (Sweden)

    Usha Bapat

    2012-01-01

    Full Text Available To study the perceived illness intrusion of continuous ambulatory peritoneal dialysis (CAPD patients, to examine their demographics, and to find out the association among demographics, duration of illness as well as illness intrusion, 40 chronic kidney disease stage V patients on CAPD during 2006-2007 were studied. Inclusion criteria were patients′ above 18 years, willing, stable, and completed at least two months of dialysis. Those with psychiatric co-morbidity were excluded. Sociodemographics were collected using a semi-structured interview schedule. A 14-item illness intrusion checklist covering various aspects of life was administered. The subjects had to rate the illness intrusion in their daily life and the extent of intrusion. The data was analyzed using descriptive statistics and chi square test of association. The mean age of the subjects was 56.05 ± 10.05 years. There was near equal distribution of gender. 82.5% were married, 70.0% belonged to Hindu religion, 45.0% were pre-degree, 25.0% were employed, 37.5% were housewives and 30.0% had retired. 77.5% belonged to the upper socioeconomic strata, 95.0% were from an urban background and 65.0% were from nuclear families. The mean duration of dialysis was 19.0 ± 16.49 months. Fifty-eight percent of the respondents were performing the dialysis exchanges by themselves. More than 95.0%were on three or four exchanges per day. All the 40 subjects reported illness intrusion in their daily life. Intrusion was perceived to some extent in the following areas: health 47.5%, work 25.0%, finance 37.5%, diet 40.0%, and psychological 50.0%. Illness had not intruded in the areas of relationship with spouse 52.5%, sexual life 30.0%, with friends 92.5%, with family 85.5%, social functions 52.5%, and religious functions 75.0%. Statistically significant association was not noted between illness intrusion and other variables. CAPD patients perceived illness intrusion to some extent in their daily life

  9. Macroscopically constrained Wang-Landau method for systems with multiple order parameters and its application to drawing complex phase diagrams

    Science.gov (United States)

    Chan, C. H.; Brown, G.; Rikvold, P. A.

    2017-05-01

    A generalized approach to Wang-Landau simulations, macroscopically constrained Wang-Landau, is proposed to simulate the density of states of a system with multiple macroscopic order parameters. The method breaks a multidimensional random-walk process in phase space into many separate, one-dimensional random-walk processes in well-defined subspaces. Each of these random walks is constrained to a different set of values of the macroscopic order parameters. When the multivariable density of states is obtained for one set of values of fieldlike model parameters, the density of states for any other values of these parameters can be obtained by a simple transformation of the total system energy. All thermodynamic quantities of the system can then be rapidly calculated at any point in the phase diagram. We demonstrate how to use the multivariable density of states to draw the phase diagram, as well as order-parameter probability distributions at specific phase points, for a model spin-crossover material: an antiferromagnetic Ising model with ferromagnetic long-range interactions. The fieldlike parameters in this model are an effective magnetic field and the strength of the long-range interaction.

  10. Navigating the Complexity of Socio-scientific Controversies—How Students Make Multiple Voices Present in Discourse

    Science.gov (United States)

    Solli, Anne; Hillman, Thomas; Mäkitalo, Åsa

    2017-10-01

    In this article, we argue that students' unfolding discourse on socio-scientific issues (SSI) can be fruitfully analyzed by using dialogical theories of language and communication (Bakhtin 1986; Linell 2009). While research in science education often reports on how individual reasoning changes when bringing SSI into the classroom, we argue for the relevance of analyzing how the individual is "in dialogue" with present as well as remote interlocutors and contexts on the internet. We suggest that the analytical approach is particularly sensitized to illuminate how students' handle multiple perspectives. A dialogical perspective takes as its premise that SSI are part of society, where politicians, interest groups, and scientists engage in debates and offer perspectives that are often in conflict. Rather than assuming that the individual student is the primary unit for analysis, a dialogical approach is premised on an analysis that incorporates several perspectives and voices—a multivocality that also resides with the individual. Arguing for the relevance of this analytical approach to studies of SSI in the classroom, we analyze a group of students in upper secondary school as they discuss hydraulic fracturing after having worked with online data. The results illuminate how students discursively manage multivocality and multimodality inherent in the following SSI online. We describe a set of discursive means that the students use to handle the many perspectives involved when communicating about the issue. In addition, we describe and articulate what kind of communicative competences that are involved and, hence, could be cultivated through education, when engaging in public debates.

  11. Assessment of multiple sources of anthropogenic and natural chemical inputs to a morphologically complex basin, Lake Mead, USA

    Science.gov (United States)

    Rosen, Michael R.; Van Metre, P.C.

    2010-01-01

    Lakes with complex morphologies and with different geologic and land-use characteristics in their sub-watersheds could have large differences in natural and anthropogenic chemical inputs to sub-basins in the lake. Lake Mead in southern Nevada and northern Arizona, USA, is one such lake. To assess variations in chemical histories from 1935 to 1998 for major sub-basins of Lake Mead, four sediment cores were taken from three different parts of the reservoir (two from Las Vegas Bay and one from the Overton Arm and Virgin Basin) and analyzed for major and trace elements, radionuclides, and organic compounds. As expected, anthropogenic contaminant inputs are greatest to Las Vegas Bay reflecting inputs from the Las Vegas urban area, although concentrations are low compared to sediment quality guidelines and to other USA lakes. One exception to this pattern was higher Hg in the Virgin Basin core. The Virgin Basin core is located in the main body of the lake (Colorado River channel) and is influenced by the hydrology of the Colorado River, which changed greatly with completion of Glen Canyon Dam upstream in 1963. Major and trace elements in the core show pronounced shifts in the early 1960s and, in many cases, gradually return to concentrations more typical of pre-1960s by the 1980s and 1990s, after the filling of Lake Powell. The Overton Arm is the sub-basin least effected by anthropogenic contaminant inputs but has a complex 137Cs profile with a series of large peaks and valleys over the middle of the core, possibly reflecting fallout from nuclear tests in the 1950s at the Nevada Test Site. The 137Cs profile suggests a much greater sedimentation rate during testing which we hypothesize results from greatly increased dust fall on the lake and Virgin and Muddy River watersheds. The severe drought in the southwestern USA during the 1950s might also have played a role in variations in sedimentation rate in all of the cores. ?? 2009.

  12. An investigation of multidisciplinary complex health care interventions - steps towards an integrative treatment model in the rehabilitation of People with Multiple Sclerosis

    Directory of Open Access Journals (Sweden)

    Skovgaard Lasse

    2012-04-01

    Full Text Available Abstract Background The Danish Multiple Sclerosis Society initiated a large-scale bridge building and integrative treatment project to take place from 2004–2010 at a specialized Multiple Sclerosis (MS hospital. In this project, a team of five conventional health care practitioners and five alternative practitioners was set up to work together in developing and offering individualized treatments to 200 people with MS. The purpose of this paper is to present results from the six year treatment collaboration process regarding the development of an integrative treatment model. Discussion The collaborative work towards an integrative treatment model for people with MS, involved six steps: 1 Working with an initial model 2 Unfolding the different treatment philosophies 3 Discussing the elements of the Intervention-Mechanism-Context-Outcome-scheme (the IMCO-scheme 4 Phrasing the common assumptions for an integrative MS program theory 5 Developing the integrative MS program theory 6 Building the integrative MS treatment model. The model includes important elements of the different treatment philosophies represented in the team and thereby describes a common understanding of the complexity of the courses of treatment. Summary An integrative team of practitioners has developed an integrative model for combined treatments of People with Multiple Sclerosis. The model unites different treatment philosophies and focuses on process-oriented factors and the strengthening of the patients’ resources and competences on a physical, an emotional and a cognitive level.

  13. Ecological water quality assessment in the Guapiaçu-Macacu hydrographic complex (Rio de Janeiro, Brazil using multiple indicators

    Directory of Open Access Journals (Sweden)

    Priscilla S. Pereira

    2014-07-01

    Full Text Available A quick diagnosis of the ecological quality of five sections of the Macacu-Guapiaçu hydrographic complex was performed using visual assessment protocol (VAP, conventional analysis, composition and structure of ciliates and the occurrence of benthic macro invertebrates. Water samples were collected from five sampling stations (A-E in July of 2010. Protists were sampled with aid of artificial substrates, and macro invertebrates were sampled using the multi-habitat method. A total of 22 taxa of protozoa and 51 taxa of macro invertebrates was registered at the five stations. Reference station (A showed greater protist diversity and higher values of BMWP-CETEC and IBE-IOC indices relating to macro invertebrates. The impacted stations (B and E presented lower diversity and higher abundance of protozoa, as well as the lowest values for the rates. The four methods used were convergent to diagnose reference station (A, the impacted stations (B and E and those in intermediate conditions (C and D. Thus, the methods were complementary, as the conventional parameters and ciliate assembly were more sensitive to detecting the increase in organic pollution and VAP and macro invertebrate assembly detected changes in geomorphology and habitat degradation.

  14. Intrusion Pattern of the Offshore Kuroshio Branch Current and Its Effects on Nutrient Contributions in the East China Sea

    Science.gov (United States)

    Wang, Wentao; Yu, Zhiming; Song, Xiuxian; Yuan, Yongquan; Wu, Zaixing; Zhou, Peng; Cao, Xihua

    2018-03-01

    During the autumn season of 2014 (October-November), nutrient samples and nitrogen and oxygen isotope samples from the East China Sea (ECS) were collected and analyzed, and auxiliary physical parameters were determined. Distinctive high-salinity water column conditions with significant haloclines and pycnoclines similar to those observed during the spring were detected at the bottom of the ECS during the autumn. These water column conditions were attributed to the intrusion of the Kuroshio Subsurface Water (KSSW), which then separated into two currents, including the Offshore Kuroshio Branch Current (OKBC). Compared with spring, this intrusion transported higher phosphorus (P) concentrations onto the ECS continental shelf in autumn. However, according to multiple analyses, biogeochemical nitrogen processes are unable to explain the variations in the P concentrations (increase) while assuming that each distinctive water column is consistent. Identifying the water columns by their salinities and P concentrations revealed that the northern ECS water column was similar to the deep KSSW while the southern ECS water column was similar to the shallow KSSW. Therefore, we speculate that the distinctions among the seasonal variations of P-enriched water masses were attributable to the different intrusion positions of the Kuroshio. The shift of the KSSW intrusion location moved toward the northeast during the autumn relative to the spring. This shift, which was proved by the oceanic vortex data, caused the deeper KSSW water upwelled to the ECS and formed the OKBC, thereby supplying additional P during the autumn.

  15. Structural and dynamical insights on HLA-DR2 complexes that confer susceptibility to multiple sclerosis in Sardinia: a molecular dynamics simulation study.

    Directory of Open Access Journals (Sweden)

    Amit Kumar

    Full Text Available Sardinia is a major Island in the Mediterranean with a high incidence of multiple sclerosis, a chronic autoimmune inflammatory disease of the central nervous system. Disease susceptibility in Sardinian population has been associated with five alleles of major histocompatibility complex (MHC class II DRB1 gene. We performed 120 ns of molecular dynamics simulation on one predisposing and one protective alleles, unbound and in complex with the two relevant peptides: Myelin Basic Protein and Epstein Barr Virus derived peptide. In particular we focused on the MHC peptide binding groove dynamics. The predisposing allele was found to form a stable complex with both the peptides, while the protective allele displayed stability only when bound with myelin peptide. The local flexibility of the MHC was probed dividing the binding groove into four compartments covering the well known peptide anchoring pockets. The predisposing allele in the first half cleft exhibits a narrower and more rigid groove conformation in the presence of myelin peptide. The protective allele shows a similar behavior, while in the second half cleft it displays a narrower and more flexible groove conformation in the presence of viral peptide. We further characterized these dynamical differences by evaluating H-bonds, hydrophobic and stacking interaction networks, finding striking similarities with super-type patterns emerging in other autoimmune diseases. The protective allele shows a defined preferential binding to myelin peptide, as confirmed by binding free energy calculations. All together, we believe the presented molecular analysis could help to design experimental assays, supports the molecular mimicry hypothesis and suggests that propensity to multiple sclerosis in Sardinia could be partly linked to distinct peptide-MHC interaction and binding characteristics of the antigen presentation mechanism.

  16. An Excel Macro to Plot the HFE-Diagram to Identify Sea Water Intrusion Phases.

    Science.gov (United States)

    Giménez-Forcada, Elena; Sánchez San Román, F Javier

    2015-01-01

    A hydrochemical facies evolution diagram (HFE-D) is a multirectangular diagram, which is a useful tool in the interpretation of sea water intrusion processes. This method note describes a simple method for generating an HFE-D plot using the spreadsheet software package, Microsoft Excel. The code was applied to groundwater from the alluvial coastal plain of Grosseto (Tuscany, Italy), which is characterized by a complex salinization process in which sea water mixes with sulfate or bicarbonate recharge water. © 2014, National GroundWater Association.

  17. Comparative study of adaptive-noise-cancellation algorithms for intrusion detection systems

    International Nuclear Information System (INIS)

    Claassen, J.P.; Patterson, M.M.

    1981-01-01

    Some intrusion detection systems are susceptible to nonstationary noise resulting in frequent nuisance alarms and poor detection when the noise is present. Adaptive inverse filtering for single channel systems and adaptive noise cancellation for two channel systems have both demonstrated good potential in removing correlated noise components prior detection. For such noise susceptible systems the suitability of a noise reduction algorithm must be established in a trade-off study weighing algorithm complexity against performance. The performance characteristics of several distinct classes of algorithms are established through comparative computer studies using real signals. The relative merits of the different algorithms are discussed in the light of the nature of intruder and noise signals

  18. Efficient Multiple Genome Modifications Induced by the crRNAs, tracrRNA and Cas9 Protein Complex in Zebrafish

    Science.gov (United States)

    Ohga, Rie; Ota, Satoshi; Kawahara, Atsuo

    2015-01-01

    The type II clustered regularly interspaced short palindromic repeats (CRISPR) associated with Cas9 endonuclease (CRISPR/Cas9) has become a powerful genetic tool for understanding the function of a gene of interest. In zebrafish, the injection of Cas9 mRNA and guide-RNA (gRNA), which are prepared using an in vitro transcription system, efficiently induce DNA double-strand breaks (DSBs) at the targeted genomic locus. Because gRNA was originally constructed by fusing two short RNAs CRISPR RNA (crRNA) and trans-activating crRNA (tracrRNA), we examined the effect of synthetic crRNAs and tracrRNA with Cas9 mRNA or Cas9 protein on the genome editing activity. We previously reported that the disruption of tyrosinase (tyr) by tyr-gRNA/Cas9 mRNA causes a retinal pigment defect, whereas the disruption of spns2 by spns2-gRNA1/Cas9 mRNA leads to a cardiac progenitor migration defect in zebrafish. Here, we found that the injection of spns2-crRNA1, tyr-crRNA and tracrRNA with Cas9 mRNA or Cas9 protein simultaneously caused a migration defect in cardiac progenitors and a pigment defect in retinal epithelial cells. A time course analysis demonstrated that the injection of crRNAs and tracrRNA with Cas9 protein rapidly induced genome modifications compared with the injection of crRNAs and tracrRNA with Cas9 mRNA. We further show that the crRNA-tracrRNA-Cas9 protein complex is functional for the visualization of endogenous gene expression; therefore, this is a very powerful, ready-to-use system in zebrafish. PMID:26010089

  19. Multiple correlation analyses revealed complex relationship between DNA methylation and mRNA expression in human peripheral blood mononuclear cells.

    Science.gov (United States)

    Xie, Fang-Fei; Deng, Fei-Yan; Wu, Long-Fei; Mo, Xing-Bo; Zhu, Hong; Wu, Jian; Guo, Yu-Fan; Zeng, Ke-Qin; Wang, Ming-Jun; Zhu, Xiao-Wei; Xia, Wei; Wang, Lan; He, Pei; Bing, Peng-Fei; Lu, Xin; Zhang, Yong-Hong; Lei, Shu-Feng

    2018-01-01

    DNA methylation is an important regulator on the mRNA expression. However, a genome-wide correlation pattern between DNA methylation and mRNA expression in human peripheral blood mononuclear cells (PBMCs) is largely unknown. The comprehensive relationship between mRNA and DNA methylation was explored by using four types of correlation analyses and a genome-wide methylation-mRNA expression quantitative trait locus (eQTL) analysis in PBMCs in 46 unrelated female subjects. An enrichment analysis was performed to detect biological function for the detected genes. Single pair correlation coefficient (r T1 ) between methylation level and mRNA is moderate (-0.63-0.62) in intensity, and the negative and positive correlations are nearly equal in quantity. Correlation analysis on each gene (T4) found 60.1% genes showed correlations between mRNA and gene-based methylation at P correlation (R T4  > 0.8). Methylation sites have regulation effects on mRNA expression in eQTL analysis, with more often observations in region of transcription start site (TSS). The genes under significant methylation regulation both in correlation analysis and eQTL analysis tend to cluster to the categories (e.g., transcription, translation, regulation of transcription) that are essential for maintaining the basic life activities of cells. Our findings indicated that DNA methylation has predictive regulation effect on mRNA with a very complex pattern in PBMCs. The results increased our understanding on correlation of methylation and mRNA and also provided useful clues for future epigenetic studies in exploring biological and disease-related regulatory mechanisms in PBMC.

  20. Complexities in Isolation and Purification of Multiple Viruses from Mixed Viral Infections: Viral Interference, Persistence and Exclusion.

    Directory of Open Access Journals (Sweden)

    Naveen Kumar

    Full Text Available Successful purification of multiple viruses from mixed infections remains a challenge. In this study, we investigated peste des petits ruminants virus (PPRV and foot-and-mouth disease virus (FMDV mixed infection in goats. Rather than in a single cell type, cytopathic effect (CPE of the virus was observed in cocultured Vero/BHK-21 cells at 6th blind passage (BP. PPRV, but not FMDV could be purified from the virus mixture by plaque assay. Viral RNA (mixture transfection in BHK-21 cells produced FMDV but not PPRV virions, a strategy which we have successfully employed for the first time to eliminate the negative-stranded RNA virus from the virus mixture. FMDV phenotypes, such as replication competent but noncytolytic, cytolytic but defective in plaque formation and, cytolytic but defective in both plaque formation and standard FMDV genome were observed respectively, at passage level BP8, BP15 and BP19 and hence complicated virus isolation in the cell culture system. Mixed infection was not found to induce any significant antigenic and genetic diversity in both PPRV and FMDV. Further, we for the first time demonstrated the viral interference between PPRV and FMDV. Prior transfection of PPRV RNA, but not Newcastle disease virus (NDV and rotavirus RNA resulted in reduced FMDV replication in BHK-21 cells suggesting that the PPRV RNA-induced interference was specifically directed against FMDV. On long-term coinfection of some acute pathogenic viruses (all possible combinations of PPRV, FMDV, NDV and buffalopox virus in Vero cells, in most cases, one of the coinfecting viruses was excluded at passage level 5 suggesting that the long-term coinfection may modify viral persistence. To the best of our knowledge, this is the first documented evidence describing a natural mixed infection of FMDV and PPRV. The study not only provides simple and reliable methodologies for isolation and purification of two epidemiologically and economically important groups of

  1. EPR spectroscopy of MRI-related Gd(III) complexes: simultaneous analysis of multiple frequency and temperature spectra, including static and transient crystal field effects.

    Science.gov (United States)

    Rast, S; Borel, A; Helm, L; Belorizky, E; Fries, P H; Merbach, A E

    2001-03-21

    For the first time, a very general theoretical method is proposed to interpret the full electron paramagnetic resonance (EPR) spectra at multiple temperatures and frequencies in the important case of S-state metal ions complexed in liquid solution. This method is illustrated by a careful analysis of the measured spectra of two Gd3+ (S = 7/2) complexes. It is shown that the electronic relaxation mechanisms at the origin of the EPR line shape arise from the combined effects of the modulation of the static crystal field by the random Brownian rotation of the complex and of the transient zero-field splitting. A detailed study of the static crystal field mechanism shows that, contrarily to the usual global models involving only second-order terms, the fourth and sixth order terms can play a non-negligible role. The obtained parameters are well interpreted in the framework of the physics of the various underlying relaxation processes. A better understanding of these mechanisms is highly valuable since they partly control the efficiency of paramagnetic metal ions in contrast agents for medical magnetic resonance imaging (MRI).

  2. Endoplasmic reticulum stress-responsive transcription factor ATF6α directs recruitment of the Mediator of RNA polymerase II transcription and multiple histone acetyltransferase complexes.

    Science.gov (United States)

    Sela, Dotan; Chen, Lu; Martin-Brown, Skylar; Washburn, Michael P; Florens, Laurence; Conaway, Joan Weliky; Conaway, Ronald C

    2012-06-29

    The basic leucine zipper transcription factor ATF6α functions as a master regulator of endoplasmic reticulum (ER) stress response genes. Previous studies have established that, in response to ER stress, ATF6α translocates to the nucleus and activates transcription of ER stress response genes upon binding sequence specifically to ER stress response enhancer elements in their promoters. In this study, we investigate the biochemical mechanism by which ATF6α activates transcription. By exploiting a combination of biochemical and multidimensional protein identification technology-based mass spectrometry approaches, we have obtained evidence that ATF6α functions at least in part by recruiting to the ER stress response enhancer elements of ER stress response genes a collection of RNA polymerase II coregulatory complexes, including the Mediator and multiple histone acetyltransferase complexes, among which are the Spt-Ada-Gcn5 acetyltransferase (SAGA) and Ada-Two-A-containing (ATAC) complexes. Our findings shed new light on the mechanism of action of ATF6α, and they outline a straightforward strategy for applying multidimensional protein identification technology mass spectrometry to determine which RNA polymerase II transcription factors and coregulators are recruited to promoters and other regulatory elements to control transcription.

  3. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  4. Sr isotope tracing of multiple water sources in a complex river system, Noteć River, central Poland

    Energy Technology Data Exchange (ETDEWEB)

    Zieliński, Mateusz, E-mail: mateusz.zielinski@amu.edu.pl [Institute of Geoecology and Geoinformation, Adam Mickiewicz University, Dzięgielowa 27, 61-680 Poznań (Poland); Dopieralska, Jolanta, E-mail: dopieralska@amu.edu.pl [Poznań Science and Technology Park, Adam Mickiewicz University Foundation, Rubież 46, 61-612 Poznań (Poland); Belka, Zdzislaw, E-mail: zbelka@amu.edu.pl [Isotope Laboratory, Adam Mickiewicz University, Dzięgielowa 27, 61-680 Poznań (Poland); Walczak, Aleksandra, E-mail: awalczak@amu.edu.pl [Isotope Laboratory, Adam Mickiewicz University, Dzięgielowa 27, 61-680 Poznań (Poland); Siepak, Marcin, E-mail: siep@amu.edu.pl [Institute of Geology, Adam Mickiewicz University, Maków Polnych 16, 61-606 Poznań (Poland); Jakubowicz, Michal, E-mail: mjakub@amu.edu.pl [Institute of Geoecology and Geoinformation, Adam Mickiewicz University, Dzięgielowa 27, 61-680 Poznań (Poland)

    2016-04-01

    Anthropogenic impact on surface waters and other elements in the environment was investigated in the Noteć River basin in central Poland. The approach was to trace changes in the Sr isotope composition ({sup 87}Sr/{sup 86}Sr) and concentration in space and time. Systematic sampling of the river water shows a very wide range of {sup 87}Sr/{sup 86}Sr ratios, from 0.7089 to 0.7127. This strong variation, however, is restricted to the upper course of the river, whereas the water in the lower course typically shows {sup 87}Sr/{sup 86}Sr values around 0.7104–0.7105. Variations in {sup 87}Sr/{sup 86}Sr are associated with a wide range of Sr concentrations, from 0.14 to 1.32 mg/L. We find that strong variations in {sup 87}Sr/{sup 86}Sr and Sr concentrations can be accounted for by mixing of two end-members: 1) atmospheric waters charged with Sr from the near-surface weathering and wash-out of Quaternary glaciogenic deposits, and 2) waters introduced into the river from an open pit lignite mine. The first reservoir is characterized by a low Sr content and high {sup 87}Sr/{sup 86}Sr ratios, whereas mine waters display opposite characteristics. Anthropogenic pollution is also induced by extensive use of fertilizers which constitute the third source of Sr in the environment. The study has an important implication for future archeological studies in the region. It shows that the present-day Sr isotope signatures of river water, flora and fauna cannot be used unambiguously to determine the “baseline” for bioavailable {sup 87}Sr/{sup 86}Sr in the past. - Highlights: • Sr isotopes fingerprint water sources and their interactions in a complex river system. • Mine waters and fertilizers are critical anthropogenic additions in the river water. • Limited usage of environmental isotopic data in archeological studies. • Sr budget of the river is dynamic and temporary.

  5. Evolutionary Genetic Analysis Uncovers Multiple Species with Distinct Habitat Preferences and Antibiotic Resistance Phenotypes in the Stenotrophomonas maltophilia Complex

    Directory of Open Access Journals (Sweden)

    Luz E. Ochoa-Sánchez

    2017-08-01

    Full Text Available The genus Stenotrophomonas (Gammaproteobacteria has a broad environmental distribution. Stenotrophomonas maltophilia is its best known species because it is a globally emerging, multidrug-resistant (MDR, opportunistic pathogen. Members of this species are known to display high genetic, ecological and phenotypic diversity, forming the so-called S. maltophilia complex (Smc. Heterogeneous resistance and virulence phenotypes have been reported for environmental Smc isolates of diverse ecological origin. We hypothesized that this heterogeneity could be in part due to the potential lumping of several cryptic species in the Smc. Here we used state-of-the-art phylogenetic and population genetics methods to test this hypothesis based on the multilocus dataset available for the genus at pubmlst.org. It was extended with sequences from complete and draft genome sequences to assemble a comprehensive set of reference sequences. This framework was used to analyze 108 environmental isolates obtained in this study from the sediment and water column of four rivers and streams in Central Mexico, affected by contrasting levels of anthropogenic pollution. The aim of the study was to identify species in this collection, defined as genetically cohesive sequence clusters, and to determine the extent of their genetic, ecological and phenotypic differentiation. The multispecies coalescent, coupled with Bayes factor analysis was used to delimit species borders, together with population genetic structure analyses, recombination and gene flow estimates between sequence clusters. These analyses consistently revealed that the Smc contains at least 5 significantly differentiated lineages: S. maltophilia and Smc1 to Smc4. Only S. maltophilia was found to be intrinsically MDR, all its members expressing metallo-β-lactamases (MBLs. The other Smc lineages were not MDR and did not express MBLs. We also obtained isolates related to S. acidaminiphila, S. humi and S. terrae. They

  6. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  7. Intrusion problematic during water supply systems' operation

    Energy Technology Data Exchange (ETDEWEB)

    Mora-Rodriguez, Jesus; Lopez-Jimenez, P. Amparo [Departamento de Ingenieria Hidraulica y Medio Ambiente, Universidad Politecnica de Valencia, Camino de Vera, s/n, 46022, Valencia (Spain); Ramos, Helena M. [Civil Engineering Department and CEHIDRO, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal)

    2011-07-01

    Intrusion through leaks occurrence is a phenomenon when external fluid comes into water pipe systems. This phenomenon can cause contamination problems in drinking pipe systems. Hence, this paper focuses on the entry of external fluids across small leaks during normal operation conditions. This situation is especially important in elevated points of the pipe profile. Pressure variations can origin water volume losses and intrusion of contaminants into the drinking water pipes. This work focuses in obtaining up the physical representation on a specific case intrusion in a pipe water system. The combination of two factors is required to generate this kind of intrusion in a water supply system: on one hand the existence of at least a leak in the system; on the other hand, a pressure variation could occur during the operation of the system due to consumption variation, pump start-up or shutdown. The potential of intrusion during a dynamic or transient event is here analyzed. To obtain this objective an experimental case study of pressure transient scenario is analyzed with a small leak located nearby the transient source.

  8. "Bunched Black Swans" in Complex Geosystems: Cross-Disciplinary Approaches to the Additive and Multiplicative Modelling of Correlated Extreme Bursts

    Science.gov (United States)

    Watkins, N. W.; Rypdal, M.; Lovsletten, O.

    2012-12-01

    -stationarity explicitly built in. In record breaking statistics, a record is defined in the sense used in everyday language, to be the largest value yet recorded in a time series, for example, the 2004 Sumatran Boxing Day earthquake was at the time the largest to be digitally recorded. The third group of approaches (e.g. avalanches) are explicitly spatiotemporal and so also include spatial structure. This presentation will discuss two examples of our recent work on the burst problem. We will show numerical results extending the preliminary results presented in [Watkins et al, PRE, 2009] using a standard additive model, linear fractional stable motion (LFSM). LFSM explicitly includes both heavy tails and long range dependence, allowing us to study how these 2 effects compete in determining the burst duration and size exponent probability distributions. We will contrast these simulations with new analytical studies of bursts in a multiplicative process, the multifractal random walk (MRW). We will present an analytical derivation for the scaling of the burst durations and make a preliminary comparison with data from the AE index from solar-terrestrial physics. We believe our result is more generally applicable than the MRW model, and that it applies to a broad class of multifractal processes.

  9. Environmental Characteristics of Carbonatite and Alkaline Intrusion-related Rare Earth Element (REE) Deposits

    Science.gov (United States)

    Seal, R. R., II; Piatak, N. M.

    2017-12-01

    Carbonatites and alkaline intrusions are important sources of REEs. Environmental risks related to these deposit types have been assessed through literature review and evaluation of the geochemical properties of representative samples of mill tailings and their leachates. The main ore mineral in carbonatite deposits is bastnasite [(Ce,La)(CO3)F], which is found with dolomite and calcite ( 65 %), barite (20 - 25 %), plus a number of minor accessory minerals including sulfides such as galena and pyrite. Generally, alkaline intrusion-related REE deposits either occur in layered complexes or with dikes and veins cutting alkaline intrusions. Such intrusions have a more diverse group of REE ore minerals that include fluorcarbonates, oxides, silicates, and phosphates. Ore also can include minor calcite and iron (Fe), lead (Pb), and zinc (Zn) sulfides. The acid-generating potential of both deposit types is low because of a predominance of carbonate minerals in the carbonatite deposits, the presence of feldspars and minor calcite in alkaline intrusion-related deposits, and to only minor to trace occurrence of potentially acid-generating sulfide minerals. Both deposit types, however, are produced by igneous and hydrothermal processes that enrich high-field strength, incompatible elements, which typically are excluded from common rock-forming minerals. Elements such as yttrium (Y), niobium Nb), zirconium (Zr), hafnium (Hf), tungsten (W), titanium (Ti), tantalum (Ta), scandium (Sc), thorium (Th), and uranium (U) can be characteristic of these deposits and may be of environmental concern. Most of these elements, including the REEs, but with the exception of U, have low solubilities in water at the near-neutral pH values expected around these deposits. Mill tailings from carbonatite deposits can exceed residential soil and sediment criteria for Pb, and leachates from mill tailings can exceed drinking water guidelines for Pb. The greatest environmental challenges, however, are

  10. An amphipathic alpha-helix controls multiple roles of brome mosaic virus protein 1a in RNA replication complex assembly and function.

    Directory of Open Access Journals (Sweden)

    Ling Liu

    2009-03-01

    Full Text Available Brome mosaic virus (BMV protein 1a has multiple key roles in viral RNA replication. 1a localizes to perinuclear endoplasmic reticulum (ER membranes as a peripheral membrane protein, induces ER membrane invaginations in which RNA replication complexes form, and recruits and stabilizes BMV 2a polymerase (2a(Pol and RNA replication templates at these sites to establish active replication complexes. During replication, 1a provides RNA capping, NTPase and possibly RNA helicase functions. Here we identify in BMV 1a an amphipathic alpha-helix, helix A, and use NMR analysis to define its structure and propensity to insert in hydrophobic membrane-mimicking micelles. We show that helix A is essential for efficient 1a-ER membrane association and normal perinuclear ER localization, and that deletion or mutation of helix A abolishes RNA replication. Strikingly, mutations in helix A give rise to two dramatically opposite 1a function phenotypes, implying that helix A acts as a molecular switch regulating the intricate balance between separable 1a functions. One class of helix A deletions and amino acid substitutions markedly inhibits 1a-membrane association and abolishes ER membrane invagination, viral RNA template recruitment, and replication, but doubles the 1a-mediated increase in 2a(Pol accumulation. The second class of helix A mutations not only maintains efficient 1a-membrane association but also amplifies the number of 1a-induced membrane invaginations 5- to 8-fold and enhances viral RNA template recruitment, while failing to stimulate 2a(Pol accumulation. The results provide new insights into the pathways of RNA replication complex assembly and show that helix A is critical for assembly and function of the viral RNA replication complex, including its central role in targeting replication components and controlling modes of 1a action.

  11. Strontium isotopic geochemistry of intrusive rocks, Puerto Rico, Greater Antilles

    International Nuclear Information System (INIS)

    Jones, L.M.; Kesler, S.E.

    1980-01-01

    The strontium isotope geochemistry is given for three Puerto Rican intrusive rocks: the granodioritic Morovis and San Lorenzo plutons and the Rio Blanco stock of quartz dioritic composition. The average calculated initial 87 Sr/ 86 Sr ratios are 0.70370, 0.70355 and 0.70408, respectively. In addition, the San Lorenzo data establish a whole-rock isochron of 71 +- 2 m.y., which agrees with the previously reported K-Ar age of 73 m.y. Similarity of most of the intrusive rocks in the Greater Antilles with respect to their strontium isotopic geochemistry regardless of their major element composition indicates that intrusive magmas with a wide range of composition can be derived from a single source material. The most likely source material, in view of the available isotopic data, is the mantle wedge overlying the subduction zone. (orig.)

  12. Topographic Beta Spiral and Onshore Intrusion of the Kuroshio Current

    Science.gov (United States)

    Yang, De-Zhou; Huang, Rui Xin; Yin, Bao-shu; Feng, Xing-Ru; Chen, Hai-ying; Qi, Ji-Feng; Xu, Ling-jing; Shi, Yun-long; Cui, Xuan; Gao, Guan-Dong; Benthuysen, Jessica A.

    2018-01-01

    The Kuroshio intrusion plays a vitally important role in carrying nutrients to marginal seas. However, the key mechanism leading to the Kuroshio intrusion remains unclear. In this study we postulate a mechanism: when the Kuroshio runs onto steep topography northeast of Taiwan, the strong inertia gives rise to upwelling over topography, leading to a left-hand spiral in the stratified ocean. This is called the topographic beta spiral, which is a major player regulating the Kuroshio intrusion; this spiral can be inferred from hydrographic surveys. In the world oceans, the topographic beta spirals can be induced by upwelling generated by strong currents running onto steep topography. This is a vital mechanism regulating onshore intruding flow and the cross-shelf transport of energy and nutrients from the Kuroshio Current to the East China Sea. This topographic beta spiral reveals a long-term missing link between the oceanic general circulation theory and shelf dynamic theory.

  13. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    Science.gov (United States)

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. The Effects of Saltwater Intrusion to Flood Mitigation Project

    Science.gov (United States)

    Azida Abu Bakar, Azinoor; Khairudin Khalil, Muhammad

    2018-03-01

    The objective of this study is to determine the effects of saltwater intrusion to flood mitigation project located in the flood plains in the district of Muar, Johor. Based on the studies and designs carried out, one of the effective flood mitigation options identified is the Kampung Tanjung Olak bypass and Kampung Belemang bypass at the lower reaches of Sungai Muar. But, the construction of the Kampung Belemang and Tanjung Olak bypass, while speeding up flood discharges, may also increase saltwater intrusion during drought low flows. Establishing the dynamics of flooding, including replicating the existing situation and the performance with prospective flood mitigation interventions, is most effectively accomplished using computer-based modelling tools. The finding of this study shows that to overcome the problem, a barrage should be constructed at Sungai Muar to solve the saltwater intrusion and low yield problem of the river.

  15. Alerts Visualization and Clustering in Network-based Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Dr. Li [University of Tennessee; Gasior, Wade C [ORNL; Dasireddy, Swetha [University of Tennessee

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  16. When Intrusion Detection Meets Blockchain Technology: A Review

    DEFF Research Database (Denmark)

    Meng, Weizhi; Tischhauser, Elmar Wolfgang; Wang, Qingju

    2018-01-01

    developed, which allow IDS nodes to exchange data with each other. However, data and trust management still remain two challenges for current detection architectures, which may degrade the effectiveness of such detection systems. In recent years, blockchain technology has shown its adaptability in many...... fields such as supply chain management, international payment, interbanking and so on. As blockchain can protect the integrity of data storage and ensure process transparency, it has a potential to be applied to intrusion detection domain. Motivated by this, this work provides a review regarding...... the intersection of IDSs and blockchains. In particular, we introduce the background of intrusion detection and blockchain, discuss the applicability of blockchain to intrusion detection, and identify open challenges in this direction....

  17. Influence of seawater intrusion on microbial communities in groundwater.

    Science.gov (United States)

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Working group 4B - human intrusion: Design/performance requirements

    International Nuclear Information System (INIS)

    Channell, J.

    1993-01-01

    There is no summary of the progress made by working group 4B (Human Intrusion: Design/performance Requirements) during the Electric Power Research Institute's EPRI Workshop on the technical basis of EPA HLW Disposal Criteria, March 1993. This group was to discuss the waste disposal standard, 40 CFR Part 191, in terms of the design and performance requirements of human intrusion. Instead, because there were so few members, they combined with working group 4A and studied the three-tier approach to evaluating postclosure performance

  19. Sulfide Intrusion and Detoxification in the Seagrass Zostera marina

    DEFF Research Database (Denmark)

    Hasler-Sheetal, Harald; Holmer, Marianne

    2015-01-01

    Gaseous sulfide intrusion into seagrasses growing in sulfidic sediments causes little or no harm to the plant, indicating the presence of an unknown sulfide tolerance or detoxification mechanism. We assessed such mechanism in the seagrass Zostera marina in the laboratory and in the field...... as sulfate throughout the plant. We conclude that avoidance of sulfide exposure by reoxidation of sulfide in the rhizosphere or aerenchyma and tolerance of sulfide intrusion by incorporation of sulfur in the plant are likely major survival strategies of seagrasses in sulfidic sediments....

  20. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  1. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  2. Lower crustal intrusions beneath the southern Baikal Rift Zone

    DEFF Research Database (Denmark)

    Nielsen, Christoffer; Thybo, Hans

    2009-01-01

    centre. The BEST (Baikal Explosion Seismic Transect) project acquired a 360-km long, deep seismic, refraction/wide-angle reflection profile in 2002 across southern Lake Baikal. The data from this project is used for identification of large-scale crustal structures and modelling of the seismic velocities....../s and 7.9 km/s. We interpret this feature as resulting from mafic to ultra-mafic intrusions in the form of sills. Petrological interpretation of the velocity values suggests that the intrusions are sorted by fractional crystallization into plagioclase-rich low-velocity layers and pyroxene- and olivine...

  3. Simplifying the complex 1H NMR spectra of fluorine-substituted benzamides by spin system filtering and spin-state selection: multiple-quantum-single-quantum correlation.

    Science.gov (United States)

    Baishya, Bikash; Reddy, G N Manjunatha; Prabhu, Uday Ramesh; Row, T N Guru; Suryaprakash, N

    2008-10-23

    The proton NMR spectra of fluorine-substituted benzamides are very complex (Figure 1) due to severe overlap of (1)H resonances from the two aromatic rings, in addition to several short and long-range scalar couplings experienced by each proton. With no detectable scalar couplings between the inter-ring spins, the (1)H NMR spectra can be construed as an overlap of spectra from two independent phenyl rings. In the present study we demonstrate that it is possible to separate the individual spectrum for each aromatic ring by spin system filtering employing the multiple-quantum-single-quantum correlation methodology. Furthermore, the two spin states of fluorine are utilized to simplify the spectrum corresponding to each phenyl ring by the spin-state selection. The demonstrated technique reduces spectral complexity by a factor of 4, in addition to permitting the determination of long-range couplings of less than 0.2 Hz and the relative signs of heteronuclear couplings. The technique also aids the judicious choice of the spin-selective double-quantum-single-quantum J-resolved experiment to determine the long-range homonuclear couplings of smaller magnitudes.

  4. The complex clinical issues involved in an athlete's decision to retire from collision sport due to multiple concussions: a case study of a professional athlete

    Directory of Open Access Journals (Sweden)

    Andrew eGardner

    2013-09-01

    Full Text Available The issue of retirement from athletic participation due to repetitive concussive injuries remains controversial. The complexity of providing recommendations to elite athletes is highlighted by the prospect that offering inappropriate advice may foreseeably lead to engagement in a medico-legal challenge. Currently no evidenced-based, scientifically validated guidelines for forming the basis of such a decision exist. The current paper discusses the complexities of this challenge in addition to presenting a case study of a professional athlete. A number of central issues to consider when discussing athlete retirement revolve around the player’s medical and concussion histories, the current clinical profile, the athlete’s long-term life goals and understanding of the potential long-terms risks. Ensuring that thorough investigations of all possible differential diagnosis, that may explain the presenting symptoms, are conducted is also essential. Discussion pertaining to recommendations for guiding the clinical approach to the retirement issue for athletes with a history of multiple concussions is presented.

  5. The crust role at Paramillos Altos intrusive belt: Sr and Pb isotope evidence

    International Nuclear Information System (INIS)

    Ostera, H.A.; Linares, E; Haller, M.J; Cagnoni, M.C

    2001-01-01

    Paramillos Altos Intrusive Belt (PAIB) (Ostera, 1996) is located in the thick skinned folded-thrust belt of Malargue, southwestern Mendoza, Argentina. Geochemical, geochronologic and isotopic studies were carried out in it (Ostera 1996, 1997, Ostera et al. 1999; Ostera et al. 2000) and these previous papers suggested a minor involvement of the crust in the genesis of the PAIB. According with Ostera et al. (2000) it is composed by stocks, laccoliths, dykes and sills which range in composition from diorites to granodiorites, and from andesites to rhyolites, and divided in five Members, which range in age from Middle Miocene to Early Miocene: a- Calle del Yeso Dyke Complex (CYDC), with sills and dykes of andesitic composition (age: 20±2 Ma). b- Puchenque-Atravesadas Intrusive Complex (PAIC), composed by dykes and stocks ranging from diorites to granodiorites (age: 12.5±1 Ma). c- Arroyo Serrucho Stock (SAS), an epizonal and zoned stock, with four facies, with K/Ar and Ar/Ar dates of 10±1 and 9.5±0.5 Ma. d- Portezuelo de los Cerros Bayos (PCB), that includes porphyritic rocks of rhyolitic composition, of 7.5±0.5 Ma. e- Cerro Bayo Vitrophyres (CBV), with andesitic sills and dykes (age: 4.8±0.2 Ma). We present in this paper new Sr and Pb isotopes data that constrain the evolution of the PAIB (au)

  6. Weakly intrusive low-rank approximation method for nonlinear parameter-dependent equations

    KAUST Repository

    Giraldi, Loic; Nouy, Anthony

    2017-01-01

    This paper presents a weakly intrusive strategy for computing a low-rank approximation of the solution of a system of nonlinear parameter-dependent equations. The proposed strategy relies on a Newton-like iterative solver which only requires evaluations of the residual of the parameter-dependent equation and of a preconditioner (such as the differential of the residual) for instances of the parameters independently. The algorithm provides an approximation of the set of solutions associated with a possibly large number of instances of the parameters, with a computational complexity which can be orders of magnitude lower than when using the same Newton-like solver for all instances of the parameters. The reduction of complexity requires efficient strategies for obtaining low-rank approximations of the residual, of the preconditioner, and of the increment at each iteration of the algorithm. For the approximation of the residual and the preconditioner, weakly intrusive variants of the empirical interpolation method are introduced, which require evaluations of entries of the residual and the preconditioner. Then, an approximation of the increment is obtained by using a greedy algorithm for low-rank approximation, and a low-rank approximation of the iterate is finally obtained by using a truncated singular value decomposition. When the preconditioner is the differential of the residual, the proposed algorithm is interpreted as an inexact Newton solver for which a detailed convergence analysis is provided. Numerical examples illustrate the efficiency of the method.

  7. Weakly intrusive low-rank approximation method for nonlinear parameter-dependent equations

    KAUST Repository

    Giraldi, Loic

    2017-06-30

    This paper presents a weakly intrusive strategy for computing a low-rank approximation of the solution of a system of nonlinear parameter-dependent equations. The proposed strategy relies on a Newton-like iterative solver which only requires evaluations of the residual of the parameter-dependent equation and of a preconditioner (such as the differential of the residual) for instances of the parameters independently. The algorithm provides an approximation of the set of solutions associated with a possibly large number of instances of the parameters, with a computational complexity which can be orders of magnitude lower than when using the same Newton-like solver for all instances of the parameters. The reduction of complexity requires efficient strategies for obtaining low-rank approximations of the residual, of the preconditioner, and of the increment at each iteration of the algorithm. For the approximation of the residual and the preconditioner, weakly intrusive variants of the empirical interpolation method are introduced, which require evaluations of entries of the residual and the preconditioner. Then, an approximation of the increment is obtained by using a greedy algorithm for low-rank approximation, and a low-rank approximation of the iterate is finally obtained by using a truncated singular value decomposition. When the preconditioner is the differential of the residual, the proposed algorithm is interpreted as an inexact Newton solver for which a detailed convergence analysis is provided. Numerical examples illustrate the efficiency of the method.

  8. Disentangling the complex evolutionary history of the Western Palearctic blue tits (Cyanistes spp.) - phylogenomic analyses suggest radiation by multiple colonization events and subsequent isolation.

    Science.gov (United States)

    Stervander, Martin; Illera, Juan Carlos; Kvist, Laura; Barbosa, Pedro; Keehnen, Naomi P; Pruisscher, Peter; Bensch, Staffan; Hansson, Bengt

    2015-05-01

    Isolated islands and their often unique biota continue to play key roles for understanding the importance of drift, genetic variation and adaptation in the process of population differentiation and speciation. One island system that has inspired and intrigued evolutionary biologists is the blue tit complex (Cyanistes spp.) in Europe and Africa, in particular the complex evolutionary history of the multiple genetically distinct taxa of the Canary Islands. Understanding Afrocanarian colonization events is of particular importance because of recent unconventional suggestions that these island populations acted as source of the widespread population in mainland Africa. We investigated the relationship between mainland and island blue tits using a combination of Sanger sequencing at a population level (20 loci; 12 500 nucleotides) and next-generation sequencing of single population representatives (>3 200 000 nucleotides), analysed in coalescence and phylogenetic frameworks. We found (i) that Afrocanarian blue tits are monophyletic and represent four major clades, (ii) that the blue tit complex has a continental origin and that the Canary Islands were colonized three times, (iii) that all island populations have low genetic variation, indicating low long-term effective population sizes and (iv) that populations on La Palma and in Libya represent relicts of an ancestral North African population. Further, demographic reconstructions revealed (v) that the Canary Islands, conforming to traditional views, hold sink populations, which have not served as source for back colonization of the African mainland. Our study demonstrates the importance of complete taxon sampling and an extensive multimarker study design to obtain robust phylogeographical inferences. © 2015 John Wiley & Sons Ltd.

  9. Multiple tectonic mode switches indicate short-duration heat pulses in a Mio-Pliocene metamorphic core complex, West Papua, Indonesia

    Science.gov (United States)

    White, L. T.; Hall, R.; Gunawan, I.

    2017-12-01

    The Wandaman Peninsula is a narrow (2 km) promontory in remote western New Guinea. The peninsula is almost entirely composed of medium- to high-grade metamorphic rocks considered to be associated with a Mio-Pliocene metamorphic core complex. Previous work has shown that the uplift and exhumation of the core complex has potentially brought some extremely young eclogite to the surface. These might be comparable to the world's youngest (4.3 Ma) eclogites found in the D'Entrecasteaux Islands at the opposite end of New Guinea. We show that tectonic history of this region is complex. This is because the metamorphic sequences in the Wandaman Peninsula record multiple phases of deformation, all within the last few million years. This is demonstrated through methodical collation of cross-cutting relations from field and microstructural studies across the peninsula. The first phase of deformation and metamorphism is associated with crustal extension and partial melting that took place at 5-7 Ma according to new U-Pb data from metamorphic zircons. This extensional phase ceased after a tectonic mode switch and the region was shortened. This is demonstrated by two phases of folding (1. recumbent and 2. open) that overprint the earlier extensional fabrics. All previous structures were later overprinted by brittle extensional faults and uplift. This extensional phase is still taking place today, as is indicated by submerged forests exposed along the coastline associated with recent earthquakes and hot springs. The sequence of metamorphic rocks that are exposed in the Wandaman Peninsula show that stress and thermal conditions can change rapidly. If we consider that the present is a key to the past, then such results can identify the duration of deformation and metamorphic events more accurately than in much older orogenic systems.

  10. Hydrodynamic modeling of the intrusion phenomenon in water distribution systems; Modelacion hidrodinamica del fenomeno de intrusion en tuberia de abastecimiento

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Jimenez, Petra Amparo; Mora-Rodriguez, Jose de Jesus; Perez-Garcia, Rafael; Martinez-Solano, F. Javier [Universidad Politecnica de Valencia (Spain)

    2008-10-15

    This paper describes a strategy for the hydrodynamic modeling of the pathogen intrusion phenomenon in water distribution systems by the combination of a breakage with a depression situation. This scenario will be modeled computationally and experimentally. The phenomenon to be represented by both simulations is the same: the entrance of an external volume into the circulation of a main volume, known as a pathogen intrusion, as long as the main volume is potable water. To this end, a prototype and a computational model based on Computational Fluid Dynamics (CFD) are used, which allow visualizing the fields of speeds and pressures in a simulated form. With the comparison of the results of both models, conclusions will be drawn on the detail of the studied pathogen intrusion phenomenon. [Spanish] En el presente documento se describe una estrategia de modelacion del fenomeno hidrodinamico de la intrusion patogena en redes de distribucion de agua por combinacion de una rotura con una situacion de depresion. Este escenario sera modelado computacional y experimentalmente. El fenomeno que se desea representar con ambas simulaciones es el mismo: la entrada de un caudal externo a una conduccion para la que circula un caudal principal, denominado intrusion patogena, siempre y cuando el caudal principal sea agua potable. Para ello se dispone de un prototipo y un modelo computacional basado en la Dinamica de Fluidos Computacional (DFC de aqui en adelante), que permite visualizar los campos de velocidades y presiones de forma simulada. Con la comparacion de los resultados de ambos modelos se extraeran conclusiones sobre el detalle del fenomeno de la intrusion patogena estudiado.

  11. Geomathematical characterisation of the mineralization indicators: a case study from Tincova magmatic intrusion (Romania

    Directory of Open Access Journals (Sweden)

    George Tudor

    2011-10-01

    Full Text Available Indicators of the hydrothermal mineralization in the Tincova Laramian intrusion were tested at the contact zone between the intrusive body and the metamorphic host rocks. The mineralization consists of Cu, Pb and Zn sulfides, arsenopyrite, pyrrhotite and pyrite in gangue of quartz, carbonates, feldspar, sericite or clay minerals, and includes areas of hydrothermal alteration or oxidation. Seventy-nine samples were analyzed and processed as two distinct populations. Geomathematical methods highlight the importance of factors such as the shape, sizes of the mineralized zones and geological processes involved in the ore genesis. Trend maps for Cu, Pb + Zn, and Ag interpolated by kriging method, show anomalous values of Cu along the edge of the intrusive body with the metamorphic country rocks, and Pb + Zn in a marginal area. Departing from the study of correlations between different variables, the factor analysis (R-mode highlights five factors that represent a sequence of geological processes: pneumatolytic phase (Sn, deposition of the association with arsenopyrite, pyrrhotite, pyrite, molybdenite (Ni, Co, Mo, formation of the Cu ± Ag + Bi sulfide mineralization, galena mineralization ± Au, hydrothermal alteration processes (addition of Ba, Sr, V. The dependence of Cu on other elements is performed by multiple linear regression, resulting an equation statistically tested by F-test, and interpreted as originating in a phase of the metallogenetic processes. The shape of the Cu-Mo mineralized stockwork from Vălişor Valley area has been studied on the basis of samples from drillings, Cu trend maps at three depth levels, and a three-dimensional model.

  12. Alteration of Eudialyte and implications for the REE, ZR, and NB resources of the layered Kakortokites in the ILÍMAUSSAQ intrusion, South West Greenland

    DEFF Research Database (Denmark)

    Borst, Anouk Margaretha; Waight, Tod Earle; Smit, Matthijs Arjen

    2014-01-01

    The layered kakortokites in the southern part of the Ilímaussaq Intrusion are of great economic interest due to their high concentrations of REE, Zr, Nb and Ta. The prospective metals are largely contained in eudialyte, a complex sodium‐zirconosilicate and one of the major cumulus phases. Eudialyte...

  13. Saline water intrusion toward groundwater: Issues and its control

    Directory of Open Access Journals (Sweden)

    Purnama S

    2012-10-01

    Full Text Available Nowadays, saline water pollution has been gaining its importance as the major issue around the world, especially in the urban coastal area. Saline water pollution has major impact on human life and livelihood. It ́s mainly a result from static fossil water and the dynamics of sea water intrusion. The problem of saline water pollution caused by seawater intrusion has been increasing since the beginning of urban population. The problem of sea water intrusion in the urban coastal area must be anticipated as soon as possible especially in the urban areas developed in coastal zones,. This review article aims to; (i analyze the distribution of saline water pollution on urban coastal area in Indonesia and (ii analyze some methods in controlling saline water pollution, especially due to seawater intrusion in urban coastal area. The strength and weakness of each method have been compared, including (a applying different pumping patterns, (b artificial recharge, (c extraction barrier, (d injection barrier and (e subsurface barrier. The best method has been selected considering its possible development in coastal areas of developing countries. The review is based considering the location of Semarang coastal area, Indonesia. The results have shown that artificial recharge and extraction barrier are the most suitable methods to be applied in the area.

  14. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  15. Capability for intrusion detection at nuclear fuel sites

    International Nuclear Information System (INIS)

    1978-03-01

    A safeguards vulnerability assessment was conducted at three separate licensed nuclear processing facilities. Emphasis was placed on: (1) performance of the total intrusion detection system, and (2) vulnerability of the system to compromise by insiders. The security guards were interviewed to evaluate their effectiveness in executing their duties in accordance with the plant's security plan and to assess their knowledge regarding the operation of the security equipment. A review of the training schedule showed that the guards, along with the other plant employees, are required to periodically attend in-plant training sessions. The vulnerability assessments continued with interviews of the personnel responsible for maintaining the security equipment, with discussions of detector false alarm and maintenance problems. The second part of the vulnerability assessments was to evaluate the effectiveness of the intrusion detection systems including the interior and the perimeter sensors, CCTV surveillance devices and the exterior lighting. Two types of perimeter detectors are used at the sites, a fence disturbance sensor and an infrared barrier type detector. Infrared barrier type detectors have a higher probability of detection, especially in conjunction with dedicated CCTV cameras. The exterior lights satisfy the 0.2 footcandle illumination requirement. The interior intrusion detection systems included ultrasonic motion detectors, microwave motion detectors,balanced magnetic switches, and CCTV cameras. Entrance doors to the materials access areas and vital areas are protected with balanced magnetic switches. The interior intrusion detection systems at the three nuclear processing sites are considered satisfactory with the exception of the areas protected with ultrasonic motion detectors

  16. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  17. A Labeled Data Set For Flow-based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Sadre, R.; van Vliet, Frank; Pras, Aiko; Nunzi, Giorgio; Scoglio, Caterina; Li, Xing

    2009-01-01

    Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field, benchmarking of flow-based IDS is still an open issue. In this paper, we propose the first publicly available, labeled data set

  18. Intrusion of beach-disposed dredger spoil into the Mhlathuze ...

    African Journals Online (AJOL)

    Sediment intrusion and its impact on the beds of the seagrass Zostera capensis in the estuary were monitored from 1996 to 1999. Fine sediment did enter the estuary from the marine environment and was deposited mainly in its lower reaches, where its settling on the leaves of Zostera resulted in a major die-back. However ...

  19. Psychological Intrusion – An Overlooked Aspect of Dental Fear

    Directory of Open Access Journals (Sweden)

    Helen R. Chapman

    2018-04-01

    Full Text Available Dental fear/anxiety is a widely recognised problem affecting a large proportion of the population. It can result in avoidance and/or difficulty accepting dental care. We believe that psychological intrusion may play a role in the aetiology and maintenance of dental fear for at least some individuals. In this narrative review we will take a developmental perspective in order to understand its impact across the lifespan. We will consider the nature of ‘self,’ parenting styles, the details of intrusive parenting or parental psychological control, and briefly touch upon child temperament and parental anxiety. Finally, we draw together the supporting (largely unrecognised evidence available in the dental literature. We illustrate the paper with clinical examples and discuss possibly effective ways of addressing the problem. We conclude that psychological intrusion appears to play an important role in dental fear, for at least some individuals, and we call for detailed research into the extent and exact nature of the problem. A simple means of identifying individuals who are vulnerable to psychological intrusion would be useful for dentists.

  20. AANtID: an alternative approach to network intrusion detection ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Security has become not just a feature of an information system, but the core and a necessity especially the systems that communicate and transmit data over the Internet for they are more ... Keywords: Intrusion, Genetic Algorithm, detection, Security, DARPA dataset ...

  1. 1420 Ma diabasic intrusives from the Mesoproterozoic Singhora ...

    Indian Academy of Sciences (India)

    the Earth that includes accretion and dispersal of supercontinents, viz., Columbia (Rogers and. Santosh 2002; Zhao et al 2004) and Rodinia. Keywords. Chhattisgarh Supergroup; Singhora Group; diabasic intrusive; geochemistry and age. J. Earth Syst. Sci. 120, No. 2, April 2011, pp. 223–236 c Indian Academy of Sciences.

  2. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  3. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  4. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  5. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    2008-01-01

    We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the

  6. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  7. Petrography of some altered intrusive rocks from the Lower Benue ...

    African Journals Online (AJOL)

    Petrography of some altered intrusive rocks from the Lower Benue Trough, Nigeria. Smart C Obiora, Alphonso C Umeji. Abstract. No Abstract. Journal of Mining and Geology 2005, Vol 41(1): 1-9. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  8. Climate Change and Saltwater Intrusion along the Eastern ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Eastern Mediterranean is highly vulnerable to saltwater intrusion into the freshwater aquifers along its coasts. The degradation of these aquifers would result in serious socioeconomic consequence to people living there. This project will investigate how climate change is affecting the salinity of coastal aquifers at several ...

  9. Revised predictive equations for salt intrusion modelling in estuaries

    NARCIS (Netherlands)

    Gisen, J.I.A.; Savenije, H.H.G.; Nijzink, R.C.

    2015-01-01

    For one-dimensional salt intrusion models to be predictive, we need predictive equations to link model parameters to observable hydraulic and geometric variables. The one-dimensional model of Savenije (1993b) made use of predictive equations for the Van der Burgh coefficient $K$ and the dispersion

  10. Pre-Stressor Interference Control and Intrusive Memories

    NARCIS (Netherlands)

    Verwoerd, J.; Wessel, I.; De Jong, P.J.; Nieuwenhuis, Maurice; Huntjens, R.J.C.

    Although intrusive imagery is a common response in the aftermath of a stressful or traumatic event, only a minority of trauma victims show persistent re-experiencing and related psychopathology. Individual differences in pre-trauma executive control possibly play a critical role. Therefore, this

  11. Salt intrusion study in Cochin estuary - Using empirical models

    Digital Repository Service at National Institute of Oceanography (India)

    Jacob, B.; Revichandran, C.; NaveenKumar, K.R.

    been applied to the Cochin estuary in the present study to identify the most suitable model for predicting the salt intrusion length. Comparison of the obtained results indicate that the model of Van der Burgh (1972) is the most suitable empirical model...

  12. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    52 Table 7. Place Reachability Statistics for Low Level CPN...54 Table 8. Place Reachability Statistics for High Level CPN................................................. 55 Table 9. Password Stealing...the efficiency of traditional anti-virus software tools that are dependent on gigantic , continuously updated databases. Fortunately, Intrusion

  13. State of the Practice of Intrusion Detection Technologies

    Science.gov (United States)

    2000-01-01

    functions, procedures, and scripts, an Oracle database structure, Borne shell scripts, and configuration files which together communicate with ASIM Sensor...34Plugging the Holes in eCommerce Leads to 135% Growth in the Intrusion Detection and Vulnerability Assessment Software Market," PRNewswire. August

  14. Saltwater Intrusion Appraisal of Shallow Aquifer in Burutu Area of ...

    African Journals Online (AJOL)

    ADOWIE PERE

    is not caused by saltwater intrusion rather by iron which cannot be separately distinguished from groundwater by ... The sand and gravels forms the aquifer in the. Formation and are .... K.S; Soulios, G; Pliakas, F; Tsokas, G ( 2016). Seawater ...

  15. Illness intrusiveness among survivors of autologous blood and marrow transplantation.

    Science.gov (United States)

    Schimmer, A D; Elliott, M E; Abbey, S E; Raiz, L; Keating, A; Beanlands, H J; McCay, E; Messner, H A; Lipton, J H; Devins, G M

    2001-12-15

    Illness-induced disruptions to lifestyles, activities, and interests (i.e., illness intrusiveness) compromise subjective well-being. The authors measured illness intrusiveness in autologous blood and bone marrow transplantation (ABMT) survivors and compared the results with survivors of solid organ transplants. Forty-four of 64 consecutive ABMT survivors referred to the University of Toronto ABMT long-term follow-up clinic completed the Illness Intrusiveness Ratings Scale (IIRS), the Affect Balance Scale (ABS), the Atkinson Life Happiness Rating (ATKLH), the Beck Hopelessness Scale (BHS), and the Center for Epidemiologic Studies Depression (CES-D) Scale. Mean time from ABMT to evaluation was 4.6 +/- 2.8 years. All patients were in remission or had stable disease at the time of evaluation. Autologous blood and bone marrow transplantation patients' IIRS scores were compared with scores reported by recipients of kidney (n = 357), liver (n = 150), lung (n = 77), and heart (n = 60) transplants. Mean IIRS score for the 44 ABMT patients was 37.2 +/- 17 (maximum possible score, 91; minimum possible score, 13). Higher IIRS scores correlated with lower scores on the ABS (r = -0.54; P work, financial situation, and active recreation. Despite achieving a remission after ABMT, patients continue to experience illness intrusiveness compromising subjective well-being. Copyright 2001 American Cancer Society.

  16. Efficient cooling of rocky planets by intrusive magmatism

    Science.gov (United States)

    Lourenço, Diogo L.; Rozel, Antoine B.; Gerya, Taras; Tackley, Paul J.

    2018-05-01

    The Earth is in a plate tectonics regime with high surface heat flow concentrated at constructive plate boundaries. Other terrestrial bodies that lack plate tectonics are thought to lose their internal heat by conduction through their lids and volcanism: hotter planets (Io and Venus) show widespread volcanism whereas colder ones (modern Mars and Mercury) are less volcanically active. However, studies of terrestrial magmatic processes show that less than 20% of melt volcanically erupts, with most melt intruding into the crust. Signatures of large magmatic intrusions are also found on other planets. Yet, the influence of intrusive magmatism on planetary cooling remains unclear. Here we use numerical magmatic-thermo-mechanical models to simulate global mantle convection in a planetary interior. In our simulations, warm intrusive magmatism acts to thin the lithosphere, leading to sustained recycling of overlying crustal material and cooling of the mantle. In contrast, volcanic eruptions lead to a thick lithosphere that insulates the upper mantle and prevents efficient cooling. We find that heat loss due to intrusive magmatism can be particularly efficient compared to volcanic eruptions if the partitioning of heat-producing radioactive elements into the melt phase is weak. We conclude that the mode of magmatism experienced by rocky bodies determines the thermal and compositional evolution of their interior.

  17. Spatial distribution of saline water and possible sources of intrusion ...

    African Journals Online (AJOL)

    The spatial distribution of saline water and possible sources of intrusion into Lekki lagoon and transitional effects on the lacustrine ichthyofaunal characteristics were studied during March, 2006 and February, 2008. The water quality analysis indicated that, salinity has drastically increased recently in the lagoon (0.007 to ...

  18. Trauma Films, Information Processing, and Intrusive Memory Development

    Science.gov (United States)

    Holmes, Emily A.; Brewin, Chris R.; Hennessy, Richard G.

    2004-01-01

    Three experiments indexed the effect of various concurrent tasks, while watching a traumatic film, on intrusive memory development. Hypotheses were based on the dual-representation theory of posttraumatic stress disorder (C. R. Brewin, T. Dalgleish, & S. Joseph, 1996). Nonclinical participants viewed a trauma film under various encoding conditions…

  19. Nonexplosive and explosive magma/wet-sediment interaction during emplacement of Eocene intrusions into Cretaceous to Eocene strata, Trans-Pecos igneous province, West Texas

    Science.gov (United States)

    Befus, K.S.; Hanson, R.E.; Miggins, D.P.; Breyer, J.A.; Busbey, A.B.

    2009-01-01

    Eocene intrusion of alkaline basaltic to trachyandesitic magmas into unlithified, Upper Cretaceous (Maastrichtian) to Eocene fluvial strata in part of the Trans-Pecos igneous province in West Texas produced an array of features recording both nonexplosive and explosive magma/wet-sediment interaction. Intrusive complexes with 40Ar/39Ar dates of ~ 47-46??Ma consist of coherent basalt, peperite, and disrupted sediment. Two of the complexes cutting Cretaceous strata contain masses of conglomerate derived from Eocene fluvial deposits that, at the onset of intrusive activity, would have been > 400-500??m above the present level of exposure. These intrusive complexes are inferred to be remnants of diatremes that fed maar volcanoes during an early stage of magmatism in this part of the Trans-Pecos province. Disrupted Cretaceous strata along diatreme margins record collapse of conduit walls during and after subsurface phreatomagmatic explosions. Eocene conglomerate slumped downward from higher levels during vent excavation. Coherent to pillowed basaltic intrusions emplaced at the close of explosive activity formed peperite within the conglomerate, within disrupted Cretaceous strata in the conduit walls, and within inferred remnants of the phreatomagmatic slurry that filled the vents during explosive volcanism. A younger series of intrusions with 40Ar/39Ar dates of ~ 42??Ma underwent nonexplosive interaction with Upper Cretaceous to Paleocene mud and sand. Dikes and sills show fluidal, billowed, quenched margins against the host strata, recording development of surface instabilities between magma and groundwater-rich sediment. Accentuation of billowed margins resulted in propagation of intrusive pillows into the adjacent sediment. More intense disruption and mingling of quenched magma with sediment locally produced fluidal and blocky peperite, but sufficient volumes of pore fluid were not heated rapidly enough to generate phreatomagmatic explosions. This work suggests that

  20. GROUND WATER SAMPLING OF VOCS IN THE WATER/CAPILLARY FRINGE AREA FOR VAPOR INTRUSION ASSESSMENT

    Science.gov (United States)

    Vapor intrusion has recently been considered a major pathway for increased indoor air contamination from certain volatile organic contaminants (VOCs). The recent Draft EPA Subsurface Vapor Intrusion Guidance Document states that ground water samples should be obtained from the u...

  1. The effect of destination linked feature selection in real-time network intrusion detection

    CSIR Research Space (South Africa)

    Mzila, P

    2013-07-01

    Full Text Available techniques in the network intrusion detection system (NIDS) is the feature selection technique. The ability of NIDS to accurately identify intrusion from the network traffic relies heavily on feature selection, which describes the pattern of the network...

  2. Intrusions of autobiographical memories in individuals reporting childhood emotional maltreatment

    Directory of Open Access Journals (Sweden)

    Philip Spinhoven

    2011-09-01

    Full Text Available During childhood emotional maltreatment (CEM negative attitudes are provided to the child (e.g., “you are worthless”. These negative attitudes may result in emotion inhibition strategies in order to avoid thinking of memories of CEM, such as thought suppression. However, thought suppression may paradoxically enhance occurrences (i.e., intrusions of these memories, which may occur immediately or sometime after active suppression of these memories.Until now, studies that examined suppressive coping styles in individuals reporting CEM have utilized self-report questionnaires. Therefore, it is unclear what the consequences will be of emotion inhibition styles on the intrusion of autobiographical memories in individuals reporting CEM.Using a thought suppression task, this study aimed to investigate the experience of intrusions during suppression of, and when no longer instructed to actively suppress, positive and negative autobiographical memories in individuals reporting Low, Moderate, and Severe CEM compared to No Abuse (total N = 83.We found no group differences during active suppression of negative and positive autobiographical memories. However, when individuals reporting Severe CEM were no longer instructed to suppress thinking about the memory, individuals reporting No Abuse, Low CEM, or Moderate CEM reported fewer intrusions of both positive and negative autobiographical memories than individuals reporting Severe CEM. Finally, we found that intrusions of negative memories are strongly related with psychiatric distress.The present study results provide initial insights into the cognitive mechanisms that may underlie the consequences of childhood emotional maltreatment and suggests avenues for successful interventions.For the abstract or full text in other languages, please see Supplementary files under Reading Tools online

  3. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    International Nuclear Information System (INIS)

    P. Bernot

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  4. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  5. Intrusions of a drowsy mind: neural markers of phenomenological unpredictability.

    Science.gov (United States)

    Noreika, Valdas; Canales-Johnson, Andrés; Koh, Justin; Taylor, Mae; Massey, Irving; Bekinschtein, Tristan A

    2015-01-01

    The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e., the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 s before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  6. Intrusions of a drowsy mind: Neural markers of phenomenological unpredictability

    Directory of Open Access Journals (Sweden)

    Valdas eNoreika

    2015-03-01

    Full Text Available The transition from a relaxed to a drowsy state of mind is often accompanied by hypnagogic experiences: most commonly, perceptual imagery, but also linguistic intrusions, i.e. the sudden emergence of unpredictable anomalies in the stream of inner speech. This study has sought to describe the contents of such intrusions, to verify their association with the progression of sleep onset, and to investigate the electroencephalographic processes associated with linguistic intrusions as opposed to more common hypnagogic perceptual imagery. A single participant attended 10 experimental sessions in the EEG laboratory, where he was allowed to drift into a drowsy state of mind, while maintaining metacognition of his own experiences. Once a linguistic intrusion or a noticeable perceptual image occurred, the participant pressed a button and reported it verbally. An increase in the EEG-defined depth of drowsiness as assessed by the Hori system of sleep onset was observed in the last 20 sec before a button press. Likewise, EEG Dimension of Activation values decreased before the button press, indicating that the occurrence of cognitively incongruous experiences coincides with the rapid change of EEG predictability patterns. EEG hemispheric asymmetry analysis showed that linguistic intrusions had a higher alpha and gamma power in the left hemisphere electrodes, whereas perceptual imagery reports were associated with a higher beta power over the right hemisphere. These findings indicate that the modality as well as the incongruence of drowsiness-related hypnagogic experiences is strongly associated with distinct EEG signatures in this participant. Sleep onset may provide a unique possibility to study the neural mechanisms accompanying the fragmentation of the stream of consciousness in healthy individuals.

  7. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    International Nuclear Information System (INIS)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-01-01

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106

  8. Imaging Saltwater Intrusion Along the Coast of Monterey Bay Using Long-Offset Electrical Resistivity Tomography

    Science.gov (United States)

    Goebel, M.; Knight, R. J.; Pidlisecky, A.

    2016-12-01

    Coastal regions represent a complex dynamic interface where saltwater intrusion moves seawater landward and groundwater discharge moves freshwater seaward. These processes can have a dramatic impact on water quality, affecting both humans and coastal ecosystems. The ability to map the subsurface distribution of fresh and salt water is a critical step in predicting and managing water quality in coastal regions. This is commonly accomplished using wells, which are expensive and provide point information, which may fail to capture the spatial complexity in subsurface conditions. We present an alternate method for acquiring data, long-offset Electrical Resistivity Tomography (ERT), which is non-invasive, cost effective, and can address the problem of poor spatial sampling. This geophysical method can produce continuous profiles of subsurface electrical resistivity to a depth of 300 m, with spatial resolution on the order of tens of meters. Our research focuses on the Monterey Bay region, where sustained groundwater extraction over the past century has led to significant saltwater intrusion. ERT was acquired along 40 kilometers of the coast using the roll along method, allowing for continuous overlap in data acquisition. Electrodes were spaced every 22.2 m, with a total of 81 electrodes along the 1.8 km active cable length. The data show a complex distribution of fresh and salt water, influenced by geology, groundwater pumping, recharge, and land-use. While the inverted ERT resistivity profiles correspond well with existing data sets and geologic interpretations in the region, the spatial complexity revealed through the ERT data goes beyond what is known from traditional data sources alone. This leads us to conclude that this form of data can be extremely useful in informing and calibrating groundwater flow models, making targeted management decisions, and monitoring changes in subsurface salinities over time.

  9. Structure of HLA-A*0301 in complex with a peptide of proteolipid protein: insights into the role of HLA-A alleles in susceptibility to multiple sclerosis

    International Nuclear Information System (INIS)

    McMahon, Róisín M.; Friis, Lone; Siebold, Christian; Friese, Manuel A.; Fugger, Lars; Jones, E. Yvonne

    2011-01-01

    The structure of the human major histocompatability (MHC) class I molecule HLA-A*0301 (HLA-A3) in complex with a nonameric peptide (KLIETYFSK) has been determined by X-ray crystallography to 2.7 Å resolution. The structure of the human major histocompatability (MHC) class I molecule HLA-A*0301 (HLA-A3) in complex with a nonameric peptide (KLIETYFSK) has been determined by X-ray crystallography to 2.7 Å resolution. HLA-A3 is a predisposing allele for multiple sclerosis (MS), an autoimmune disease of the central nervous system. The KLIETYFSK peptide is a naturally processed epitope of proteolipid protein, a myelin protein and candidate target for immune-mediated myelin destruction in MS. Comparison of the structure of HLA-A3 with that of HLA-A2, an MHC class I molecule which is protective against MS, indicates that both MHC class I molecules present very similar faces for T-cell receptor recognition whilst differing in the specificity of their peptide-binding grooves. These characteristics may underlie the opposing (predisposing versus protective) associations that they exhibit both in humans and in mouse models of MS-like disease. Furthermore, subtle alterations within the peptide-binding groove of HLA-A3 and other A3-like MHC class I molecules, members of the so-called A3 superfamily, may be sufficient to alter their presentation of autoantigen peptides such as KLIETYFSK. This in turn may modulate their contribution to the associated risk of autoimmune disease

  10. Petrological and geochemical studies of alkaline rocks from continental Brazil. 8. The syenitic intrusion of Morro Redondo, RJ

    International Nuclear Information System (INIS)

    Brotzu, P.; Melluso, L.; Beccaluva, L.

    1989-01-01

    The alkaline complex of Morro Redondo is mainly composed of syenites, alkali syenites and nepheline syenites. The age of the intrusion, utilizing eleven newly available K/Ar data, is about 73 Ma. Petrography, mineral chemistry and geochemistry strongly support cogeneticity among the various lithotypes, linked by fractional crystallisation of the observed phases and crystal accumulation, preferentially of alkali feldspar. Initial Sr isotopic ratios indicate a mantle parental magma, probably generated in the subcontinental lithosphere, like other Brazilian alkaline complexes (e.g. Fortaleza, Juquia, Piratini, Tunas). (author) [pt

  11. Disequilibrium dihedral angles in layered intrusions: the microstructural record of fractionation

    Science.gov (United States)

    Holness, Marian; Namur, Olivier; Cawthorn, Grant

    2013-04-01

    The dihedral angle formed at junctions between two plagioclase grains and a grain of augite is only rarely in textural equilibrium in gabbros from km-scale crustal layered intrusions. The median of a population of these disequilibrium angles, Θcpp, varies systematically within individual layered intrusions, remaining constant over large stretches of stratigraphy with significant increases or decreases associated with the addition or reduction respectively of the number of phases on the liquidus of the bulk magma. The step-wise changes in Θcpp are present in Upper Zone of the Bushveld Complex, the Megacyclic Unit I of the Sept Iles Intrusion, and the Layered Series of the Skaergaard Intrusion. The plagioclase-bearing cumulates of Rum have a bimodal distribution of Θcpp, dependent on whether the cumulus assemblage includes clinopyroxene. The presence of the step-wise changes is independent of the order of arrival of cumulus phases and of the composition of either the cumulus phases or the interstitial liquid inferred to be present in the crystal mush. Step-wise changes in the rate of change in enthalpy with temperature (ΔH) of the cooling and crystallizing magma correspond to the observed variation of Θcpp, with increases of both ΔH and Θcpp associated with the addition of another liquidus phase, and decreases of both associated with the removal of a liquidus phase. The replacement of one phase by another (e.g. olivine ⇔ orthpyroxene) has little effect on ΔH and no discernible effect on Θcpp. An increase of ΔH is manifest by an increase in the fraction of the total enthalpy budget that is the latent heat of crystallization (the fractional latent heat). It also results in an increase in the amount crystallized in each incremental temperature drop (the crystal productivity). An increased fractional latent heat and crystal productivity result in an increased rate of plagioclase growth compared to that of augite during the final stages of solidification

  12. Bald Mountain gold mining district, Nevada: A Jurassic reduced intrusion-related gold system

    Science.gov (United States)

    Nutt, C.J.; Hofstra, A.H.

    2007-01-01

    The Bald Mountain mining district has produced about 2 million ounces (Moz) of An. Geologic mapping, field relationships, geochemical data, petrographic observations, fluid inclusion characteristics, and Pb, S, O, and H isotope data indicate that An mineralization was associated with a reduced Jurassic intrusion. Gold deposits are localized within and surrounding a Jurassic (159 Ma) quartz monzonite porphyry pluton and dike complex that intrudes Cambrian to Mississippian carbonate and clastic rocks. The pluton, associated dikes, and An mineralization were controlled by a crustal-scale northwest-trending structure named the Bida trend. Gold deposits are localized by fracture networks in the pluton and the contact metamorphic aureole, dike margins, high-angle faults, and certain strata or shale-limestone contacts in sedimentary rocks. Gold mineralization was accompanied by silicification and phyllic alteration, ??argillic alteration at shallow levels. Although An is typically present throughout, the system exhibits a classic concentric geochemical zonation pattern with Mo, W, Bi, and Cu near the center, Ag, Pb, and Zn at intermediate distances, and As and Sb peripheral to the intrusion. Near the center of the system, micron-sized native An occurs with base metal sulfides and sulfosalts. In peripheral deposits and in later stages of mineralization, Au is typically submicron in size and resides in pyrite or arsenopyrite. Electron microprobe and laser ablation ICP-MS analyses show that arsenopyrite, pyrite, and Bi sulfide minerals contain 10s to 1,000s of ppm Au. Ore-forming fluids were aqueous and carbonic at deep levels and episodically hypersaline at shallow levels due to boiling. The isotopic compositions of H and O in quartz and sericite and S and Pb in sulfides are indicative of magmatic ore fluids with sedimentary sulfur. Together, the evidence suggests that Au was introduced by reduced S-bearing magmatic fluids derived from a reduced intrusion. The reduced

  13. Spectroscopic investigations of Eu{sup 3+}-complexes with ligands containing multiple diglycolamide pendant arms in a room temperature ionic liquid

    Energy Technology Data Exchange (ETDEWEB)

    Sengupta, Arijit [Radiochemistry Division, Bhabha Atomic Research Centre, Trombay, Mumbai 400085 (India); Mohapatra, Prasanta K., E-mail: mpatra@barc.gov.in [Radiochemistry Division, Bhabha Atomic Research Centre, Trombay, Mumbai 400085 (India); Iqbal, Mudassir; Huskens, Jurriaan; Verboom, Willem [Laboratory of Molecular Nanofabrication, MESA" + Institute for Nanotechnology, University of Twente, P. O. Box 217, 7500 AE Enschede (Netherlands)

    2014-10-15

    Fluorescence spectroscopy was used to study the complexation of different ligands containing multiple diglycolamide (DGA) pendent arms such as T-DGA (tripodal diglycolamide), C4DGA (upper rim functionalized calix [4] arene with four DGA moieties), and C8DGA (both side functionalized calix [4] arene with eight DGA moieties) with Eu{sup 3+} in ionic liquids such as C{sub 4}mimNTf{sub 2} and C{sub 8}mimNTf{sub 2} (1-alkyl-3-methylimidazolium bis(trifluoromethylsulphonyl)imide). Mainly five sets of emission profiles were observed in all the spectra (1st set at∼580 nm assigned as the {sup 5}D{sub 0}→{sup 7}F{sub 0} transition, 2nd set at∼593 nm assigned as the {sup 5}D{sub 0}→{sup 7}F{sub 1} transition, 3rd set at∼613 nm assigned as the {sup 5}D{sub 0}→{sup 7}F{sub 2} transition, 4th set at∼650 nm assigned as the {sup 5}D{sub 0}→{sup 7}F{sub 3} transition, and 5th set at∼700 nm assigned as the {sup 5}D{sub 0}→{sup 7}F{sub 4} transition). The difference in the spectral features revealed that the nature of the complexes differs significantly from one another. Judd–Offelt constant Ω{sub 2}, which is a measure of the covalency of the metal–ligand bond, follows the order Eu{sup 3+}–C4DGA (C{sub 8}mimNTf{sub 2})>Eu{sup 3+}–C8DGA (C{sub 8}mimNTf{sub 2})>Eu{sup 3+}–TODGA (C{sub 4}mimNTf{sub 2})>Eu{sup 3+}–T-DGA (C{sub 4}mimNTf{sub 2})>Eu{sup 3+}{sub aq}. The high intensity of the {sup 5}D{sub 0}→{sup 7}F{sub 2} transitions in all complexes suggests that Eu{sup 3+} resides in a highly asymmetric environment. From the splitting patterns of the transitions, the local site symmetry around Eu{sup 3+} was found to be C{sub 2V} for the Eu{sup 3+}–T-DGA complex in both C{sub 4}mimNTf{sub 2} and a 1:5 acetonitrile–water mixture, C{sub 4V} for Eu{sup 3+}–C8DGA and Eu{sup 3+}–TODGA complexes, and either C{sub 1}, C{sub 2}, or C{sub S} for the Eu{sup 3+}–C4DGA complex. A linear relationship between the {sup 5}D{sub 0}–{sup 7}F{sub 1} splitting

  14. Multiple facets of sialomucin complex/MUC4, a membrane mucin and erbb2 ligand, in tumors and tissues (Y2K update).

    Science.gov (United States)

    Carraway, K L; Price-Schiavi, S A; Komatsu, M; Idris, N; Perez, A; Li, P; Jepson, S; Zhu, X; Carvajal, M E; Carraway, C A

    2000-01-01

    Sialomucin complex (SMC, MUC4) is a high Mr glycoprotein heterodimer, composed of mucin (ASGP-1) and transmembrane (ASGP-2) subunits. ASGP-2 contains two EGF-like domains and acts as an intramembrane ligand for the receptor tyrosine kinase ErbB2. Transfection studies with SMC DNAs showed that SMC expression could markedly reduce both cell-cell and cell-matrix interactions in vitro and increase the growth of primary tumors and the formation of metastatic foci of human A375 melanoma cells as xenotransplants in nude mice, possibly through the ability to suppress apoptosis. SMC is expressed in most vulnerable epithelia as a protective agent, which is found in both membrane and soluble forms at luminal surfaces and secreted into fluids such as milk and tears. SMC appears to be constitutively expressed by most accessible epithelia, notable exceptions being the mammary gland and uterine luminal epithelium, in which it is tightly regulated during pregnancy. Down-regulation at the luminal uterine surface appears necessary for blastocyst implantation. TGF-b is a potent repressor of SMC expression in the mammary gland and uterus, though by different mechanisms. These combined results suggest that SMC has multiple functions in epithelia and is tightly regulated in those tissues where its special functions are required.

  15. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms.

    Science.gov (United States)

    Dreano, Denis; Raitsos, Dionysios E; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2016-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  16. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis; Raitsos, Dionysios E.; Gittings, John; Krokos, George; Hoteit, Ibrahim

    2017-01-01

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin's shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  17. Long distance seawater intrusion through a karst conduit network in the Woodville Karst Plain, Florida

    Science.gov (United States)

    Xu, Zexuan; Bassett, Seth Willis; Hu, Bill; Dyer, Scott Barrett

    2016-08-01

    Five periods of increased electrical conductivity have been found in the karst conduits supplying one of the largest first magnitude springs in Florida with water. Numerous well-developed conduit networks are distributed in the Woodville Karst Plain (WKP), Florida and connected to the Gulf of Mexico. A composite analysis of precipitation and electrical conductivity data provides strong evidence that the increases in conductivity are directly tied to seawater intrusion moving inland and traveling 11 miles against the prevailing regional hydraulic gradient from from Spring Creek Spring Complex (SCSC), a group of submarine springs at the Gulf Coast. A geochemical analysis of samples from the spring vent rules out anthropogenic contamination and upwelling regional recharge from the deep aquifer as sources of the rising conductivity. The interpretation is supported by the conceptual model established by prior researchers working to characterize the study area. This paper documents the first and longest case of seawater intrusion in the WKP, and also indicates significant possibility of seawater contamination through subsurface conduit networks in a coastal karst aquifer.

  18. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ranjeeth Kumar Sundararajan

    2015-01-01

    Full Text Available In wireless sensor network (WSN, the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

  19. The Gulf of Aden Intermediate Water Intrusion Regulates the Southern Red Sea Summer Phytoplankton Blooms

    KAUST Repository

    Dreano, Denis

    2017-01-09

    Knowledge on large-scale biological processes in the southern Red Sea is relatively limited, primarily due to the scarce in situ, and satellite-derived chlorophyll-a (Chl-a) datasets. During summer, adverse atmospheric conditions in the southern Red Sea (haze and clouds) have long severely limited the retrieval of satellite ocean colour observations. Recently, a new merged ocean colour product developed by the European Space Agency (ESA)-the Ocean Color Climate Change Initiative (OC-CCI)-has substantially improved the southern Red Sea coverage of Chl-a, allowing the discovery of unexpected intense summer blooms. Here we provide the first detailed description of their spatiotemporal distribution and report the mechanisms regulating them. During summer, the monsoon-driven wind reversal modifies the circulation dynamics at the Bab-el-Mandeb strait, leading to a subsurface influx of colder, fresher, nutrient-rich water from the Indian Ocean. Using satellite observations, model simulation outputs, and in situ datasets, we track the pathway of this intrusion into the extensive shallow areas and coral reef complexes along the basin\\'s shores. We also provide statistical evidence that the subsurface intrusion plays a key role in the development of the southern Red Sea phytoplankton blooms.

  20. The intrusive complexof the Island of Giglio: geomagnetic characteristics of plutonic facies with low susceptibility contrast

    Directory of Open Access Journals (Sweden)

    R. Cavallini

    1998-06-01

    Full Text Available Two main plutonic facies characterize the intrusive complex of the Island of Giglio, and the trend of their contact at depth has been modelled using a 2D½ analysis based on a detailed geomagnetic survey in order to verify the geological hypothesis of the subsurface geometry of this contact. The magnetic anomaly connected with the discontinuity is quite low, due to the small difference between the magnetic susceptibilities of the two granitic facies. Development of this model of inversion of the magnetic field, which is in good agreement with the geological interpretation, was made possible by: 1 accurate control of the geomagnetic time variations and consequent temporal reduction, 2 a very low level of the artificial magnetic noise, 3 high density of the magnetic survey, 4 detailed knowledge of the mapped geologic contact between facies and of their petrologic characteristics, and 5 direct local measurements of the magnetic susceptibilities of the key lithologies. The model shows the trends of the geological contact, as projected in three E-W sections, that dips eastward in the range between 210 and 540, supporting the geologic hypothesis that the Pietrabona facies represents an external shell of the shallowly emplaced Giglio monzogranite intrusion.

  1. The use of Multiple Representations to Enhance Student Mental Model Development of a Complex Earth System in an Introductory Geoscience Course

    Science.gov (United States)

    Sell, K. S.; Heather, M. R.; Herbert, B. E.

    2004-12-01

    Exposing earth system science (ESS) concepts into introductory geoscience courses may present new and unique cognitive learning issues for students including understanding the role of positive and negative feedbacks in system responses to perturbations, spatial heterogeneity, and temporal dynamics, especially when systems exhibit complex behavior. Implicit learning goals of typical introductory undergraduate geoscience courses are more focused on building skill-sets and didactic knowledge in learners than developing a deeper understanding of the dynamics and processes of complex earth systems through authentic inquiry. Didactic teaching coupled with summative assessment of factual knowledge tends to limit student¡¦s understanding of the nature of science, their belief in the relevancy of science to their lives, and encourages memorization and regurgitation; this is especially true among the non-science majors who compose the majority of students in introductory courses within the large university setting. Students organize scientific knowledge and reason about earth systems by manipulating internally constructed mental models. This pilot study focuses on characterizing the impact of inquiry-based learning with multiple representations to foster critical thinking and mental model development about authentic environmental issues of coastal systems in an introductory geoscience course. The research was conducted in nine introductory physical geology laboratory sections (N ˜ 150) at Texas A&M University as part of research connected with the Information Technology in Science (ITS) Center. Participants were randomly placed into experimental and control groups. Experimental groups were exposed to multiple representations including both web-based learning materials (i.e. technology-supported visualizations and analysis of multiple datasets) and physical models, whereas control groups were provided with the traditional ¡workbook style¡" laboratory assignments

  2. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    Directory of Open Access Journals (Sweden)

    T. Trickl

    2016-07-01

    Full Text Available A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison. The measurements were carried out at four observational sites: Payerne (Switzerland, Bilthoven (the Netherlands, Lindenberg (north-eastern Germany, and the Zugspitze mountain (Garmisch-Partenkichen, German Alps, and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg. The dryness hardens the findings of a preceding study (“Part 1”, Trickl et al., 2014 that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in “Part 1” from the Zugspitze CO observations. The

  3. Development of an Assessment Procedure for Seawater Intrusion Mitigation

    Science.gov (United States)

    Hsi Ting, F.; Yih Chi, T.

    2017-12-01

    The Pingtung Plain is one of the areas with extremely plentiful groundwater resources in Taiwan. Due to that the application of the water resource is restricted by significant variation of precipitation between wet and dry seasons, groundwater must be used as a recharge source to implement the insufficient surface water resource during dry seasons. In recent years, the coastal aquaculture rises, and the over withdrawn of groundwater by private well results in fast drop of groundwater level. Then it causes imbalance of groundwater supply and leads to serious seawater intrusion in the coastal areas. The purpose of this study is to develop an integrated numerical model of groundwater resources and seawater intrusion. Soil and Water Assessment Tool (SWAT), MODFLOW and MT3D models were applied to analyze the variation of the groundwater levels and salinity concentration to investigate the correlation of parameters, which are used to the model applications in order to disposal saltwater intrusion. The data of groundwater levels, pumping capacity and hydrogeological data to were collected to build an integrated numerical model. Firstly, we will collect the information of layered aquifer and the data of hydrological parameters to build the groundwater numerical model at Pingtung Plain, and identify the amount of the groundwater which flow into the sea. In order to deal with the future climate change conditions or extreme weather conditions, we will consider the recharge with groundwater model to improve the seawater intrusion problem. The integrated numerical model which describes that seawater intrusion to deep confined aquifers and shallow unsaturated aquifers. Secondly, we will use the above model to investigate the weights influenced by different factors to the amount area of seawater intrusion, and predict the salinity concentration distribution of evaluation at coastal area of Pingtung Plain. Finally, we will simulate groundwater recharge/ injection at the coastal

  4. Monitoring Cloud-prone Complex Landscapes At Multiple Spatial Scales Using Medium And High Resolution Optical Data: A Case Study In Central Africa

    Science.gov (United States)

    Basnet, Bikash

    Tracking land surface dynamics over cloud-prone areas with complex mountainous terrain and a landscape that is heterogeneous at a scale of approximately 10 m, is an important challenge in the remote sensing of tropical regions in developing nations, due to the small plot sizes. Persistent monitoring of natural resources in these regions at multiple spatial scales requires development of tools to identify emerging land cover transformation due to anthropogenic causes, such as agricultural expansion and climate change. Along with the cloud cover and obstructions by topographic distortions due to steep terrain, there are limitations to the accuracy of monitoring change using available historical satellite imagery, largely due to sparse data access and the lack of high quality ground truth for classifier training. One such complex region is the Lake Kivu region in Central Africa. This work addressed these problems to create an effective process for monitoring the Lake Kivu region located in Central Africa. The Lake Kivu region is a biodiversity hotspot with a complex and heterogeneous landscape and intensive agricultural development, where individual plot sizes are often at the scale of 10m. Procedures were developed that use optical data from satellite and aerial observations at multiple scales to tackle the monitoring challenges. First, a novel processing chain was developed to systematically monitor the spatio-temporal land cover dynamics of this region over the years 1988, 2001, and 2011 using Landsat data, complemented by ancillary data. Topographic compensation was performed on Landsat reflectances to avoid the strong illumination angle impacts and image compositing was used to compensate for frequent cloud cover and thus incomplete annual data availability in the archive. A systematic supervised classification, using the state-of-the-art machine learning classifier Random Forest, was applied to the composite Landsat imagery to obtain land cover thematic maps

  5. Semi-non-intrusive objective intelligibility measure using spatial filtering in hearing aids

    DEFF Research Database (Denmark)

    Sørensen, Charlotte; Boldt, Jesper Bünsow; Gran, Frederik

    2016-01-01

    -intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents a new semi-non-intrusive intelligibility measure based on an existing intrusive measure, STOI, where an estimate of the clean speech is extracted using spatial filtering in the hearing aid. The results......Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non...

  6. Sill intrusion in volcanic calderas: implications for vent opening probability

    Science.gov (United States)

    Giudicepietro, Flora; Macedonio, Giovanni; Martini, Marcello; D'Auria, Luca

    2017-04-01

    Calderas show peculiar behaviors with remarkable dynamic processes, which do not often culminate in eruptions. Observations and studies conducted in recent decades have shown that the most common cause of unrest in the calderas is due to magma intrusion; in particular, the intrusion of sills at shallow depths. Monogenic cones, with large areal dispersion, are quite common in the calderas, suggesting that the susceptibility analysis based on geological features, is not strictly suitable for estimating the vent opening probability in calderas. In general, the opening of a new eruptive vent can be regarded as a rock failure process. The stress field in the rocks that surrounds and tops the magmatic reservoirs plays an important role in causing the rock failure and creating the path that magma can follow towards the surface. In this conceptual framework, we approach the problem of getting clues about the probability of vent opening in volcanic calderas through the study of the stress field produced by the intrusion of magma, in particular, by the intrusion of a sill. We simulate the intrusion of a sill free to expand radially, with shape and dimensions which vary with time. The intrusion process is controlled by the elastic response of the rock plate above the sill, which bends because of the intrusion, and by gravity, that drives the magma towards the zones where the thickness of the sill is smaller. We calculated the stress field in the plate rock above the sill. We found that at the bottom of the rock plate above the sill the maximum intensity of tensile stress is concentrated at the front of the sill and spreads radially with it, over time. For this reason, we think that the front of the spreading sill is prone to open for eruptive vents. Even in the central area of the sill the intensity of stress is relatively high, but at the base of the rock plate stress is compressive. Under isothermal conditions, the stress soon reaches its maximum value (time interval

  7. Biological intrusion of low-level-waste trench covers

    Science.gov (United States)

    Hakonson, T. E.; Gladney, E. S.

    The long-term integrity of low-level waste shallow land burialsites is dependent on the interaction of physical, chemical, and biological factors that modify the waste containment system. The need to consider biological processes as being potentially important in reducing the integrity of waste burial site cover treatment is demonstrated. One approach to limiting biological intrusion through the waste cover is to apply a barrier within the profile to limit root and animal penetration with depth. Experiments in the Los Alamos Experimental Engineered Test Facility were initiated to develop and evaluate biological barriers that are effective in minimizing intrusion into waste trenches. The experiments that are described employ four different candidate barrier materials of geologic origin. Experimental variables that will be evaluated, in addition to barrier type, are barrier depth and sil overburden depth.

  8. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  9. IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

    International Nuclear Information System (INIS)

    Bernot, P.

    2004-01-01

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical

  10. Use of behavioral biometrics in intrusion detection and online gaming

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  11. Misuse and intrusion detection at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  12. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  13. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  14. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  15. Corrosion inhibitor development for slightly sour environments with oxygen intrusion

    Energy Technology Data Exchange (ETDEWEB)

    Wylde, J.; Wang, H.; Li, J. [Clariant Oil Services North America, Calgary, AB (Canada)

    2009-07-01

    This presentation reported on a study that examined the effect of oxygen on the inhibition of carbon steel in slightly sour corrosion, and the initiation and propagation of localized attack. Oxygen can enter sour water injection systems through the vapor space in storage tanks and process system. Oxygen aggravates the corrosion attack by participating in the cathodic reaction under full or partial diffusion control. Laboratory testing results were reported in this presentation along with the development of corrosion inhibitors for such a slightly sour system. Bubble testing cells were used with continuous H{sub 2}/CO{sub 2} mixture gas sparging and occasional oxygen intrusion of 2 to 4 hours during a week long test. Linear polarization resistance (LPR) measurements and weight loss corrosion coupons were used to quantify the corrosion attack. The findings were presented in terms of the magnitude of localized attacks at different oxygen concentrations and intrusion periods, with and without the presence of corrosion inhibitors. tabs., figs.

  16. Thermodynamics of water intrusion in nanoporous hydrophobic solids.

    Science.gov (United States)

    Cailliez, Fabien; Trzpit, Mickael; Soulard, Michel; Demachy, Isabelle; Boutin, Anne; Patarin, Joël; Fuchs, Alain H

    2008-08-28

    We report a joint experimental and molecular simulation study of water intrusion in silicalite-1 and ferrerite zeolites. The main conclusion of this study is that water condensation takes place through a genuine first-order phase transition, provided that the interconnected pores structure is 3-dimensional. In the extreme confinement situation (ferrierite zeolite), condensation takes place through a continuous transition, which is explained by a shift of both the first-order transition line and the critical point with increasing confinement. The present findings are at odds with the common belief that conventional phase transitions cannot take place in microporous solids such as zeolites. The most important features of the intrusion/extrusion process can be understood in terms of equilibrium thermodynamics considerations. We believe that these findings are very general for hydrophobic solids, i.e. for both nonwetting as well as wetting water-solid interface systems.

  17. Medication Adherence using Non-intrusive Wearable Sensors

    Directory of Open Access Journals (Sweden)

    T. H. Lim

    2017-12-01

    Full Text Available Activity recognition approaches have been applied in home ambient systems to monitor the status and well- being of occupant especially for home care systems. With the advancement of embedded wireless sensing devices, various applications have been proposed to monitor user´s activities and maintain a healthy lifestyle. In this paper, we propose and evaluate a Smart Medication Alert and Treatment Electronic Systems (SmartMATES using a non-intrusive wearable activity recognition sensing system to monitor and alert an user for missing medication prescription. Two sensors are used to collect data from the accelerometer and radio transceiver. Based on the data collected, SmartMATES processes the data and generate a model for the various actions including taking medication. We have evaluated the SmartMATES on 9 participants. The results show that the SmartMATES can identify and prevent missing dosage in a less intrusive way than existing mobile application and traditional approaches.

  18. Manipulating recall vantage perspective of intrusive memories in dysphoria.

    Science.gov (United States)

    Williams, Alishia D; Moulds, Michelle L

    2008-10-01

    The current study attempted to experimentally manipulate mode of recall (field, observer perspective) in a sample of mildly dysphoric participants (N=134) who reported a distressing intrusive memory of negative autobiographical event. Specifically, the current study sought to ascertain whether shifting participants into a converse perspective would have differential effects on the reported experience of their memory. Results indicated that shifting participants from a field to an observer perspective resulted in decreased experiential ratings: specifically, reduced distress and vividness. Also, as anticipated, the converse shift in perspective (from observer to field) did not lead to a corresponding increase in experiential ratings, but did result in reduced ratings of observation and a trend was observed for decreased levels of detachment. The findings support the notion that recall perspective has a functional role in the regulation of intrusion-related distress and represents a cognitive avoidance mechanism.

  19. An Immune-inspired Adaptive Automated Intrusion Response System Model

    Directory of Open Access Journals (Sweden)

    Ling-xi Peng

    2012-09-01

    Full Text Available An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the automated response polices are adaptively performed or adjusted according to the realtime network danger. Thus, not only accurately evaluates the network attacks, but also greatly reduces the response times and response costs.

  20. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    International Nuclear Information System (INIS)

    Kumar, Rakesh; Bhattacharjee, B.

    2004-01-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated